Towerwall's InfoSec Blog

Content Type

See all

Establishing Security Goals

network security , Security Services , security software , Data Security , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , endpoint security system , Cloud Security , security policy , cybercriminals , penetration testing , information security tips , Compliance , security research , vulnerability management , Mobile Security , cybersecurity

Michelle Drolet

Implementing security practices in your organization’s employees’ daily work habits, and ensuring the integrity and confidentiality of information security, the goals of the Security Awareness Program are:

10 Things I Know About ... Passwords

passwords , security software , Data Security , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Application Security , Security , Hackers , Cloud Security , security policy , cybercriminals , information security tips , Big Data , Data Privacy , security research , cybersecurity , Data Breach

Michelle Drolet

3 Keys To Keep Enterprise Clouds Secure

3 Keys To Keep Enterprise Clouds Secure

network security , Security Services , security software , Data Security , Security Threat , Information Security , Cloud Security , security policy , financial security , information security tips , cloud services , Big Data , Data Privacy , security research , Enterprise , Data Breach

Michelle Drolet

3 Keys To Keep Enterprise Clouds Secure Outsourcing has won out over ownership, and the rush to the cloud continues to gather pace. Where security is concerned there are two major trends that threaten to expose your company to unnecessary risk. There’s a lack of planning and due diligence when choosing cloud providers, and there’s a murky grey area when it comes to responsibility. They can both be mitigated by building security planning into your system from the start, instead of trying tofalse

Towerwall Information Security Alert Vol 13.50 - Making phishing more complex - on purpose

Data Security , Security Regulations , Security Threat , Phishing , Security Program , Security , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , security research , cybersecurity , Data Breach

Michelle Drolet

Earlier this week a colleague pointed out an intriguing phishing sample that he had come across. It was interesting not because of any great sophistication or complexity, but rather that it illustrated the reuse of an old social engineering trick. The brand being targeted in the phish campaign is Poste Italiane, a well-known Italian group that includes financial and payment services in its product portfolio. We see numerous phishing attacks targeting this group each month, with attackers keenfalse

10 Things I Know About... Mobile Security

Security Services , passwords , Web Storage , Data Security , Security Regulations , Mobile Devices , Security Threat , Information Security , web server , Application Security , Security , iPhone , Mobile Apps , Cloud Security , T-Mobile , Web Application Firewall , cyber-attack , Apple , cybercriminals , Security Alert , information security tips , Mobile Protection , Data Privacy , Web Browser , security research , Mobile Security , web users , cybersecurity , Data Breach

Michelle Drolet

10. Malware Is On The Rise The threat of malware on mobile platforms is growing steadily as more cybercriminals target mobile devices in increasingly sophisticated ways.

Read the EDA's Report on Malware Infections

Security Partners , Security Services , Data Security , Security Threat , Information Security , malware , cyber-attack , cybercriminals , Security Alert , information security tips , Big Data , Data Privacy , security research , cybersecurity , Data Breach

Michelle Drolet

Read the EDA's Report on Malware Infections - Malware Infections on EDA’s Systems Were Overstated and the Disruption of IT Operations Was Unwarranted Click here to read.

First malicious apps to exploit critical Android bug found in the wild

Android , network security , Security Regulations , Mobile Devices , Security Threat , Phishing , Security Program , Information Security , Application Security , Security , Mobile Apps , Hackers , cyber-attack , security policy , cybercriminals , Tablets , Mobile Protection , security research , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

Researchers have spotted the first in-the-wild apps to exploit a critical Android vulnerability allowing attackers to inject malicious code into legitimate programs without invalidating their digital signature. The two apps, distributed on unofficial Android marketplaces in China, help people find doctors and make appointments, according to a blog post published Tuesday by researchers from security firm Symantec. By exploiting the recently disclosed "master key" vulnerability—or possibly a false

Four Steps to Respond & Recover from Sophisticated Security Attacks

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , credit card security , Mobile Devices , Security Threat , Security Program , Information Security , Mobile Apps , Hackers , endpoint security system , Cloud Security , cyber-attack , security policy , cybercriminals , financial security , Security Alert , information security tips , Compliance , Big Data , Mobile Protection , Data Privacy , security research , Mobile Security , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated every year. At the same time, IT resources are moving outside the firewall and enterprises are distributing their applications and datafalse

New LinkedIn E-Mail Scam

Linkedin , security software , Security Regulations , Social Engineering , credit card security , Security Threat , Information Security , web server , Security , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Web Browser , security research , Mobile Security , web users , email scam , cybersecurity , Enterprise

Michelle Drolet

Hi all, there is an e-mail scam doing the rounds. The message is an invite from some random person you won’t know with a link (how original). If you get such a message don’t use the link, check your LinkedIn account as if it’s a legit request it will be there waiting for approval. Even if it is legit, make sure you vet all invite requests carefully. I have had several dodgy requests from what I believe to be bogus profiles who are likely up to no good. LinkedIn is about the quality of yourfalse

Facebook leaks are a lot leakier than Facebook is letting on

Security Partners , network security , Security Services , Web Storage , threat landscape , credit card security , Security Threat , Security Program , Information Security , Security , Facebook , Cloud Security , Web Application Firewall , cyber-attack , cybercriminals , information security tips , Web Browser , security research , web users , cybersecurity , Enterprise

Michelle Drolet

Remember last week, Facebook leaked email addresses and phone numbers for 6 million users, but that it was really kind of a modest leak, given that it's a billion-user service? OK, scratch the "modest" part. The researchers who originally found out that Facebook is actually creating secret dossiers for users are now saying the numbers don't quite match up. The number of affected users Facebook noted in a posting on its security blog is far less than what they themselves found, and Facebook isfalse