Towerwall's InfoSec Blog

Content Type

See all

Event: Don't be a stooge when it comes to data security.

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Information Security , Security , security policy , Events , Security Alert , information security tips , Compliance , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Join us for an unprecedented security event! Friday, April 13th, 8:00 am - AMC Movie Theatre Framingham, MA Join Towerwall, Trend Micro, Application Security Inc., Sophos, Varonis, Vormetric and WAVE for a brief presentation on data and network security followed by a free breakfast and screening of the world premiere movie: The Three Stooges. Click here to reserve your space today! For more information, contact Andrea at 774-204-0700 or email at - andreah@towerwall.com.

Recommended Reading for Every Entrepreneur

Security Services , security software , Data Security , credit card security , Security Threat , Security Program , Information Security , Security , security policy , financial security , Security Alert , information security tips , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

Boston Business Journal asked Towerwall for required reading for every entrepreneur. Michelle Drolet recommends “The Power of Nice” by Linda Kaplan Thaler and Robin Koval. Nice companies have lower turnover and higher productivity. Click here to read the article.

Can you stamp out spambots? No, but you can help

network security , Security Services , security software , Data Security , Security Regulations , credit card security , Security Threat , Phishing , Security Program , spambots , Information Security , Security , ransomware , financial security , Security Alert , information security tips , security research , cybersecurity , Enterprise

Michelle Drolet

The headline reads, “FBI warns of new malware targeting bank accounts," but it could just as well say, “More new victims born from opening emails.” From the simple act of opening an email and clicking on an attachment, the victim's username and password to their bank accounts are stolen by a process called keylogging, where the info is presto, logged directly from your very fingers as you type in your credentials. What's scary is that bogus emails can appear to come from someone you know is afalse

Loss Of Customer Personal Information Damages Banks’ Credibility

network security , Security Services , security software , Data Security , ID Theft , Security Regulations , credit card security , Security Threat , Security Program , Information Security , Security , Hackers , Cloud Security , cyber-attack , Compliance & Privacy , cybercriminals , Security Alert , information security tips , Compliance , security research , cybersecurity , Enterprise

Michelle Drolet

On Jan. 5, federal law enforcement seized several automobiles worth about $100,000 in value. They had belonged to the former president of the Massachusetts Bank and Trust Company and were taken as restitution for his defrauding the bank in 1997. It seems that not a day passes by when news of banking-related fraud, money laundering, or a privacy violation is reported. Last year in May, Bank of America sustained a $10-million loss when an insider sold the bank’s customer data to organizedfalse

Security Awareness Conference

network security , security software , Data Security , Security Regulations , Security Program , Information Security , Security , security policy , Events , information security tips , security research , cybersecurity , Enterprise

Michelle Drolet

This Thursday, October 20th I will be a guest presenter at the 5th annual Pioneer Valley Information Security Awareness Conference at Holyoke Community College. A comprehensive slate of topics will be discussed, notable will be trends in cyber crime, protecting business data, the security of social media sites such as Facebook and Twitter, and women in information technology. As Part of National Cyber Security Awareness Month, the the conference brings together security decision-makers,false