Towerwall's InfoSec Blog

Content Type

See all

Battling Ransomware: How To Prevent A Ransomware Incident

security software , Social Engineering , Business Continuity , Phishing , PCI , malware , ransomware , cannabis , Enterprise

Michelle Drolet

Ransomware attacks can prove extremely disruptive and expensive to remedy. Prevention is better than finding a cure, and ransomware incidents are easily preventable with the right action. A few high-profile ransomware incidents have spread awareness, and many individuals and organizations have likely taken strides to protect themselves, which may have diminished the success rate of ransomware and prompted attackers to employ other means. A Kaspersky report shows a 30% decline in ransomwarefalse

Shellshock , The Latest Mac OSX and Linux Vulnerabilty—

network security , Shellshock. Bash bug , passwords , security software , Data Security , Linux , iOS update , Security Threat , Information Security , web server , Bash , Mac , Mac OSX , Hackers , cybercriminals , Security Alert , Data Privacy , security research , iOS , GNU Bash Remote Code Execution Vulnerability , Unix , cannabis , cybersecurity , Enterprise , Data Breach

Michelle Drolet

By: Solange_Desc1 Security researchers have discovered a new software bug known as the “Bash Bug” or “Shellshock,” or to those more technically “in-the-know” as GNU Bash Remote Code Execution Vulnerability (CVE-2014-6271)(link is external). This bug, more correctly termed, ‘vulnerability’, potentially allows attackers to gain control over targeted computers. The bug is present in a piece of computer software called, Bash, that is typically found on computers running an operating system calledfalse

Firefox 32.0 fixes holes, shakes out some old SSL certs, introduces certificate pinning

security software , Data Security , Twitter , certificates , Information Security , Application Security , Security , cybercriminals , Data Privacy , cannabis , cybersecurity , Firefox , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

by Paul Ducklin on September 3, 2014

Test All Apps to Keep Hackers from Penetrating Castle Walls

Test All Apps to Keep Hackers from Penetrating Castle Walls

security software , Data Security , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , Mobile Apps , Hackers , Cloud Security , security policy , cybercriminals , Tablets , information security tips , Compliance , Mobile Protection , Mobile Security , cybersecurity

Michelle Drolet

Four major challenges when protecting apps and how to solve them Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. While most large businesses have begun application vulnerability testing,false

Towerwall and MassBay Host Another Successful Information Security Summit

Security Partners , Security Services , security software , Data Security , Government Compliance Regulations , Security Regulations , Security Threat , Information Security , Security , Compliance & Privacy , Events , Compliance , Big Data , Data Privacy , security research , Data Breach

Michelle Drolet

Towerwall teamed up with MassBay Community College on May 29 to present the second annual Information Security Summit at MassBay’s Wellesley Hills campus from 8 a.m. to 1 p.m. Over 250 individuals attended the Summit where they interacted with industry experts and participated in various security panel discussions. After a presentation on the "Anatomy of a Malware Attack" by Sophos, and the keynote by Chris Logan of Care New England Health Systems, the Summit offered a number of breakoutfalse

Towerwall listed among “20 Most Promising Security Consulting Companies”

Security Partners , network security , Security Services , security software , Data Security , credit card security , Security Threat , Security Program , Information Security , Application Security , Security , Cloud Security , security policy , information security tips , cloud services , Big Data , Data Privacy , security research , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Also named to CRN’s “Women in the Channel” and “The Power 50” BOSTON – May 12, 2014 – Towerwall (www.towerwall.com), an IT security services provider for small to mid-size businesses, today announced it was selected for inclusion in a list of the 20 “Most Promising Enterprise Security Consulting Companies.” The list was compiled by the editors of CIO Review, a magazine published in Fremont, Calif. “Presently, the time is apt to identify some of the right security players in the market. Wefalse

Deciding Between Vulnerability Scanning And Penetration Testing

Security Services , security software , Data Security , Assessment , Security Regulations , Security Threat , Information Security , Application Security , Security , Hackers , security policy , cybercriminals , penetration testing , Big Data , Data Privacy , vulnerability management , cybersecurity , Enterprise , Data Breach , Gap Assessment

Michelle Drolet

My clients often confuse scanning and penetration testing. Organisations should be conducting both external vulnerability scans and penetration tests. If you are storing or transmitting data on the Internet, particularly sensitive data such as credit card details, then quarterly scanning is required to validate your PCI compliance. You also need to conduct a penetration test at least once a year. These are the minimum requirements to remain compliant; it is prudent to scan and test more often.false

Reminder: Please join us at the Information Security Summit 2014

Security Partners , network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Information Security Summit , Hackers , endpoint security system , Cloud Security , Compliance & Privacy , security policy , cybercriminals , financial security , Events , information security tips , Compliance , Big Data , Data Privacy , security research , Mobile Security , cybersecurity , Data Breach

Michelle Drolet

Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

The Benefits of Cloud-Based Endpoint Security

The Benefits of Cloud-Based Endpoint Security

security software , Data Security , Security Regulations , Security Threat , Security Program , Information Security , endpoint security system , security policy , Big Data , Data Privacy , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared to $46 billion just six years ago. Mirroring the general trend for SaaS solutions, cloud-based IT security systems can be an ideal fit for smaller businesses, freeing them from internal IT overhead, cutting complexity, and providing scalability. Here are five reasons that switching to afalse

Why security professionals need to get more creative with penetration testing (and how to do it)

network security , Security Services , security software , Data Security , Security Regulations , Social Engineering , Security Threat , Cloud Security , penetration testing , Big Data , Data Privacy , vulnerability management , Mobile Security , cybersecurity , Enterprise , Data Breach

Michelle Drolet

Criminals are evolving with their techniques for hacking and breaching corporate assets, so security managers need to as well. Here are some ways companies are going beyond standard pen testing in order to increase awareness By Maria Korolov Security professionals have long been running penetration tests against their firewalls and other security systems to find weaknesses that need to be addressed. The Common Vulnerability Scoring System is an industry standard, but has been around for afalse