Towerwall's InfoSec Blog

Content Type

See all

Beware of BYOD Harming your Company

Security Partners , network security , security software , Data Security , BYOD , Security Regulations , Security Threat , Security Program , Information Security , Security , Cloud Security , security policy , Security Alert , information security tips , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient -- employees can access important documents at home or on the road --it also creates greater security risks for businesses.

Microsoft discovers Chinese malware pre-installed on new PCs

Security Partners , network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Information Security , Security , malware , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Microsoft , information security tips , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Microsoft has published evidence of an extraordinary conspiracy in which potent botnet malware was apparently installed and hidden on PCs during their manufacture in China. This is a big deal, the team at Towerwall has been aware that this level of threat and exploitation existed, but none the less surprised. Read the rest of the article: Microsoft discovers Chinese malware pre-installed on new PCs

10 Things to Know Before Creating BYOD Policy

Security Services , Data Security , BYOD , Security Threat , Security Program , Security , software updates , Cloud Security , security policy , penetration testing , security research , cannabis , cybersecurity , Enterprise

Michelle Drolet

In recent years, the work place has become more mobile than ever, and the mobile worker revolution is, in large part, the reason for the rise in Bring Your Own Device (BYOD) policies. The big idea is that through the use of cloud computing-based collaboration platforms, enterprise-class companies can save a great deal of money in IT, security and overall operational costs. While this would seem like a no-brainer, more companies are learning that the opposite is true. Both executives andfalse

Introducing our Security Training Toolkit

Security Partners , Security Services , Data Security , Security Regulations , Security Program , Information Security , Security , vulnerability scanning , Hackers , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , cannabis , cybersecurity , Enterprise

Michelle Drolet

A customizable security training program for your review. We're giving you all the tools you need to keep your employees out of trouble. Whether you’re starting a program from scratch, or just in need of some refresher materials, we’ve got you covered. Here’s whats included in the Towerwall Security Training Toolkit:

Hackers leak 1 million Apple device IDs

Security Partners , Security Services , security software , Data Security , ID Theft , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Security , Mobile Apps , Hackers , cyber-attack , Compliance & Privacy , Apple , cybercriminals , Security Alert , information security tips , Mobile Protection , security research , Mobile Security , cybersecurity , Enterprise

Michelle Drolet

To cap off a summer of devastating corporate data breaches, hackers yesterday posted online what might be the crown jewel of 2012 data dumps: 1 million identification numbers for Apple iPhones, iPads and iPod Touch's, all purportedly stolen from the FBI. There may also be an additional 11 million Apple device IDs yet to be released, many with users' full names, addresses and telephone numbers attached.

Michelle Drolet Named One of the Most Powerful Women Of The Channel for 2012

network security , security software , Data Security , Towerwall , Security Regulations , Michelle Drolet , Security Program , Information Security , Security , security policy , information security tips , cannabis , cybersecurity , Enterprise

Michelle Drolet

Michelle Drolet, CEO of Towerwall came in at number 32 for the most powerful women for the Channel Reseller Network (CRN). The following 100 are pulled from those ranks as executives who have proven themselves exceptional during the past year. CRN is proud to highlight their achievements. For more information Visit CRN online

Why You Need A Mobile Device Policy

Security Partners , network security , Security Services , security software , Data Security , BYOD , Security Regulations , Mobile Devices , Security Threat , cisco , Security Program , Information Security , Security , Mobile Apps , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , Security Alert , information security tips , Compliance , Mobile Protection , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Whether you choose to embrace it or try to resist it, the BYOD (Bring Your Own Device) trend is set to grow. A study by Cisco Systems found that 78 percent of white-collar workers in the U.S. use a mobile device for work and 41 percent indicated that most smartphones that connect to the company network are actually employee-owned. So, if you don't already have a BYOD policy, you need one. Employees will connect to your network and use their personal mobile devices for work, whether you allow itfalse

Library file in certain Android Apps connects C&C servers

Android , network security , Data Security , Security Regulations , threat landscape , Security Threat , Security Program , Security , cyber-attack , security policy , cybercriminals , Security Alert , security research , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

TrendMicro has uncovered certain Android apps (detected as ANDROIDOS_BOTPANDA.A) containing a malicious library file, which when executed, renders the infected device as a zombie device that connects to specific command and control (C&C) servers. What is also noteworthy about this file is that it hides its routines in the dynamic library, making it difficult to analyze. The malicious library libvadgo contained in ANDROIDOS_BOTPANDA.A was developed via NDK and loaded using Java Native Interface.false

Patch as Patch Can: All Software Is Flawed

Patch as Patch Can: All Software Is Flawed

network security , Security Services , security software , Data Security , Security Regulations , Security Threat , Security Program , Security , cyber-attack , security policy , cybercriminals , cybersecurity , Enterprise

Michelle Drolet

Many IT departments have weak patching processes - especially on the client-side. And it's no wonder - patching is tough. Across all industries and platforms, the Window of Exploit (WOE) - that is, the time lag between announced discovery and the availability of a patch - for web-based vulnerabilities is a whopping 233 days, according to WhiteHat Security. This leaves your organization exposed for an unacceptably long period of time. It may not be glamorous, but a meticulous patching program isfalse

Beware the wild west of Web applications

Security Partners , network security , Security Services , security software , Web Storage , Data Security , Security Regulations , Security Threat , Security Program , Information Security , web server , Application Security , Security , Cloud Security , Web Application Firewall , security policy , penetration testing , information security tips , Compliance , Web Browser , web users , cannabis , cybersecurity , Enterprise

Michelle Drolet

Web applications – particularly those facilitating collaboration and communication – are a boon to sales, marketing and productivity. Teams work together more effectively, salespeople enjoy better leads and marketing tools and customer service reps can more closely connect with those they serve. All of these gains, though, come at a cost: risk. By their very nature, Web applications circumvent many enterprise security controls. They are designed to enable communication, not security. A paper byfalse