Towerwall's InfoSec Blog

Content Type

See all

VCISO: A Pragmatic Path To Cybersecurity In Pandemic Times And Beyond

Social Engineering , Phishing , COVID-19 , cannabis , Enterprise

Michelle Drolet

Covid-19 has disrupted our lives and caused a lot of stress and panic globally. Even though lockdowns may be relaxing, cyber-attacks are showing no signs of slowing down. The pandemic has created the perfect environment for hacktivists to strike with a high degree of success. Let’s understand the top five reasons for this:

Watch Now: Operationalizing Cybersecurity - 3/19/19

Social Engineering , Phishing , malware , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

Cybersecurity, much like safety, cannot be achieved - it is an ongoing process that changes and adjusts to respond to the threat landscape, business needs and resources. As essential a cybersecurity strategy is to the enterprise, so is the implementation of it.

Battling Ransomware: How To Prevent A Ransomware Incident

security software , Social Engineering , Business Continuity , Phishing , PCI , malware , ransomware , cannabis , Enterprise

Michelle Drolet

Ransomware attacks can prove extremely disruptive and expensive to remedy. Prevention is better than finding a cure, and ransomware incidents are easily preventable with the right action. A few high-profile ransomware incidents have spread awareness, and many individuals and organizations have likely taken strides to protect themselves, which may have diminished the success rate of ransomware and prompted attackers to employ other means. A Kaspersky report shows a 30% decline in ransomwarefalse

Don't Bite That Phishing Bait: Bet On These Five Simple Safety Rules

Social Engineering , Phishing , Anti-Phishing Working Group (APWG) , Forbes , cloud phishing , cannabis , Enterprise

Michelle Drolet

Bad actors have taken advantage of unpatched systems, software vulnerabilities and increasingly devious forms of malware for years, but their preferred weapon is often phishing. While their motives haven’t changed — luring target victims to click highly legitimate-looking emails so they can steal the keys to the castle — I've seen their attack methods grow more sophisticated as the CEO of a data security services provider.

Trends in Data Breaches and Comprehensive Response

Social Engineering , Webinar , Business Continuity , Michelle Drolet , CCPA , GDPR , Application Security , BrightTalk , PCI , malware , ransomware , HIPAA , Compliance & Privacy , penetration testing , Compliance , cannabis , cybersecurity , Breach Response , Enterprise , Data Breach

Michelle Drolet

Trends in Data Breaches and Comprehensive Responses Does your organization have a data breach response plan? Join Michelle Drolet and a team of industry experts for an interactive Q&A panel and discover the best practices for breach response and how to strengthen your organization's cyber resilience.

5 Tips to Help you Block Ransomware

sandbox , Social Engineering , Phishing , SamSam attack , phishing attacks , PCI , ransomware , malwarebytes , cannabis , Enterprise

Michelle Drolet

Learn about best practices to combat the threat of ransomware There have been some seriously nasty ransomware attacks in the last few years. From Petya to Wannacry to the SamSam attack on health record company Allscripts just last month, ransomware has been wreaking havoc across the world. Global ransomware damages exceeded $5 billion last year, up from $325 million in 2015. That’s a meteoric rise. The sad thing is we understand the risks and how to mitigate them. A few simple steps can atfalse

10 things I know about... Public Wi-Fi

Hack , Social Engineering , Worcester Business Journal , Public Wi-Fi , VPN , 10 Things I Know , SSL , cannabis , Enterprise

Michelle Drolet

10. Freely hackable Free public Wi-Fi connections are treated like a public utility, but they can be making you vulnerable to hackers.

Join Towerwall at these Upcoming InfoSec Events

Join Towerwall at these Upcoming InfoSec Events

ISACA , Conference , Information Security Summit 2016 , Boston , Social Engineering , Phishing , Information Security , Security BSides Boston 2016 , malware , Information Security Summit , Events , Compliance , Massachusetts , cannabis , Enterprise

Michelle Drolet

We will be attending, sponsoring and hosting the following InfoSec events this Spring / Summer. Join us!

What You Need to Know About This New Bank Account Threat

Social Engineering , Phishing , Security Program , Information Security , Security , malware , Cloud Security , Security Alert , Mobile Security , cybersecurity

Michelle Drolet

Sophos Researcher James Wyke recently did an analysis of the malware Vawtrak. He found that Vawtrak has been targeting financial institutions, especially banks. Vawtrak injects a DLL code into the targeted bank’s website, which allows a bypass of the victim’s two-factor authentication and infects the victim with a mobile malware. The malware then automatically transfers money out of the victims account and hides any traces of the transfer. If you notice unusual activity in your bank account orfalse

What You Need To Know About This New Bank Threat

Social Engineering , Phishing

Michelle Drolet

Sophos Researcher James Wyke recently did an analysis of the malware Vawtrak. He found that Vawtrak has been targeting financial institutions, especially banks. Vawtrak injects a DLL code into the targeted bank’s website, which allows a bypass of the victim’s two-factor authentication and infects the victim with a mobile malware. The malware then automatically transfers money out of the victims account and hides any traces of the transfer. If you notice unusual activity in your bank account orfalse