Towerwall's InfoSec Blog

Content Type

See all

Join Towerwall & Sophos for "The End of Ransomware" Webinar

Sophos , Towerwall , Webinar , ransomware , Compliance & Privacy , penetration testing , Events , cannabis , Enterprise

Michelle Drolet

"Those within cyber security circles know ransomware has become a lucrative billion dollar business for an army of cybercriminals…It’s time you learn about the tricks and trade of cybercriminals and how their threats are constantly evolving."- John Shaw, Vice President, Enduser Security Group, Sophos Please join Towerwall and Sophos for an exclusive lunch and learn. You'll find out about:

Michelle Drolet featured in WBJ: Building Walls and Breaking Barriers

Towerwall , cannabis security , Michelle Drolet , Worcester Business Journal , cannabis compliance , Phishing , GDPR , PCI , malware , ransomware , HIPAA , Compliance & Privacy , penetration testing , Compliance , 2016 Outstanding Women in Business , cannabis , Enterprise

Michelle Drolet

Michelle Drolet, CEO of Towerwall in Framingham, is an innovative thinker. Never one to shy away from looking at new factors that come into a situation with an open perspective, she has a few things she's learned about good management and good leadership along the way. First, she delegates more. "When I first started, it was all about internal, and we had to do it all. As I've gotten older, I'm able to hand things over and say, 'We can't do that well, but I know they can do that well,'" Droletfalse

Towerwall's Candy Alexander Receives 2014 ISSA Award for "Hall of Fame"

Data Security , Towerwall , ISSA International Awards , CISO , Information Security , ISSA International Conference , Security , cybersecurity , ISSA , Enterprise

Michelle Drolet

We are proud to announce that our own Candy Alexander will receive the ISSA "Hall of Fame" Award. See below for more information: Honoree to be Recognized Among RSA Founders at ISSA International Conference on Oct. 22 in Orlando BOSTON, MA--(Marketwired - Oct 9, 2014) - Towerwall (www.towerwall.com), an IT security services provider for small to mid-size businesses, today announced that Candy Alexander, CISSP CISM, GRC Consultant for Towerwall, been inducted into the Hall of Fame by thefalse

More Devices, More Problems.

Unsecured Wi-Fi , network security , Data Security , IT Infrastructure , BYOD , Towerwall , Mobile Devices , Security Threat , Smartphone , Information Security , Application Security , Security , Mac , malware , Encryption , Mobile Apps , Cloud Security , Tablets , cloud services , Mobile Protection , Mobile Security , Data Breach

Michelle Drolet

Check out this infographic for the numbers behind BYOD.

MetroWest Chamber of Commerce: 118th Annual Meeting

Data Security , Towerwall , Security Threat , Information Security , Security , Hackers , cybercriminals , Events , cybersecurity

Michelle Drolet

Well, it was certainly a night to remember and much to celebrate With over 325+ people coming to celebrate the 118th MetroWest Chamber of Commerce Annual Meeting! It was a great night with much money raised for United Way’s Feed a Family and our hero's - Military Veterans. Watch some of the fun we had:

Towerwall's Michelle Drolet on Fox 25 to Present MassBay Scholarship Foundation with $10,000 Donation

Security Partners , Data Security , Towerwall , Michelle Drolet , MassBay , Security Program , Information Security , Security , Information Security Summit , cybercriminals , Events , information security tips , Fox 25 , Data Privacy , Scholarship , cybersecurity , Data Breach

Michelle Drolet

Boston News, Weather, Sports | FOX 25 | MyFoxBoston We are delighted to provide $10,000 to the MassBay Scholarship Foundation so the next generation can become cyber security experts. To learn more about the MassBay Foundation and the Information Security Summit Scholarship, click here.

Could Syria Launch a Major Cyberattack Against the U.S.?

network security , Data Security , Towerwall , Syria , Security Regulations , Information Security , Security , Hackers , cyber-attack , cybercriminals , Security Alert , cybersecurity , Data Breach

Michelle Drolet

Cyber-attacks take many forms, from cybercrime, to hacktivism, to cyber warfare, and espionage. We’re all used to hearing about phishing attacks and the threat of malware, but organized cyber-attacks perpetrated by groups with political motivations, and sometimes affiliated with foreign governments, are on the rise, and they could represent a much graver threat. Major concerns about the threat of state-sponsored cyber-attacks on U.S. military and infrastructure have been raised repeatedly longfalse

How Can you Expose Targeted Attacks and Combat APTs?

network security , Security Services , security software , Data Security , Towerwall , Security Regulations , Security Threat , Security Program , Information Security , Application Security , Security , malware , endpoint security system , Cloud Security , cyber-attack , cybercriminals , penetration testing , financial security , information security tips , Big Data , Data Privacy , APT , vulnerability management , cybersecurity , Data Breach

Michelle Drolet

Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. The risk is that security is breached, typically through manipulation of employees using a technique such as spear phishing, and existing security systems are unable to detect the attack. Data can be harvested forfalse

Introducing Towewall's Alternative Cloud-based File Sharing Solutions

Security Partners , network security , Security Services , security software , Data Security , Towerwall , Security Regulations , threat landscape , Security Program , Information Security , Application Security , Security , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , information security tips , cloud services , Big Data , Data Privacy , cybersecurity , Data Breach

Michelle Drolet

Tips for testing your mobile app security

Security Partners , Security Services , Data Security , Towerwall , Security Regulations , Mobile Devices , Security Threat , Security Program , Information Security , Application Security , Security , Mobile Apps , Hackers , Cloud Security , cyber-attack , security policy , cybercriminals , penetration testing , information security tips , cloud services , Mobile Protection , vulnerability management , Mobile Security , cannabis , cybersecurity , Enterprise

Michelle Drolet

Wherever an app originates from, it is vital that you can vouch for its security before it is circulated The enterprise has gone mobile and there's no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The next challenge is " bring your own application" (BYOA), because many public app stores have serious malware problems. Enterprise app stores could be the answer. false