Towerwall's InfoSec Blog

Content Type

See all

10 Things I know about ... Working from home

Business Continuity , Worcester Business Journal , Phishing , ransomware , 10 Things I Know , Remote Workforce , Compliance , COVID-19 , cannabis , Enterprise

Michelle Drolet

10) Zooming out. Video conferencing is a two-edged sword; while a boon to nurture group discussion, the degree of focus paid to a small screen while feeling self-conscious (how’s my hair?) can oversaturate users. People are now reporting Zoom fatigue, citing anxiety. Identify mental health and grief counsellors who can step in during these COVID-19 times.

10 Things I know about… COVID-19 scams

Worcester Business Journal , Phishing , Coronavirus , malware , ransomware , COVID-19 , cannabis , Enterprise

Michelle Drolet

10. Pandemic panic Criminals thrive during a crisis, knowing people under stress and distraction are more prone to readily click a text or email link without thought to its legitimacy. As such, COVID-19-related phishing attacks grew 600% in the first quarter.

10 Things I Know About...Setting up a Crisis Response Plan

Worcester Business Journal , Phishing , Crisis Response Plan , malware , ransomware , 10 Things I Know , Compliance , cannabis , Enterprise

Michelle Drolet

10) Start with a plan. Companies of all shapes and sizes should draft a distinct crisis response plan. Existing disaster recovery plans or business continuity plans might not suffice.

10 Things I know about... Cybersecurity

Worcester Business Journal , Phishing , GDPR , PCI , malware , ransomware , HIPAA , 10 Things I Know , Compliance , COVID-19 , cannabis , cybersecurity , Enterprise

Michelle Drolet

10) High priority. 64% of businesses are prioritizing IT security above everything else and 80% of small and medium businesses rank IT security as a top business priority.

10 Things I Know About ... Email scams

Nigerian prince , Worcester Business Journal , Phishing , 10 Things I Know , COVID-19 , email scam , cannabis , Enterprise

Michelle Drolet

10. Nigerian prince lives. The royalty who wants to send you money is the oldest scam in the book, yet it continues to lure victims. Phishing works by creating false trust to give up log-in credentials, click a bogus URL or download a malware-infected file.

10 Things I Know About ... Cloud security

Business Continuity , Worcester Business Journal , Cloud Security , 10 Things I Know , cannabis , Enterprise

Michelle Drolet

10) Got cloud? According to Cloud Security Alliance, more than 70 percent of the world's businesses now operate in some capacity on the cloud.

10 Things I Know About… Cybersecurity trends

Virtual CISO , Worcester Business Journal , Phishing , Data breaches , PCI , malware , ransomware , cybersecurity trends , 10 Things I Know , IoT , cannabis , cybersecurity , vCISO , Enterprise

Michelle Drolet

10) Data breaches. Nearly 5 million data records are lost or stolen worldwide every single day, or 58 records every second. According to an IBM report, the average cost of a data breach is $7.3 million.

Worcester Business Journal's IT Forum Review

Worcester Business Journal , Worcester Business Journal's IT Forum , #WBJITFORUM

Michelle Drolet

Thanks to all who joined us at the Worcester Business Journal's IT Forum. We hope that you found the event informative. The following is some post event information that we thought would be helpful.

Join Michelle Drolet at the Worcester Business Journal IT Forum #WBJITFORUM

Michelle Drolet , Worcester Business Journal , #WBJITFORUM , Compliance & Privacy , penetration testing , Events , cannabis , Enterprise

Michelle Drolet

Date: October 25, 2017 Time: 3:00pm-6:30pm Location: DCU Center 50 Foster Street, Worcester Single Ticket Rate: $40.00

10 things I know about... Securing mobile devices

password protection , password , Mobile Devices , Worcester Business Journal , Phishing , 10 Things I Know , cannabis , Enterprise

Michelle Drolet

10) Always lock your screen. Unlocked phones are always going to dangerously accessible. The first line of defense is a PIN, password, pattern or a biometric measure like your fingerprint.