Save the Date: Information Security Summit 2016

By Michelle Drolet . 14 Mar 2016

Click here for more information & to register! Please save the date and plan to  join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Towerwall Security Alert Vol 13.05 – IRS Alerts Payroll and HR Professionals to Phishing Scheme Involving W-2s

By Michelle Drolet . 8 Mar 2016

WASHINGTON –  The Internal Revenue Service today issued an alert to payroll and human resources professionals to beware of an emerging phishing email scheme that purports to be from company executives and requests personal information on employees. The IRS has learned this scheme part of the surge in phishing emails seen this year already has … Continue reading Towerwall Security Alert Vol 13.05 – IRS Alerts Payroll and HR Professionals to Phishing Scheme Involving W-2s

DROWN attack sinks security for millions of websites

By Michelle Drolet . 8 Mar 2016

Security researchers reveal new technique to break TLS using SSLv2 server. The war to close down security vulnerabilities is never-ending, but the new “DROWN” vulnerability is one of the biggest to rear its ugly head in recent months. A group of security researchers from a number of different universities and research institutes just unveiled this … Continue reading DROWN attack sinks security for millions of websites

Create a data recovery plan and secure your network

By Michelle Drolet . 22 Feb 2016

Following the Center for Internet Security’s best practices.   We discussed building malware defenses the last time out, but today we’re going to focus on Critical Security Controls 10, 11, and 12 covering data recovery, secure network configuration, and boundary defense. It’s unrealistic to think that you can completely avoid cyberattacks and data breaches, so … Continue reading Create a data recovery plan and secure your network

Compliance    eBook Series   

2015 International Compendium of Data Privacy Laws

By Michelle Drolet . 16 Feb 2016

Privacy and data protection issues confront all organizations—whether you handle employee information, credit card data, sensitive financial information, or trade secrets. Securing data is a daunting task that is further complicated by cross-border transfer issues and the differences in privacy laws around the world. The team at BakerHostetler has developed a prompt and practical PDF … Continue reading 2015 International Compendium of Data Privacy Laws

10 Things I Know About…Hiring a vCISO

By Michelle Drolet . 15 Feb 2016

10. A hedge against a breach A virtual chief information security officer can serve as security consul or as an interim CISO to fill the gaps during a planned information-technology security policy review. Better to be safe than sorry.   9. High talent at low costs As a temp hire, a vCISO offers flexibility and … Continue reading 10 Things I Know About…Hiring a vCISO

5 cybersecurity trends to watch for in 2016

By Michelle Drolet . 4 Feb 2016

As threats evolve and grow more sophisticated, securing IT systems is more important than ever.   We may welcome in the New Year with open arms, but we must also prepare for the cybersecurity threats ahead of us. The 2015 Cost of Data Breach Study from IBM and the Ponemon Institute put the average cost … Continue reading 5 cybersecurity trends to watch for in 2016

Ransomware is only getting worse. How do you prepare for it?

By Michelle Drolet . 4 Feb 2016

Ransomware-as-a-service, help desks, third parties — all point to a mature yet illegal enterprise undergoing serious growth. Here are tips to protect yourself and your company.   Ransomware is big business. Over the last few years we’ve observed the steady rise of ransomware, with some trepidation. It is fast becoming a multi-billion dollar business, and … Continue reading Ransomware is only getting worse. How do you prepare for it?

Join us for Security BSides Boston 2016

By Michelle Drolet . 21 Jan 2016

Friday, May 20 2016 (Training)Saturday, May 21 2016 (Conference) Follow BSidesBoston on Twitter: #BSidesBOS @BsidesBoston @MicrosoftNERD Questions: help@bsidesboston.org When: Friday, May 20th, 2016, TBD (Training)Saturday, May 21st, 2016, 9am – 6pm (Conference) Saturday, May 21st, 2016, 9am – 6pm (Conference) Where: Microsoft NERD, 1 Memorial Drive, Cambridge, MA Hotel Room Block: TBD Cost: $20 (This is … Continue reading Join us for Security BSides Boston 2016

5 Information Security Trends for 2016

By Michelle Drolet . 20 Jan 2016

Online security trends continue to evolve. This year, online extortion will become more prevalent. We also expect that at least one consumer-grade IoT smart device failure will be lethal.  Ransomware will make further inroads, since the majority go unreported. China will drive mobile malware growth to 20M, and cybercrime legislation will take a significant step … Continue reading 5 Information Security Trends for 2016

Page 6 of 23« First...234567891011...20...Last »

Tags