10 Things I Know About Business Security

By Michelle Drolet . 19 Jan 2016

10. Everything is connected. As the Internet of Things adds more and more devices to our networks, it creates more doors and windows for cyber criminals. Keep them locked. 9. Ransomware is on the rise. If you don’t want to end up paying to access your own data, then make sure that you protect it … Continue reading 10 Things I Know About Business Security

Join us for the ISSA New England Virtual Chapter Meeting – January 21, 2016

By Michelle Drolet . 12 Jan 2016

The ISSA of New England’s 2nd annual virtual chapter meeting will be on: Thursday, January 21 at 12:00 Noon. ( Yes, while you eat lunch you can join us online. ) Careers in Cyber Security is the theme of this meeting. The most pressing problem in security is for sure the lack of qualified people … Continue reading Join us for the ISSA New England Virtual Chapter Meeting – January 21, 2016

Cyberattack    Hacking   

The Worst Hacks of 2015

By Michelle Drolet . 5 Jan 2016

Hacking and data breaches weren’t just the norm, but they reached far and wide, hitting victims of all kinds, from regular consumers, to government employees, and even children and cheaters. It seemed like no one was spared. The Worst Hacks of 2015…drum roll please! Israel Government Allegedly Hacks Kaspersky Lab The Massive Breach at OPM, … Continue reading The Worst Hacks of 2015

Ransomware Featured on the Today Show

By Michelle Drolet . 4 Jan 2016

A “ransomware” segment was recently on NBC’s  Today featuring our security partner Sophos. To learn more about ransomware. click the thumbnail below:    

Corporate    Cyberattack   

Building malware defenses: Control email, web browsers, and ports

By Michelle Drolet . 4 Jan 2016

Another staple in a series examining the Center for Internet Security’s best practices.   Our last article looked at applying Critical Security Controls 4, 5, and 6 to your organization, covering vulnerability assessment, administrative privileges, and audit logs. Now it’s time to move on to CSCs 7, 8, and 9. Email programs and web browsers … Continue reading Building malware defenses: Control email, web browsers, and ports

Applying more Critical Security Controls to your organization

By Michelle Drolet . 4 Dec 2015

The last time we looked at how Critical Security Controls (CSC) can help you build your InfoSec framework, we covered getting a handle on your software and your hardware inventories. Today, we’re going to discuss the importance of continually assessing and remediating vulnerabilities, keeping a tight control of administrative privileges, and monitoring your audit logs. … Continue reading Applying more Critical Security Controls to your organization

Towerwall Donates $7K to MassBay Foundation

By Michelle Drolet . 2 Dec 2015

Originally posted on MetroWest Daily News. Towerwall, a Framingham-based network security and policy management company, donated $7,000 to the MassBay Foundation to sponsor student scholarships. Towerwall CEO Michelle Drolet, who is also a board member of the MassBay Foundation, presented MassBay interim president Yves Salomon-Fernandez, MassBay chief information officer Michael Lyons and MassBay vice president … Continue reading Towerwall Donates $7K to MassBay Foundation

Four Signs your mobile app may be at risk

By Michelle Drolet . 23 Nov 2015

How can you make sure the mobile apps you access are secure? A security profile should be at the top of the developer’s list when compiling a mobile app but that’s hardly the case. That’s a pity, because building a profile is easier to do during the dev phase. Are most mobile apps putting your … Continue reading Four Signs your mobile app may be at risk

The challenges of third-party risk management

By Michelle Drolet . 17 Nov 2015

Vendors and other third parties should be treated with the same level of intense scrutiny as your own in-house risk compliance mandates.   How seriously is your company treating the risk of a data breach? Have you done due diligence on all of your vendors and third-party partners? Cyberattacks can have a devastating impact in … Continue reading The challenges of third-party risk management

Sophos Launches Security Heartbeat To Bring Together Network, Endpoint Capabilities

By Security Partner . 9 Nov 2015

by Sarah Kuranda Sophos is launching a new technology Monday that synchronizes threat intelligence and automation across endpoint and network levels. Sophos Security Heartbeat, part of the Oxford, England-based company’s new XG firewall series, links together the company’s next-generation firewall and UTM solutions with its next-generation endpoint technologies. In doing that, the company said, it is … Continue reading Sophos Launches Security Heartbeat To Bring Together Network, Endpoint Capabilities

Page 8 of 24« First...45678910111213...20...Last »

Tags