3 Ways to Protect Data and Control Access to It

By Michelle Drolet . 23 May 2016

Your company’s data is its crown jewels, and you must protect it all times. CIS Controls 13, 14 and 15 will help you.   Earlier we delved into disaster recovery and network security. Now it’s time to take a look at Critical Security Controls 13, 14 and 15, which cover data protection and access control. The … Continue reading 3 Ways to Protect Data and Control Access to It

Join Towerwall at these Upcoming InfoSec Events

By Michelle Drolet . 18 May 2016

We will be attending, sponsoring and hosting the following InfoSec events this Spring / Summer. Join us!   Security BSides Boston 2016 Saturday, May 21 2016 Security BSides is the first grass roots, DIY, open security conference in the world! Security BSides is a great combination of two event styles: structured anchor events and grass-roots … Continue reading Join Towerwall at these Upcoming InfoSec Events

10 Things I Know About… Ransomware Protection

By Michelle Drolet . 11 May 2016

10. Backup files every night. If you can access yesterday’s files, then there is no need to pay to unlock them today. 9. Patch automatically. Make sure operating systems software on all devices (phones, tablets, laptops) and browsers are patched automatically with security updates. 8. Update software. Make sure your endpoints and network devices are … Continue reading 10 Things I Know About… Ransomware Protection

7 Potential Security Concerns for Wearables

By Michelle Drolet . 28 Apr 2016

Is your organization safe from all these connected devices? Wearables are rapidly invading the workplace in much the same way that smartphones did. Fitness trackers, smartwatches, head-mounted displays and other new form factors are beginning to capture the public imagination. Sales of wearable electronic devices topped 232 million in 2015, and Gartner forecasts they’ll rise … Continue reading 7 Potential Security Concerns for Wearables

Bugs for cash: Bounty hunters in the new wild west of security

By Michelle Drolet . 20 Apr 2016

How security researchers and programmers hunt software bugs for cash rewards   The business of bug hunting is a potentially lucrative one for both seasoned security researchers and amateurs with an interest in hacking. It’s an area that’s gaining legitimacy thanks to official bug bounty programs and hacking contests, but there’s still a seedy underbelly … Continue reading Bugs for cash: Bounty hunters in the new wild west of security

Towerwall Information Security Alert Vol 14.07 – Watch out for April Fools scamming on Friday

By Michelle Drolet . 1 Apr 2016

Watch out for April Fools scamming on Friday by Kevin Frey Annually, businesses and organizations often put up jokes or pranks for April Fools’ Day. Google, Starbucks, Amazon, etc. are frequent participants. E.g. Last year, Amazon revamped their site to look their old, original 1999 version… and Google (known for multiples) turned its “Maps” app … Continue reading Towerwall Information Security Alert Vol 14.07 – Watch out for April Fools scamming on Friday

Hundreds of cloud apps still vulnerable to DROWN

By Michelle Drolet . 22 Mar 2016

Complacency in addressing known vulnerabilities puts users at risk   If you have even a passing interest in security vulnerabilities, there’s no chance that you missed the news about the DROWN vulnerability. It’s one of the biggest vulnerabilities to hit since Heartbleed, potentially impacting a third of all HTTPS websites. By exploiting the obsolete SSLv2 … Continue reading Hundreds of cloud apps still vulnerable to DROWN

Do you have the right person for the job?

By Michelle Drolet . 14 Mar 2016

According to Cisco’s 2015 Annual Security Report, 91 percent of companies have an executive with direct responsibility for security, but only 29 percent of them have a Chief Information Security Officer. The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety, and a widening gap in the skills required to identify … Continue reading Do you have the right person for the job?

Save the Date: Information Security Summit 2016

By Michelle Drolet . 14 Mar 2016

Click here for more information & to register! Please save the date and plan to  join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!

Towerwall Security Alert Vol 13.05 – IRS Alerts Payroll and HR Professionals to Phishing Scheme Involving W-2s

By Michelle Drolet . 8 Mar 2016

WASHINGTON –  The Internal Revenue Service today issued an alert to payroll and human resources professionals to beware of an emerging phishing email scheme that purports to be from company executives and requests personal information on employees. The IRS has learned this scheme part of the surge in phishing emails seen this year already has … Continue reading Towerwall Security Alert Vol 13.05 – IRS Alerts Payroll and HR Professionals to Phishing Scheme Involving W-2s

Page 8 of 26« First...45678910111213...20...Last »

Tags