‘Get Smart’ when it comes to using cloud-based services for file sharing

By Michelle Drolet . 10 Sep 2015

Encrypting data on your own might be the smartest move.   For those of you old enough to remember the TV comedy series “Get Smart” featuring a spy that used his shoe for a phone, the good guys belonged to an agency called “Control,” and the bad guys were affiliated with “Chaos.” This month “Get … Continue reading ‘Get Smart’ when it comes to using cloud-based services for file sharing

10 Things I Know About… Mass. data security rules

By Michelle Drolet . 31 Aug 2015

10. You need a WISP. A written information security policy, or WISP, is vital. Make sure there’s a person in charge of enforcing it. 9. Always encrypt data. Sensitive data, especially personally identifiable information, must be encrypted at all times, from the server, to the cloud, to a laptop or USB drive. 8. Check your … Continue reading 10 Things I Know About… Mass. data security rules

Why every business needs a WISP

By Michelle Drolet . 19 Aug 2015

Non-compliance is a risk, and the Attorney General’s office carries a big stick for those who don’t follow the rules.   If you don’t have a written information security program (WISP) in place for your business, then you could be risking data theft, legal action, and punitive fines. The law in many states now dictates … Continue reading Why every business needs a WISP

Towerwall Security/Vulnerability Alert Vol 13.96

4 Aug 2015

 The “Stagefright” hole in Android – what you need to know Provided by Paul Ducklin at Sophos, Inc. The conference circuit can be a competitive arena, especially when there are multiple parallel streams. For example, back in 2010, I was at Black Hat in Las Vegas, and I attended the talk next door to the late Barnaby Jack’s now legendary … Continue reading Towerwall Security/Vulnerability Alert Vol 13.96

Join Towerwall at the ISSA New England September Chapter Meeting

By Michelle Drolet . 29 Jul 2015

Join us at the the Fall meeting of the ISSA of New England on: Thursday, September 17, 2015 11:00 AM to 3:30 PM @Showcase Cinema de Lux at Patriot Place – Gillette Stadium, Route 1, Foxborough, MA Click here for more information on the ISSA, Speakers and Keynote topics Click here to Register   About ISSA … Continue reading Join Towerwall at the ISSA New England September Chapter Meeting

Software vulnerabilities hit a record high in 2014, report says

By Michelle Drolet . 28 Jul 2015

Are you patching quickly enough?   How safe is the software you use? Do you have a system in place to identify vulnerabilities and patch them when they are discovered? How quickly do you react to vulnerability reports? There’s evidence that software vulnerabilities are on the rise, and few companies are taking the necessary action … Continue reading Software vulnerabilities hit a record high in 2014, report says

Using third-party vendors? Keep a close eye on them

By Michelle Drolet . 10 Jul 2015

Cybersecurity is only as strong as the weakest link. If your organization is using third-party vendors, policing their activity is critical to cybersecurity. Few can forget the theft of 110 million customer credit cards from Target in December 2013. But not as many know how hackers gained access to such a vast amount of sensitive … Continue reading Using third-party vendors? Keep a close eye on them

Cyberattack   

Don’t be mad at ransomware attackers, be grateful

By Michelle Drolet . 7 Jul 2015

Falling victim to a ransomware attack is most definitely inconvenient, but it could also serve as a wake-up call to the importance of backing up important data.   You’re minding your own business, sitting at your office computer. Suddenly, a pop-up appears – with the logo of the FBI – warning that you’re under investigation … Continue reading Don’t be mad at ransomware attackers, be grateful

Another Successful Information Security Summit

By Michelle Drolet . 19 Jun 2015

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in  diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to … Continue reading Another Successful Information Security Summit

Securing Your Future with a Virtual CISO

By Michelle Drolet . 17 Jun 2015

The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety, and a widening gap in the skills required to identify and combat them. Having someone that knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and ensuring compliance, requires the right level of expertise. Many … Continue reading Securing Your Future with a Virtual CISO

Page 9 of 24« First...567891011121314...20...Last »

Tags