10 Things I Know About: Pot Compliance

By Michelle Drolet . 11 Oct 2016

10) Nothing hazy about the laws Marijuana (or cannabis) is one of the most highly regulated industries in the world, and Massachusetts has the strictest rules governing its production, retailing, grow, testing and security operations. 9) You can be raided. Marijuana businesses must comply with federal, state, city and county regulations and requirements. Despite medical-use … Continue reading 10 Things I Know About: Pot Compliance

Join us for our inaugural InfoSec at Your Services Meetup – Wednesday, October 19, 2016

By Michelle Drolet . 11 Oct 2016

Join us for our inaugural InfoSec at Your Services Meetup!   When: Wednesday, October 19, 2016 6:30 PM to 8:00 PM Where: Margaritas Mexican Restaurant 725 Cochituate Rd , Framingham, MA We will discuss: Risk Communication Strategy – This biggest risk is the uncommunicated one. Hoarding knowledge doesn’t make you the smartest person in the … Continue reading Join us for our inaugural InfoSec at Your Services Meetup – Wednesday, October 19, 2016

Always be Prepared: Monitor, Analyze and Test your Security

By Michelle Drolet . 11 Oct 2016

Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20   This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet Security (CIS) as best practices to help the public and private sectors tighten their cybersecurity. We started down … Continue reading Always be Prepared: Monitor, Analyze and Test your Security

Towerwall’s Blog named to the Best Computer Security Blogs 2016 by CreditDonkey

By Michelle Drolet . 27 Sep 2016

We are honored to share that our blog was named as a Top Computer Security Blogs 2016 by CreditDonkey.   CreditDonkey sites: “Business owners who want the latest information on the world of digital security will appreciate this blog’s straightforward approach to news and advice.” We are excited to share the list with some of our … Continue reading Towerwall’s Blog named to the Best Computer Security Blogs 2016 by CreditDonkey

Does the NSA have a duty to disclose zero-day exploits?

By Michelle Drolet . 26 Sep 2016

The NSA should disclose all zero-day exploits. But it doesn’t.   To say the National Security Agency (NSA) prefers to lay low and shuns the limelight is an understatement. One joke said about the secretive group, widely regarded as the most skilled state-sponsored hackers in the world, is NSA actually stands for “No Such Agency.” … Continue reading Does the NSA have a duty to disclose zero-day exploits?

Hired guns: The rise of the virtual CISO

By Michelle Drolet . 19 Aug 2016

When is the right time to rent yourself a CISO? The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety—and a widening gap in the skills required to identify and combat them. Having someone who knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and … Continue reading Hired guns: The rise of the virtual CISO

Cybersecurity is only as strong as your weakest link—your employees

By Michelle Drolet . 28 Jul 2016

Stay on top of account management and assess staff security skills with CIS Controls 16 and 17   You can have the most secure system in the world, but hackers will always seek out the path of least resistance. When your defenses are good, the weak link is often your employees. Data breaches are most … Continue reading Cybersecurity is only as strong as your weakest link—your employees

Marijuana Industry Brings Compliance to a High Bar

By Michelle Drolet . 10 Jul 2016

Ensuring overall compliance with strict regulations is the next growth opportunity.   Whatever you think of it, marijuana is here to stay and coming to full legalization in a state nearest you. Controversy follows cannabis into every branch of society: political, cultural, science, health, education, legal and finance. A quick search on YouTube will show … Continue reading Marijuana Industry Brings Compliance to a High Bar

8 Tips to Secure Those IoT Devices

By Michelle Drolet . 20 Jun 2016

Make sure the Internet of Things isn’t a route for hackers to get into your home or workplace   As more and more Internet-connected devices find their way into our homes and businesses, it’s important to remember that they represent a security risk. The Internet of Things (IoT) is growing rapidly, and in the rush … Continue reading 8 Tips to Secure Those IoT Devices

5 InfoSec concerns for colleges and universities

By Michelle Drolet . 14 Jun 2016

Higher education institutions are a prime target for cybercriminals, and IT needs resources to prevent attacks and provide a proper level of security   No industry or sector is immune to data breaches, but some are targeted more often than others. Education came ahead of government, retail and financial sectors, and it was second only … Continue reading 5 InfoSec concerns for colleges and universities

Tags