Michelle Drolet interviewed on “Today’s security challenges” in recent TechTarget E-Handbook

By Michelle Drolet . 10 May 2017

Channel partners can make arguments for the integrated security suite and the best-in-class point product method, but the decision ultimately rests on a customer’s specific needs.   “Security is not one-size-fits-all, so it depends on the type of organization and what their risk tolerance level is,” said Michelle Drolet, CEO at Towerwall Inc., a data … Continue reading Michelle Drolet interviewed on “Today’s security challenges” in recent TechTarget E-Handbook

10 Things I Know About… Ransomware Protection

By Michelle Drolet . 11 May 2016

10. Backup files every night. If you can access yesterday’s files, then there is no need to pay to unlock them today. 9. Patch automatically. Make sure operating systems software on all devices (phones, tablets, laptops) and browsers are patched automatically with security updates. 8. Update software. Make sure your endpoints and network devices are … Continue reading 10 Things I Know About… Ransomware Protection

7 Potential Security Concerns for Wearables

By Michelle Drolet . 28 Apr 2016

Is your organization safe from all these connected devices? Wearables are rapidly invading the workplace in much the same way that smartphones did. Fitness trackers, smartwatches, head-mounted displays and other new form factors are beginning to capture the public imagination. Sales of wearable electronic devices topped 232 million in 2015, and Gartner forecasts they’ll rise … Continue reading 7 Potential Security Concerns for Wearables

The challenges of third-party risk management

By Michelle Drolet . 17 Nov 2015

Vendors and other third parties should be treated with the same level of intense scrutiny as your own in-house risk compliance mandates.   How seriously is your company treating the risk of a data breach? Have you done due diligence on all of your vendors and third-party partners? Cyberattacks can have a devastating impact in … Continue reading The challenges of third-party risk management

The evil that lurks inside mobile apps

By Michelle Drolet . 16 Oct 2015

The Enterprise is at risk from malware and vulnerabilities hiding within mobile apps. You have to test your mobile apps to preserve your security.   Mobile apps are ubiquitous now, and they offer a range of business benefits, but they also represent one of the most serious security risks ever to face the enterprise. The … Continue reading The evil that lurks inside mobile apps

Software vulnerabilities hit a record high in 2014, report says

By Michelle Drolet . 28 Jul 2015

Are you patching quickly enough?   How safe is the software you use? Do you have a system in place to identify vulnerabilities and patch them when they are discovered? How quickly do you react to vulnerability reports? There’s evidence that software vulnerabilities are on the rise, and few companies are taking the necessary action … Continue reading Software vulnerabilities hit a record high in 2014, report says

Using third-party vendors? Keep a close eye on them

By Michelle Drolet . 10 Jul 2015

Cybersecurity is only as strong as the weakest link. If your organization is using third-party vendors, policing their activity is critical to cybersecurity. Few can forget the theft of 110 million customer credit cards from Target in December 2013. But not as many know how hackers gained access to such a vast amount of sensitive … Continue reading Using third-party vendors? Keep a close eye on them

Known vulnerabilities pose biggest IT security threats

By Michelle Drolet . 29 Mar 2015

Cyber risk report cites server misconfigurations as the No. 1 vulnerability. It’s often said, “There’s nothing new under the sun.” And that appears to be the case in the world of cybersecurity where hackers most often exploit known vulnerabilities to gain access to private computer files, according to HP’s 2015 Cyber Risk Report. Maintaining strong computer security, … Continue reading Known vulnerabilities pose biggest IT security threats

Tags