Cybersecurity is only as strong as your weakest link—your employees

By Michelle Drolet . 28 Jul 2016

Stay on top of account management and assess staff security skills with CIS Controls 16 and 17   You can have the most secure system in the world, but hackers will always seek out the path of least resistance. When your defenses are good, the weak link is often your employees. Data breaches are most … Continue reading Cybersecurity is only as strong as your weakest link—your employees

Another Successful Information Security Summit

By Michelle Drolet . 19 Jun 2015

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in  diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to … Continue reading Another Successful Information Security Summit

What can the military teach us about cybersecurity?

By Michelle Drolet . 14 May 2015

Teaching the workforce to create a heightened state of awareness. It’s time for the business world to toughen up on security. The threat from cybercriminals is pervasive. Successful attacks on financial institutions, large retailers, and even government bodies, are all too common. There’s a reason that the Worldwide Threat Assessment of the US Intelligence Community … Continue reading What can the military teach us about cybersecurity?

Throw your vendor under the bus? Not quite so fast

By Michelle Drolet . 20 Mar 2015

  Tips for your third-party risk management program “Home Depot said the crooks initially broke in using credentials stolen from a third-party vendor […] Recall that the Target breach also started with a hacked vendor…” — Brian Krebs, Krebs on Security In everyday business, a complex set of external relationships is commonplace. Services, infrastructure, and … Continue reading Throw your vendor under the bus? Not quite so fast

The 4 Es of Enterprise Security

By Michelle Drolet . 15 Dec 2014

Building a solid security program takes time. Every organization is different. It’s very important to assess your technology, and consider both internal and external threats. An assessment will reveal vulnerabilities. The remediation process will help you take full advantage of your existing security assets and point you at any gaps that need filling. Even once … Continue reading The 4 Es of Enterprise Security

The Cybersecurity Skills Gap

By Michelle Drolet . 9 Dec 2014

The information security profession, which evolved largely in reaction to threats, is now paying the price of an entire “missing generation.” Companies are challenged finding pros with the combination of business and technical savvy that is needed to combat growing threats. Compounding this problem, educational institutions are not graduating enough students with the necessary skills … Continue reading The Cybersecurity Skills Gap

Cork That App or Face Attack

By Michelle Drolet . 1 Aug 2014

Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. … Continue reading Cork That App or Face Attack

Deciding Between Vulnerability Scanning And Penetration Testing

By Michelle Drolet . 8 May 2014

My clients often confuse scanning and penetration testing. Organisations should be conducting both external vulnerability scans and penetration tests. If you are storing or transmitting data on the Internet, particularly sensitive data such as credit card details, then quarterly scanning is required to validate your PCI compliance. You also need to conduct a penetration test … Continue reading Deciding Between Vulnerability Scanning And Penetration Testing

Introducing Towerwall’s VOIP Assessment Services

By Michelle Drolet . 15 Oct 2012

Towerwall is proud to offer our new VOIP Assessment Services. Do you know if your VoIP phones and servers are segmented from the rest of your network? Even if they are, segmentation alone may not protect your voice assets. Towerwall, Inc. has developed an approach that is extremely effective in testing the security of VoIP … Continue reading Introducing Towerwall’s VOIP Assessment Services

Tags