The 4 Es of Enterprise Security

By Michelle Drolet . 15 Dec 2014

Building a solid security program takes time. Every organization is different. It’s very important to assess your technology, and consider both internal and external threats. An assessment will reveal vulnerabilities. The remediation process will help you take full advantage of your existing security assets and point you at any gaps that need filling. Even once … Continue reading The 4 Es of Enterprise Security

Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

By Michelle Drolet . 8 Dec 2014

The rise of malware seems to have passed some people by. As the ranks of cybercriminals grow and they find new ways to exploit our systems and steal our data, a lot of computer users and small-business owners have convinced themselves that it won’t happen to them. Here are five common excuses that explain why … Continue reading Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

Towerwall Information Security Update Vol 13.78 – 3 ways to make your Outlook.com account safer

By Michelle Drolet . 31 Oct 2014

3 ways to make your Outlook.com account safer by John Hawes   Following on from our detailed guide to securing your webmail, here’s a quick breakdown of how to make the most important fixes for users of Microsoft’s Outlook.com (formerly known as Hotmail and, for a while, Windows Live Hotmail). Controls affecting Outlook.com security are mainly found … Continue reading Towerwall Information Security Update Vol 13.78 – 3 ways to make your Outlook.com account safer

More Devices, More Problems.

By Michelle Drolet . 6 Oct 2014

Check out this infographic for the numbers behind BYOD.

1.2 billion logins scooped up by CyberVor hacking crew – what you need to do

By Michelle Drolet . 7 Aug 2014

Towerwall Application Security Alert Vol 13.73 Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. Researchers monitored the gang for over seven months, thought to be “fewer than a dozen men in their 20s who know one another personally” based in … Continue reading 1.2 billion logins scooped up by CyberVor hacking crew – what you need to do

Towerwall Application Security Alert Vol 13.73

By Michelle Drolet . 6 Aug 2014

1.2 billion logins scooped up by CyberVor hacking crew – what you need to do   Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. Researchers monitored the gang for over seven months, thought to be “fewer than a dozen men … Continue reading Towerwall Application Security Alert Vol 13.73

Test All Apps to Keep Hackers from Penetrating Castle Walls

By Michelle Drolet . 23 Jul 2014

Four major challenges when protecting apps and how to solve them Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they … Continue reading Test All Apps to Keep Hackers from Penetrating Castle Walls

10 things I know about preventing ID theft

By Michelle Drolet . 10 Jun 2014

10. Use cash or gift cards The threat of identity theft is reduced dramatically if you don’t use your credit card for all your purchases, so consider using cash or even gift cards to pay your way. 9. PCI compliance is important The payment card industry has a set of security standards for a reason: … Continue reading 10 things I know about preventing ID theft

Towerwall listed among “20 Most Promising Security Consulting Companies”

By Michelle Drolet . 2 Jun 2014

Also named to CRN’s “Women in the Channel” and “The Power 50”     BOSTON – May 12, 2014 – Towerwall (www.towerwall.com), an IT security services provider for small to mid-size businesses, today announced it was selected for inclusion in a list of the 20 “Most Promising Enterprise Security Consulting Companies.” The list was compiled … Continue reading Towerwall listed among “20 Most Promising Security Consulting Companies”

Reminder: Please join us at the Information Security Summit 2014

By Michelle Drolet . 7 May 2014

Please save the date and plan to  join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business!   May 29, 2014  8:00AM – 1:00PM MassBay Community College 50 Oakland Street  | Wellesley Hills, MA 02481 Early Bird Special: … Continue reading Reminder: Please join us at the Information Security Summit 2014

Tags