10 Things I Know About… Mobile Security

By Michelle Drolet . 5 Aug 2013

10. Malware Is On The Rise The threat of malware on mobile platforms is growing steadily as more cybercriminals target mobile devices in increasingly sophisticated ways. 9. BYOD Is A Challenge There are obvious benefits to the BYOD (Bring Your Own Device) trend, but it also creates IT challenges and exposes your company to new … Continue reading 10 Things I Know About… Mobile Security

Four Steps to Respond & Recover from Sophisticated Security Attacks

By Michelle Drolet . 29 Jul 2013

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated … Continue reading Four Steps to Respond & Recover from Sophisticated Security Attacks

Views from the Inside: Is your data safe with free cloud services? (guest post)

By Michelle Drolet . 12 Jul 2013

The overwhelming advantages of cloud-based file storage are not in dispute. You have an automatic backup of your files, which can be accessed on any device, at any time. Small amounts of storage are generally free, and large swathes of server space are coming down in price all the time. They absolve your business from … Continue reading Views from the Inside: Is your data safe with free cloud services? (guest post)

New LinkedIn E-Mail Scam

By Michelle Drolet . 3 Jul 2013

Hi all, there is an e-mail scam doing the rounds. The message is an invite from some random person you won’t know with a link (how original). If you get such a message don’t use the link, check your LinkedIn account as if it’s a legit request it will be there waiting for approval. Even … Continue reading New LinkedIn E-Mail Scam

Facebook leaks are a lot leakier than Facebook is letting on

By Michelle Drolet . 28 Jun 2013

Remember last week, Facebook leaked email addresses and phone numbers for 6 million users, but that it was really kind of a modest leak, given that it’s a billion-user service? OK, scratch the “modest” part. The researchers who originally found out that Facebook is actually creating secret dossiers for users are now saying the numbers … Continue reading Facebook leaks are a lot leakier than Facebook is letting on

Introducing Towewall’s Alternative Cloud-based File Sharing Solutions

By Michelle Drolet . 27 Jun 2013

Towerwall is proud to offer our new Alternative Cloud-based File Sharing Solutions Cloud based file synchronization services have exploded. Organizations need to be able to provide a modern collaboration experience with the infrastructure that they’ve already invested in, and that they already know how to manage and protect. Watch the video below for more:     … Continue reading Introducing Towewall’s Alternative Cloud-based File Sharing Solutions

Tips for testing your mobile app security

By Michelle Drolet . 26 Jun 2013

Wherever an app originates from, it is vital that you can vouch for its security before it is circulated The enterprise has gone mobile and there’s no turning back. And while the BYOD movement has received plenty of attention, IT departments are getting a handle on the security risks of personal mobile devices in the workplace. The … Continue reading Tips for testing your mobile app security

Towerwall and the Information Security Summit highlighted in SearchSecurity.com Article

By Michelle Drolet . 7 Jun 2013

Check out Search Security’s article – “HIPAA Omnibus Rule, PPACA challenge enterprise compliance management”, where our own Natalie Kmit and the Information Security Summit 2013 are highlighted:   HIPAA Omnibus Rule, PPACA challenge enterprise compliance management WELLESLEY, Mass. — For information security professionals, compliance-related tasks have often proved to be a trying yet necessary part of the … Continue reading Towerwall and the Information Security Summit highlighted in SearchSecurity.com Article

Free Security Tools, Apps, and Widgets

By Michelle Drolet . 5 Apr 2013

Our friends at Trend Micro offer a range of free tools, apps and widgets to protect your devices and help you manage your online activity. You can check them out and download them for free on our Security Tools, Apps, and Widgets Page.

Top Ten Malicious Lists

By Michelle Drolet . 2 Apr 2013

Top Ten Malicious URLs Top 10 malicious URLs blocked by the Trend Micro™ Smart Protection Network™ infrastructure in 2012 Top Ten Malicious URLs Top 10 malicious URLs blocked by the Trend Micro™ Smart Protection Network™ infrastructure in 2012.   Top Ten Spammers Top 10 spam-sending countries in 2012. Rank Country 1 India 2 Saudi Arabia … Continue reading Top Ten Malicious Lists

Tags