Mobile Devices Get Means for Tamper-evident Forensic Auditing

By Michelle Drolet . 11 Dec 2012

Providing early evidence of tampering can shorten investigation times for breaches and audits. The convenience of mobile devices has led to their rapid proliferation in the workplace. But along with that convenience comes security and compliance issues contributing to the degeneration of trust. Risk management for mobile devices is of rising concern, particularly in highly … Continue reading Mobile Devices Get Means for Tamper-evident Forensic Auditing

Introducing Towerwall’s eBook Series with “Beware of BYOD”

By Michelle Drolet . 28 Nov 2012

Towerwall is proud to announce our eBook Series with “Beware of BYOD: How forward-thinking companies can cope with ‘Bring your own Device’” The BYOD dilemma is putting undue strain on employer-employee relations, shaking up how organizations approach IT security, posing new risks and challenges. To download your Free eBook, please visit our eBook & White … Continue reading Introducing Towerwall’s eBook Series with “Beware of BYOD”

Introducing Towerwall’s VOIP Assessment Services

By Michelle Drolet . 15 Oct 2012

Towerwall is proud to offer our new VOIP Assessment Services. Do you know if your VoIP phones and servers are segmented from the rest of your network? Even if they are, segmentation alone may not protect your voice assets. Towerwall, Inc. has developed an approach that is extremely effective in testing the security of VoIP … Continue reading Introducing Towerwall’s VOIP Assessment Services

Beware of BYOD Harming your Company

By Michelle Drolet . 23 Sep 2012

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient — employees can access important documents at home or on the road –it also creates greater security risks for businesses.   Employees’ … Continue reading Beware of BYOD Harming your Company

Microsoft discovers Chinese malware pre-installed on new PCs

By Michelle Drolet . 14 Sep 2012

Microsoft has published evidence of an extraordinary conspiracy in which potent botnet malware was apparently installed and hidden on PCs during their manufacture in China. This is a big deal, the team at Towerwall has been aware that this level of threat and exploitation existed, but none the less surprised. Read the rest of the … Continue reading Microsoft discovers Chinese malware pre-installed on new PCs

10 Things to Know Before Creating BYOD Policy

By Michelle Drolet . 5 Sep 2012

In recent years, the work place has become more mobile than ever, and the mobile worker revolution is, in large part, the reason for the rise in Bring Your Own Device (BYOD) policies. The big idea is that through the use of cloud computing-based collaboration platforms, enterprise-class companies can save a great deal of money in IT, security and … Continue reading 10 Things to Know Before Creating BYOD Policy

Why You Need A Mobile Device Policy

By Michelle Drolet . 9 Aug 2012

Whether you choose to embrace it or try to resist it, the BYOD (Bring Your Own Device) trend is set to grow. A study by Cisco Systems found that 78 percent of white-collar workers in the U.S. use a mobile device for work and 41 percent indicated that most smartphones that connect to the company … Continue reading Why You Need A Mobile Device Policy

The worst passwords you could ever choose

By Michelle Drolet . 16 Jul 2012

For those on our Security Alert and Update list we just emailed this great article by Graham Cluley on the worst possible passwords you could ever choose. Many of you know this is something we preach to our clients on a regular basis and is part of our comprehensive 4E Program. Too many internet users … Continue reading The worst passwords you could ever choose

Beware the wild west of Web applications

By Michelle Drolet . 2 May 2012

Web applications – particularly those facilitating collaboration and communication – are a boon to sales, marketing and productivity. Teams work together more effectively, salespeople enjoy better leads and marketing tools and customer service reps can more closely connect with those they serve. All of these gains, though, come at a cost: risk. By their very … Continue reading Beware the wild west of Web applications

Loss Of Customer Personal Information Damages Banks’ Credibility

By Michelle Drolet . 13 Feb 2012

On Jan. 5, federal law enforcement seized several automobiles worth about $100,000 in value. They had belonged to the former president of the Massachusetts Bank and Trust Company and were taken as restitution for his defrauding the bank in 1997. It seems that not a day passes by when news of banking-related fraud, money laundering, … Continue reading Loss Of Customer Personal Information Damages Banks’ Credibility

Tags