IoT Could Be Our Downfall

By Michelle Drolet . 3 Jan 2017

We need to secure the internet of things. The internet of things (IoT) is all about connecting devices to the internet so that they can talk to each other and to us, to make life more convenient. That might mean turning on the lights when we get up, or allowing us to use our phones … Continue reading IoT Could Be Our Downfall

What is the General Data Protection Regulation and why should you care?

By Michelle Drolet . 15 Nov 2016

Find out how to prepare for new EU legislation on data collection and security In 2012, the European Commission proposed new regulations on data protection that would supersede the national laws of the 28 EU member states. It was formally approved in April this year, and it will go into effect May 25, 2018. This … Continue reading What is the General Data Protection Regulation and why should you care?

How Much Does a Data Breach Actually Cost?

By Michelle Drolet . 28 Oct 2016

The average cost of a data breach involving fewer than 10,000 records was $5 million The American public has become so inured to data breaches that it’s difficult to remember them all. Infamous breaches like the ones at Target and Sony become almost forgettable when confronted with the recently disclosed half-billion accounts compromised at Yahoo … Continue reading How Much Does a Data Breach Actually Cost?

Applying more Critical Security Controls to your organization

By Michelle Drolet . 4 Dec 2015

The last time we looked at how Critical Security Controls (CSC) can help you build your InfoSec framework, we covered getting a handle on your software and your hardware inventories. Today, we’re going to discuss the importance of continually assessing and remediating vulnerabilities, keeping a tight control of administrative privileges, and monitoring your audit logs. … Continue reading Applying more Critical Security Controls to your organization

Another Successful Information Security Summit

By Michelle Drolet . 19 Jun 2015

Once again, the Information Security Summit hosted by Towerwall and MassBay was a resounding success. Hundreds of attendees and vendors participated in  diverse data security panels and networked with industry leaders and peers. The Summit opened with Michelle Drolet, CEO of Towerwall, and Shamsi Moussav, Computer Science Professor at MassBay Community College, presenting scholarships to … Continue reading Another Successful Information Security Summit

Throw your vendor under the bus? Not quite so fast

By Michelle Drolet . 20 Mar 2015

  Tips for your third-party risk management program “Home Depot said the crooks initially broke in using credentials stolen from a third-party vendor […] Recall that the Target breach also started with a hacked vendor…” — Brian Krebs, Krebs on Security In everyday business, a complex set of external relationships is commonplace. Services, infrastructure, and … Continue reading Throw your vendor under the bus? Not quite so fast

Data Privacy Alert Vol 13.83 – Anthem Healthcare Breach

By Michelle Drolet . 11 Feb 2015

secuProvided by William Gallagher Associates Insurance Brokers, Inc. News broke last week that Anthem, the nation’s second-largest health insurance carrier, was the victim of a data breach by external hackers. This breach affects both current and potentially former clients of Anthem. WGA is monitoring the situation on an ongoing basis, and here is what we … Continue reading Data Privacy Alert Vol 13.83 – Anthem Healthcare Breach

Michelle Drolet published in NetworkWorld – Are mobile apps putting your data at risk?

By Michelle Drolet . 9 Feb 2015

Our Michelle Drolet is quoted in NetworkWorld’s article “Are mobile apps putting your data at risk?“. Read more below: Quite often, companies don’t realize that the mobile apps they use are reason for concern. Once their data is breached, they begin to investigate. However, there are telltale signs that indicate an insecure mobile app. If you know … Continue reading Michelle Drolet published in NetworkWorld – Are mobile apps putting your data at risk?

Data Privacy Alert Vol 13.82 – The GHOST vulnerability – what you need to know

By Michelle Drolet . 5 Feb 2015

The funkily-named bug of the week is GHOST. Its official moniker is the less catchy CVE-2015-0235, and it’s a vulnerability caused by a buffer overflow in a system library that is used in many, if not most, Linux distributions. A buffer overflow is where you assume, for example, that when you handle a four-byte network number written out as … Continue reading Data Privacy Alert Vol 13.82 – The GHOST vulnerability – what you need to know

Data Privacy Alert Vol 13.81 – Massive breach at health care company Anthem Inc.

By Michelle Drolet . 5 Feb 2015

Anthem, the nation’s second-largest health insurance company, is the latest target of a security breach. Eighty million customers, including the company’s own CEO, are at risk of having their personal information stolen. VPC SAN FRANCISCO – As many as 80 million customers of the nation’s second-largest health insurance company, Anthem Inc., have had their account information … Continue reading Data Privacy Alert Vol 13.81 – Massive breach at health care company Anthem Inc.

Tags