Join us for Sophos’ Upcoming Event: Today’s Threat Landscape – How to Stay Safe

8 Nov 2013

Join us for Sophos’ upcoming event: Today’s Threat Landscape – How to Stay Safe Learn how today’s cybercriminals target your computer, identity and money and get practical advice on how to combat anything that comes your way. Sophos security expert John Shierwill explore how malware threats actually work and what you can do to protect your … Continue reading Join us for Sophos’ Upcoming Event: Today’s Threat Landscape – How to Stay Safe

How to Expose Cyber-Attacks and Combat Threats

By Michelle Drolet . 31 Oct 2013

Published by Michele Drolet, CEO of Towerwall Proper analysis will flag suspicious behavior and allow the IT department to assess the threat and take action to close it down Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard … Continue reading How to Expose Cyber-Attacks and Combat Threats

Towerwall’s Michelle Drolet on Fox 25 to Present MassBay Scholarship Foundation with $10,000 Donation

By Michelle Drolet . 17 Oct 2013

Boston News, Weather, Sports | FOX 25 | MyFoxBoston We are delighted to provide $10,000 to the MassBay Scholarship Foundation so the next generation can become cyber security experts. To learn more about the MassBay Foundation and the Information Security Summit Scholarship, click here.

How Can you Expose Targeted Attacks and Combat APTs?

By Michelle Drolet . 15 Oct 2013

Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. The risk is that security is breached, typically through manipulation of employees using a technique … Continue reading How Can you Expose Targeted Attacks and Combat APTs?

Critical fixes for Office, Outlook and IE in September Patch Tuesday

By Michelle Drolet . 11 Sep 2013

Windows admins will have their hands full with the large number of security updates in this month’s Patch Tuesday. There are fixes for 47 vulnerabilities in 13 bulletins for September’s Patch Tuesday cycle. Four of this month’s bulletins are critical. This year’s total for bulletins is up to 79, a considerable increase from 62 at … Continue reading Critical fixes for Office, Outlook and IE in September Patch Tuesday

Phone 5S Phishing Mail Arrives in time for launch.

By Michelle Drolet . 11 Sep 2013

While millions of mobile users are anticipating the launch of the new iPhone (5S and 5C), cybercriminals are already making their move to distribute spam that promise to give away the said devices for free, in the guise of a contest. We saw samples of spammed messages that attempted to spoof an Apple Store email … Continue reading Phone 5S Phishing Mail Arrives in time for launch.

10 Things I Know About… Mobile Security

By Michelle Drolet . 5 Aug 2013

10. Malware Is On The Rise The threat of malware on mobile platforms is growing steadily as more cybercriminals target mobile devices in increasingly sophisticated ways. 9. BYOD Is A Challenge There are obvious benefits to the BYOD (Bring Your Own Device) trend, but it also creates IT challenges and exposes your company to new … Continue reading 10 Things I Know About… Mobile Security

Read the EDA’s Report on Malware Infections

By Michelle Drolet . 29 Jul 2013

Read the EDA’s Report on Malware Infections – Malware Infections on EDA’s Systems Were Overstated and the Disruption of IT Operations Was Unwarranted Click here to read.

Four Steps to Respond & Recover from Sophisticated Security Attacks

By Michelle Drolet . 29 Jul 2013

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated … Continue reading Four Steps to Respond & Recover from Sophisticated Security Attacks

New LinkedIn E-Mail Scam

By Michelle Drolet . 3 Jul 2013

Hi all, there is an e-mail scam doing the rounds. The message is an invite from some random person you won’t know with a link (how original). If you get such a message don’t use the link, check your LinkedIn account as if it’s a legit request it will be there waiting for approval. Even … Continue reading New LinkedIn E-Mail Scam

Tags