Michelle Drolet published in NetworkWorld – Throw your vendor under the bus after a breach? Not quite so fast

By Michelle Drolet . 15 Jan 2015

Our Michelle Drolet is quoted in NetworkWorld’s article “Throw your vendor under the bus after a breach? Not quite so fast“. Read more below: In everyday business, a complex set of external relationships is commonplace. Services, infrastructure, and even software live in the cloud, supplied by third parties. An organization’s value is often in the data it … Continue reading Michelle Drolet published in NetworkWorld – Throw your vendor under the bus after a breach? Not quite so fast

Data Security Alert Vol 13.79 – The Top Hacks of the Year

By Michelle Drolet . 5 Jan 2015

As we approach the end of the year, let’s have a look back at the top hacking incidents of 2014. This year, we might have witnessed the most damaging attack of the decade. It will not be easy beating the Sony attack. SONY On November 24th all of Sony Pictures employees’ computer screens started showing a … Continue reading Data Security Alert Vol 13.79 – The Top Hacks of the Year

The 4 Es of Enterprise Security

By Michelle Drolet . 15 Dec 2014

Building a solid security program takes time. Every organization is different. It’s very important to assess your technology, and consider both internal and external threats. An assessment will reveal vulnerabilities. The remediation process will help you take full advantage of your existing security assets and point you at any gaps that need filling. Even once … Continue reading The 4 Es of Enterprise Security

Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

By Michelle Drolet . 8 Dec 2014

The rise of malware seems to have passed some people by. As the ranks of cybercriminals grow and they find new ways to exploit our systems and steal our data, a lot of computer users and small-business owners have convinced themselves that it won’t happen to them. Here are five common excuses that explain why … Continue reading Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

Towerwall Security Alert V13.79 – How to clear out cookies, Flash cookies and local storage

By Michelle Drolet . 5 Dec 2014

by Mark Stockley This quick fix will show you how to clear out cookies and the cookie-like things that can be used to track you online. If you already know what cookies are all about then you can skip the next bit and go straight to the instructions. Why cookies are important Cookies are very small … Continue reading Towerwall Security Alert V13.79 – How to clear out cookies, Flash cookies and local storage

Towerwall Information Security Update Vol 13.78 – 3 ways to make your Outlook.com account safer

By Michelle Drolet . 31 Oct 2014

3 ways to make your Outlook.com account safer by John Hawes   Following on from our detailed guide to securing your webmail, here’s a quick breakdown of how to make the most important fixes for users of Microsoft’s Outlook.com (formerly known as Hotmail and, for a while, Windows Live Hotmail). Controls affecting Outlook.com security are mainly found … Continue reading Towerwall Information Security Update Vol 13.78 – 3 ways to make your Outlook.com account safer

Towerwall Application Security Alert Vol 13.73

By Michelle Drolet . 6 Aug 2014

1.2 billion logins scooped up by CyberVor hacking crew – what you need to do   Hackers have amassed a vast collection of stolen data, including 1.2 billion unique username/password pairs, by compromising over 420,000 websites using SQL injection techniques. Researchers monitored the gang for over seven months, thought to be “fewer than a dozen men … Continue reading Towerwall Application Security Alert Vol 13.73

Cork That App or Face Attack

By Michelle Drolet . 1 Aug 2014

Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they have been hacked at least once in the last two years. … Continue reading Cork That App or Face Attack

Test All Apps to Keep Hackers from Penetrating Castle Walls

By Michelle Drolet . 23 Jul 2014

Four major challenges when protecting apps and how to solve them Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority also confess they … Continue reading Test All Apps to Keep Hackers from Penetrating Castle Walls

Towerwall and MassBay Host Another Successful Information Security Summit

By Michelle Drolet . 13 Jun 2014

Towerwall teamed up with MassBay Community College on May 29 to present the second annual Information Security Summit at MassBay’s Wellesley Hills campus from 8 a.m. to 1 p.m. Over 250 individuals attended the Summit where they interacted with industry experts and participated in various security panel discussions. After a presentation on the “Anatomy of a … Continue reading Towerwall and MassBay Host Another Successful Information Security Summit

Tags