Introducing Towerwall’s VOIP Assessment Services

By Michelle Drolet . 15 Oct 2012

Towerwall is proud to offer our new VOIP Assessment Services. Do you know if your VoIP phones and servers are segmented from the rest of your network? Even if they are, segmentation alone may not protect your voice assets. Towerwall, Inc. has developed an approach that is extremely effective in testing the security of VoIP … Continue reading Introducing Towerwall’s VOIP Assessment Services

Introducing Towerwall’s Threat Spotlight

By Michelle Drolet . 15 Oct 2012

We are proud to announce our Threat Spotlight, sign up for our Twitter feed and get the latest threats and how to protect against them.   Threat Spotlights as of October 15, 2012: AutoInf AutoInf is a component used by many malware families, notably Conficker, Sality and AutoRun. AutoInf is used to automatically run associated … Continue reading Introducing Towerwall’s Threat Spotlight

BYOD means Bring Your Own Dilemma

By Michelle Drolet . 11 Oct 2012

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient–employees can access important documents at home or on the road–it also creates greater security risks for businesses. Employees’ Devices May Not Be … Continue reading BYOD means Bring Your Own Dilemma

New Internet Explorer zero day being exploited in the wild

By Michelle Drolet . 1 Oct 2012

After the last zero day exploit on Java we reported some weeks ago it appears that a new 0day has been found in Internet Explorer by the same authors that created the Java one. Yesterday, Eric Romang reported the findings of a new exploit code on the same server that the Java 0day was found some … Continue reading New Internet Explorer zero day being exploited in the wild

Microsoft Windows Update emails try to steal your Gmail, Yahoo, AOL passwords…

By Michelle Drolet . 1 Oct 2012

Beware any emails which claim to come from privacy@microsoft.com – it could be that you’re being targeted in an attack designed to steal your AOL, Gmail, Yahoo or Windows Live password. At first glance, if you don’t look too carefully, the emails entitled “Microsoft Windows Update” may appear harmless enough. But the grammatical errors and … Continue reading Microsoft Windows Update emails try to steal your Gmail, Yahoo, AOL passwords…

Webinar: Separation of Corporate and Personal: Best Practices for Securing Data on Mobile Devices

By Michelle Drolet . 25 Sep 2012

As the BYOD trend gains momentum, not all employees are comfortable having their personal phones locked down and controlled as tightly as a corporate-issued device. To get around this issue some organizations are turning to separation techniques to securely manage corporate email, apps, and docs on employee devices while keeping personal data out of sight … Continue reading Webinar: Separation of Corporate and Personal: Best Practices for Securing Data on Mobile Devices

Microsoft discovers Chinese malware pre-installed on new PCs

By Michelle Drolet . 14 Sep 2012

Microsoft has published evidence of an extraordinary conspiracy in which potent botnet malware was apparently installed and hidden on PCs during their manufacture in China. This is a big deal, the team at Towerwall has been aware that this level of threat and exploitation existed, but none the less surprised. Read the rest of the … Continue reading Microsoft discovers Chinese malware pre-installed on new PCs

10 Things to Know Before Creating BYOD Policy

By Michelle Drolet . 5 Sep 2012

In recent years, the work place has become more mobile than ever, and the mobile worker revolution is, in large part, the reason for the rise in Bring Your Own Device (BYOD) policies. The big idea is that through the use of cloud computing-based collaboration platforms, enterprise-class companies can save a great deal of money in IT, security and … Continue reading 10 Things to Know Before Creating BYOD Policy

Introducing our Security Training Toolkit

By Michelle Drolet . 4 Sep 2012

A customizable security training program for your review. We’re giving you all the tools you need to keep your employees out of trouble. Whether you’re starting a program from scratch, or just in need of some refresher materials, we’ve got you covered. Here’s whats included in the Towerwall Security Training Toolkit: Program launch guide Employee … Continue reading Introducing our Security Training Toolkit

Hackers leak 1 million Apple device IDs

By Michelle Drolet . 3 Sep 2012

To cap off a summer of devastating corporate data breaches, hackers yesterday posted online what might be the crown jewel of 2012 data dumps: 1 million identification numbers for Apple iPhones, iPads and iPod Touch’s, all purportedly stolen from the FBI. There may also be an additional 11 million Apple device IDs yet to be … Continue reading Hackers leak 1 million Apple device IDs

Tags