Introducing Towerwall’s BYOD Policy Services

15 Oct 2012

Towerwall is proud to offer our new Bring Your Own Device (BYOD) Policy Services. In recent years, the workplace has become more mobile than ever, and the mobile worker revolution is, in large part, the need for clear Bring Your Own Device (BYOD) policies. The big idea is that through the use of cloud computing-based … Continue reading Introducing Towerwall’s BYOD Policy Services

Introducing Towerwall’s VOIP Assessment Services

By Michelle Drolet . 15 Oct 2012

Towerwall is proud to offer our new VOIP Assessment Services. Do you know if your VoIP phones and servers are segmented from the rest of your network? Even if they are, segmentation alone may not protect your voice assets. Towerwall, Inc. has developed an approach that is extremely effective in testing the security of VoIP … Continue reading Introducing Towerwall’s VOIP Assessment Services

Introducing Towerwall’s Threat Spotlight

By Michelle Drolet . 15 Oct 2012

We are proud to announce our Threat Spotlight, sign up for our Twitter feed and get the latest threats and how to protect against them.   Threat Spotlights as of October 15, 2012: AutoInf AutoInf is a component used by many malware families, notably Conficker, Sality and AutoRun. AutoInf is used to automatically run associated … Continue reading Introducing Towerwall’s Threat Spotlight

BYOD means Bring Your Own Dilemma

By Michelle Drolet . 11 Oct 2012

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient–employees can access important documents at home or on the road–it also creates greater security risks for businesses. Employees’ Devices May Not Be … Continue reading BYOD means Bring Your Own Dilemma

New Internet Explorer zero day being exploited in the wild

By Michelle Drolet . 1 Oct 2012

After the last zero day exploit on Java we reported some weeks ago it appears that a new 0day has been found in Internet Explorer by the same authors that created the Java one. Yesterday, Eric Romang reported the findings of a new exploit code on the same server that the Java 0day was found some … Continue reading New Internet Explorer zero day being exploited in the wild

Microsoft Windows Update emails try to steal your Gmail, Yahoo, AOL passwords…

By Michelle Drolet . 1 Oct 2012

Beware any emails which claim to come from privacy@microsoft.com – it could be that you’re being targeted in an attack designed to steal your AOL, Gmail, Yahoo or Windows Live password. At first glance, if you don’t look too carefully, the emails entitled “Microsoft Windows Update” may appear harmless enough. But the grammatical errors and … Continue reading Microsoft Windows Update emails try to steal your Gmail, Yahoo, AOL passwords…

Webinar: Separation of Corporate and Personal: Best Practices for Securing Data on Mobile Devices

By Michelle Drolet . 25 Sep 2012

As the BYOD trend gains momentum, not all employees are comfortable having their personal phones locked down and controlled as tightly as a corporate-issued device. To get around this issue some organizations are turning to separation techniques to securely manage corporate email, apps, and docs on employee devices while keeping personal data out of sight … Continue reading Webinar: Separation of Corporate and Personal: Best Practices for Securing Data on Mobile Devices

Beware of BYOD Harming your Company

By Michelle Drolet . 23 Sep 2012

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient — employees can access important documents at home or on the road –it also creates greater security risks for businesses.   Employees’ … Continue reading Beware of BYOD Harming your Company

Microsoft discovers Chinese malware pre-installed on new PCs

By Michelle Drolet . 14 Sep 2012

Microsoft has published evidence of an extraordinary conspiracy in which potent botnet malware was apparently installed and hidden on PCs during their manufacture in China. This is a big deal, the team at Towerwall has been aware that this level of threat and exploitation existed, but none the less surprised. Read the rest of the … Continue reading Microsoft discovers Chinese malware pre-installed on new PCs

10 Things to Know Before Creating BYOD Policy

By Michelle Drolet . 5 Sep 2012

In recent years, the work place has become more mobile than ever, and the mobile worker revolution is, in large part, the reason for the rise in Bring Your Own Device (BYOD) policies. The big idea is that through the use of cloud computing-based collaboration platforms, enterprise-class companies can save a great deal of money in IT, security and … Continue reading 10 Things to Know Before Creating BYOD Policy

Tags