Build A Strong Cybersecurity Posture With These 10 Best Practices

By Michelle Drolet . 15 Apr 2019

The numerous high-profile data breaches that took place in 2018 illustrate that no organization, irrespective of size, scale or scope, is immune from cyberattacks. Last year witnessed a 350% increase in ransomware attacks and a 70% increase in spear-phishing attacks. We are looking at a state-of-affairs wherein it is very easy for cybercriminals to exploit security vulnerabilities and target … Continue reading Build A Strong Cybersecurity Posture With These 10 Best Practices

Why Penetration Testing Is Critical To Bolster Your Cybersecurity Efforts

By Michelle Drolet . 26 Mar 2019

The threat of a cybercriminal gaining access to your network is a constant source of anxiety. Amid all of the high-profile data breaches, businesses and organizations of all sizes have been successfully targeted by hackers who employ a wide range of different strategies. Too many companies have had to learn all about the potential cost of … Continue reading Why Penetration Testing Is Critical To Bolster Your Cybersecurity Efforts

The 7 Deadly Sins of Endpoint Detection & Response

By Michelle Drolet . 19 Nov 2018

Breaches often take weeks or even months to uncover, but the right strategy combined with strong endpoint detection & response (EDR) tools can make all the difference. We examine seven vital factors to consider. Many different elements need to come together for an organization to secure its data properly. Most companies adopt a security strategy … Continue reading The 7 Deadly Sins of Endpoint Detection & Response

4 Dangerous Security Assumptions to Avoid

By Michelle Drolet . 2 Nov 2018

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of security is all-too-easy to come by. Data breaches are commonplace now and there’s a growing realization that organizations need … Continue reading 4 Dangerous Security Assumptions to Avoid

Join us for a Dinner Seminar with Darktrace – Wednesday, January 17, 2018

By Michelle Drolet . 10 Jan 2018

Towerwall & Darktrace Dinner Seminar Hosted by Towerwall When: Wednesday, January 17, 2018 6:00 PM to 8:00 PM Where: Il Capriccio 888 Main St, Waltham, MA 02453 To Register: Contact Kelley Gallo atkelleyg@towerwall.com About DarkTrace Darktrace is the world’s leading machine learning company for cybersecurity. Created by mathematicians from the University of Cambridge, the Enterprise … Continue reading Join us for a Dinner Seminar with Darktrace – Wednesday, January 17, 2018

Meetup: ARMIS IoT Security – Thursday, January 11, 2018

By Michelle Drolet . 10 Jan 2018

Join us for our next InfoSec at Your Services Meetup: “ARMIS IoT Security” Hosted by Michelle Drolet When: Thursday, January 11, 2018 6:30 PM to 8:00 PM Where: Skyboxx, 319 Speen Street, Natick We will discuss: Internet of Things – IoT – the latest buzzwords conjour up images of toasters and refrigerators being controlled by … Continue reading Meetup: ARMIS IoT Security – Thursday, January 11, 2018

8 Cybersecurity Trends to Watch for in 2018

By Michelle Drolet . 12 Dec 2017

New challenges and threats will face IT departments in the year ahead. As we stand on the threshold of another year, the war for our cybersecurity rages on. There have been many data breaches in 2017, most notably for Equifax, Verizon, and Kmart. But if you seek a silver lining in the cloud, perhaps you’ll … Continue reading 8 Cybersecurity Trends to Watch for in 2018

Michelle Drolet profiled in Boston Voyager

By Michelle Drolet . 11 Dec 2017

Today we’d like to introduce you to Michelle Drolet… Thanks for sharing your story with us Michelle. So, let’s start at the beginning and we can move on from there. As founder of Towerwall, I have to say my proudest moment was when I sold my company and then… I rebought it! I remained active … Continue reading Michelle Drolet profiled in Boston Voyager

Making a bad situation worse: how Equifax mishandled the breach

By Michelle Drolet . 28 Sep 2017

Companies must respond to data breaches properly to limit the damage. Unfortunately, Equifax did not. There have been some very high-profile data breaches in the last few years, but the latest disaster to hit the headlines concerns one of the largest credit bureaus in the United States. It’s estimated that the Equifax data breach exposed 143 million consumers, with … Continue reading Making a bad situation worse: how Equifax mishandled the breach

Achieving long-term resilience with NIST’s Cybersecurity Framework

By Michelle Drolet . 19 Sep 2017

The need for continuous monitoring, effective metrics and skilled workers. The laudable aim of the National Institute of Standards and Technology (NIST) is to build a common language through a set of best practices and security principles that any organization can apply to combat cybercrime. We’ve looked at what NIST’s Cybersecurity Framework can do for you. … Continue reading Achieving long-term resilience with NIST’s Cybersecurity Framework

Tags