Resource Category: Insights

Michelle Drolet

The US Department of Health and Human Services (HHS), through its Office of Civil Rights (OCR), is proposing an update to the “Security Rule” of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The proposed Security Rule requires entities like healthcare providers, business associates, and health plans to improve cybersecurity practices. This is the first update the Security Rule has received since 2013, and it’s mostly driven by escalating cyberattacks resulting

Michelle Drolet

The Gramm-Leach-Bliley Act (GLBA) is a U.S. federal regulation that seeks to protect consumer financial privacy. GLBA mandates that financial institutions be transparent with their customers about how their data is shared and how sensitive data is kept safe. The GLBA regulation is divided into three sections: 1. The Financial Privacy Rule: Describes how consumer financial information must be collected

Greg Neville

Organizations routinely encounter a myriad of cyberthreats that jeopardize their data, operations and reputation. To address these constantly evolving threats, organizations need consistent methodologies and tools to proactively identify security gaps and weaknesses.A well-designed risk assessment will empower your organization to prioritize security initiatives that have the most value and a gap analysis can help

Michelle Drolet

Just in time for the 2024 U.S. elections, cyberattacks and malicious activities are ramping up. For numerous reasons, elections are the perfect time for opportunistic cybercriminals to target businesses: • High visibility: Elections provide an ideal platform for nation-states and hacktivists looking for ways to undermine democracies, destabilize elections, damage reputations and steal campaign data. Since elections

Janelle Drolet

8) With a cyberattack or data breach, containment is all important, otherwise business continuity is not possible. Priority one is protecting your crown jewels: your critical data and assets. By identifying these upfront, organizations ensure the most valuable assets are safeguarded. 7) Everyone in your organization should be aware of the many cyber risks, what

Michelle Drolet

We are thrilled to announce that Towerwall’s very own Michelle Drolet is featured in the inaugural issue of Women’s Tabloid Magazine! In her must-read article, “Embracing Diversity in Cybersecurity,” Michelle shares her insights on how diversity fuels innovation and resilience in the cybersecurity field. Some key highlights: Mentorship programs, flexible work schedules, and unbiased hiring

Michelle Drolet

About 63% of organizations worldwide have partially or fully implemented a zero-trust strategy. For those who don’t know what zero trust means, it’s basically a security model that enforces strict verification for every user and device that is trying to access applications or other company assets. So why is zero trust suddenly so popular? There are several

Michelle Drolet

Towerwall is proud to announce that our CEO and founder, Michelle Drolet, has been named to the prestigious Forbes “50 Over 50: Innovation” list, an honor that celebrates women making significant contributions to business and innovation. The list highlights women who are pushing the boundaries of traditional thinking and leading the charge in their respective

Michelle Drolet

The Federal Trade Commission’s Standards For Safeguarding Customer Information Rule (aka The “FTC Safeguards Rule”) is a regulation requiring entities to develop, implement and maintain a comprehensive information security program consisting of appropriate administrative, technical and physical safeguards to keep nonpublic personal/customer information secure. Although this regulation came into effect in 2003, it was updated

Michelle Drolet

BOSTON – July 16, 2024 – Towerwall, a 25-year provider of cybersecurity services for emerging to mid-size enterprises, today announced its appointment of Greg Neville as Chief Information Security Officer (CISO) and Vice President of Towerwall Cyber Consulting Services. “Greg Neville is a seasoned professional with nearly two decades of experience developing information security programs