Solutions: User Awareness & Training

Michelle Drolet

Researchers have spotted the first in-the-wild apps to exploit a critical Android vulnerability allowing attackers to inject malicious code into legitimate programs without invalidating their digital signature. The two apps, distributed on unofficial Android marketplaces in China, help people find doctors and make appointments, according to a blog post published Tuesday by researchers from security

Michelle Drolet

Hi all, there is an e-mail scam doing the rounds. The message is an invite from some random person you won’t know with a link (how original). If you get such a message don’t use the link, check your LinkedIn account as if it’s a legit request it will be there waiting for approval. Even

Michelle Drolet

Please join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business! May 30, 2013  8:00AM – 1:00PM MassBay Community College 50 Oakland Street  | Wellesley Hills, MA 02481 $45 Pre-registration required. To register visit: http://tinyurl.com/ITsecuritysummit DEFENDING YOUR DATA Content

Michelle Drolet

Top Ten Malicious URLs Top 10 malicious URLs blocked by the Trend Micro™ Smart Protection Network™ infrastructure in 2012 Top Ten Malicious URLs Top 10 malicious URLs blocked by the Trend Micro™ Smart Protection Network™ infrastructure in 2012. Top Ten Spammers Top 10 spam-sending countries in 2012. Rank Country 1 India 2 Saudi Arabia 3

Michelle Drolet

According to the article in Dark Reading,  Study: Phishing Messages Elude Filters, Frequently Hit Untrained Users, many people are still being tripped up by phishing emails. The article summarizes the findings of a survey that was conducted at the Black Hat USA security conference held in July 2012. Of the 250 conference attendees that were polled,

Michelle Drolet

Beware any emails which claim to come from privacy@microsoft.com – it could be that you’re being targeted in an attack designed to steal your AOL, Gmail, Yahoo or Windows Live password. At first glance, if you don’t look too carefully, the emails entitled “Microsoft Windows Update” may appear harmless enough. But the grammatical errors and

Michelle Drolet

A customizable security training program for your review. We’re giving you all the tools you need to keep your employees out of trouble. Whether you’re starting a program from scratch, or just in need of some refresher materials, we’ve got you covered. Here’s whats included in the Towerwall Security Training Toolkit: Program launch guide Employee

Michelle Drolet

For those on our Security Alert and Update list we just emailed this great article by Graham Cluley on the worst possible passwords you could ever choose. Many of you know this is something we preach to our clients on a regular basis and is part of our comprehensive 4E Program. Too many internet users

Michelle Drolet

Like it or not, the line between the workplace and the home is blurring. Work-at-home arrangements are becoming more common and cloud services make it easier to coordinate teams online. People are constantly on call, with the ability to check their emails and stay in touch wherever they are. The days of having a personal

Michelle Drolet

Cybercriminals are attempting to infect the computers of internet users, via a spammed-out email that has a malware-infected file attached.  Computer users are being warned to be wary of email messages which suggest they contain nude photographs of girlfriends, or claim that they have been reported to the police, as the attached file (Photo.zip) really