Four Steps to Respond & Recover from Sophisticated Security Attacks

By Michelle Drolet . 29 Jul 2013

Great information in SC Magazine’s latest whitepaper report, ‘Four steps to respond and recover from sophisticated security attacks’, it discusses the four proactive steps that you can – and should – take now to help keep your organization safe. Click here to view more details: http://bit.ly/131uu2J As we all know, cyber-attacks are becoming more sophisticated … Continue reading Four Steps to Respond & Recover from Sophisticated Security Attacks

Views from the Inside: Is your data safe with free cloud services? (guest post)

By Michelle Drolet . 12 Jul 2013

The overwhelming advantages of cloud-based file storage are not in dispute. You have an automatic backup of your files, which can be accessed on any device, at any time. Small amounts of storage are generally free, and large swathes of server space are coming down in price all the time. They absolve your business from … Continue reading Views from the Inside: Is your data safe with free cloud services? (guest post)

New LinkedIn E-Mail Scam

By Michelle Drolet . 3 Jul 2013

Hi all, there is an e-mail scam doing the rounds. The message is an invite from some random person you won’t know with a link (how original). If you get such a message don’t use the link, check your LinkedIn account as if it’s a legit request it will be there waiting for approval. Even … Continue reading New LinkedIn E-Mail Scam

Introducing Towewall’s Alternative Cloud-based File Sharing Solutions

By Michelle Drolet . 27 Jun 2013

Towerwall is proud to offer our new Alternative Cloud-based File Sharing Solutions Cloud based file synchronization services have exploded. Organizations need to be able to provide a modern collaboration experience with the infrastructure that they’ve already invested in, and that they already know how to manage and protect. Watch the video below for more:     … Continue reading Introducing Towewall’s Alternative Cloud-based File Sharing Solutions

A case for the Growing Need for Application Security.

By Michelle Drolet . 9 May 2013

Islamist Element in Attacks. A pro-Islamic, anti-American hacking campaign appears to have jumped the gun and started early with hundreds of sites being compromised today. Set to take place on May 7 this month – thought to be US time – and targeting government sites in the US, Israel and India, the campaign is called … Continue reading A case for the Growing Need for Application Security.

Views from the Inside: A successful BYOD policy is not just about security

By Michelle Drolet . 30 Apr 2013

The BYOD trend shows no sign of abating as more and more organizations recognize the potential benefits in terms of cost and convenience. According to a recent surveyby Good Technology, 76 percent of enterprises are now supporting BYOD and the majority of those that still don’t are planning to do so in the near future. When … Continue reading Views from the Inside: A successful BYOD policy is not just about security

Is Your Business Taking the Threat of Mobile Malware Seriously?

By Michelle Drolet . 30 Apr 2013

Don’t underestimate the damage that malware proprietors can unleash if the right security policies aren’t in place. Bring-your-own-device (BYOD) programs and cloud computing — two of the biggest enterprise trends from the last couple of years — go hand in hand. Employees want to be given the latitude to use their smartphones for work, and … Continue reading Is Your Business Taking the Threat of Mobile Malware Seriously?

Towerwall Security / Vulnerability Alert

By Michelle Drolet . 28 Jan 2013

Security researchers from the Vulnerability Lab have identified a serious security hole that could affect a number of companies which rely on Barracuda products. They’ve discovered a high severity validation filter and exception handling bypass vulnerability in Barracuda’s appliances. According to the experts, the input filter that’s designed to block out persistent input attacks is … Continue reading Towerwall Security / Vulnerability Alert

BYOD Brings on a War of Worry

By Michelle Drolet . 28 Jan 2013

It appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls. It may seem that bowing to this desire on the parts of employees would have a lot to offer, not the least of which is a reduction in … Continue reading BYOD Brings on a War of Worry

Warning: Java vulnerable to hackers, U.S. government says

By Michelle Drolet . 11 Jan 2013

Jan 11 (Reuters) – The U.S. Department of Homeland Security urged computer users to disable Oracle Corp’s (ORCL:$34.8625,$-0.0475,-0.14%) Java software, amplifying security experts’ prior warnings to hundreds of millions of consumers and businesses that use it to surf the Web. Hackers have figured out how to exploit Java to install malicious software enabling them to … Continue reading Warning: Java vulnerable to hackers, U.S. government says

Tags