Webinar: Separation of Corporate and Personal: Best Practices for Securing Data on Mobile Devices

By Michelle Drolet . 25 Sep 2012

As the BYOD trend gains momentum, not all employees are comfortable having their personal phones locked down and controlled as tightly as a corporate-issued device. To get around this issue some organizations are turning to separation techniques to securely manage corporate email, apps, and docs on employee devices while keeping personal data out of sight … Continue reading Webinar: Separation of Corporate and Personal: Best Practices for Securing Data on Mobile Devices

Beware of BYOD Harming your Company

By Michelle Drolet . 23 Sep 2012

It’s becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient — employees can access important documents at home or on the road –it also creates greater security risks for businesses.   Employees’ … Continue reading Beware of BYOD Harming your Company

Microsoft discovers Chinese malware pre-installed on new PCs

By Michelle Drolet . 14 Sep 2012

Microsoft has published evidence of an extraordinary conspiracy in which potent botnet malware was apparently installed and hidden on PCs during their manufacture in China. This is a big deal, the team at Towerwall has been aware that this level of threat and exploitation existed, but none the less surprised. Read the rest of the … Continue reading Microsoft discovers Chinese malware pre-installed on new PCs

Introducing our Security Training Toolkit

By Michelle Drolet . 4 Sep 2012

A customizable security training program for your review. We’re giving you all the tools you need to keep your employees out of trouble. Whether you’re starting a program from scratch, or just in need of some refresher materials, we’ve got you covered. Here’s whats included in the Towerwall Security Training Toolkit: Program launch guide Employee … Continue reading Introducing our Security Training Toolkit

Hackers leak 1 million Apple device IDs

By Michelle Drolet . 3 Sep 2012

To cap off a summer of devastating corporate data breaches, hackers yesterday posted online what might be the crown jewel of 2012 data dumps: 1 million identification numbers for Apple iPhones, iPads and iPod Touch’s, all purportedly stolen from the FBI. There may also be an additional 11 million Apple device IDs yet to be … Continue reading Hackers leak 1 million Apple device IDs

Why You Need A Mobile Device Policy

By Michelle Drolet . 9 Aug 2012

Whether you choose to embrace it or try to resist it, the BYOD (Bring Your Own Device) trend is set to grow. A study by Cisco Systems found that 78 percent of white-collar workers in the U.S. use a mobile device for work and 41 percent indicated that most smartphones that connect to the company … Continue reading Why You Need A Mobile Device Policy

The worst passwords you could ever choose

By Michelle Drolet . 16 Jul 2012

For those on our Security Alert and Update list we just emailed this great article by Graham Cluley on the worst possible passwords you could ever choose. Many of you know this is something we preach to our clients on a regular basis and is part of our comprehensive 4E Program. Too many internet users … Continue reading The worst passwords you could ever choose

Beware the wild west of Web applications

By Michelle Drolet . 2 May 2012

Web applications – particularly those facilitating collaboration and communication – are a boon to sales, marketing and productivity. Teams work together more effectively, salespeople enjoy better leads and marketing tools and customer service reps can more closely connect with those they serve. All of these gains, though, come at a cost: risk. By their very … Continue reading Beware the wild west of Web applications

IP Wars: Who’s The Real Enemy?

By Michelle Drolet . 20 Feb 2012

Thanks to the blackout of Wikipedia and the efforts of Google and Facebook, the federal bills known as SOPA (Stop Online Piracy Act) and PIPA (Protect IP Act) have been put on the back burner for revision. The actions last month by the three websites generated millions of protest emails against the controversial legislation. But … Continue reading IP Wars: Who’s The Real Enemy?

Join us for our 2012 Database Security Top Threats and Tips webinar.

By Michelle Drolet . 9 Jan 2012

Towerwall & AppSecInc are pleased to offer a free webinar to highlight Database Security Top Threats and Tips. Learn more about the current threat climate and top tips for protecting sensitive information in the database. During this one hour presentation, AppSecInc’s CTO, Josh Shaul will discuss how to: • Defend against the latest cyber espionage … Continue reading Join us for our 2012 Database Security Top Threats and Tips webinar.

Tags