Data Security Review: Issue 04
Data Security Review:
Raise Your Castle Walls
Welcome to Issue 4 of the Data Security Review
Hello again,
Hard to believe September is upon us. Over the summer we performed multiple application penetration and vulnerability tests - not one came out without battle scars (high vulnerabilities). In our ongoing effort to keep you apprised of the latest developments we have compiled insights on a host of areas including: secure development with the introduction of OWASP (Open Web Application Security Project), attacks like “Comment Spam” and how human capital is used to get to your company's “Crown Jewels”. If that was not enough, for good measure we included a great article from Forbes Magazine that focuses on who has access to your data and what are they doing with it.

- Michelle Drolet, CEO
Key Insights
Cork That App or Face Attack
by Michelle Drolet
Featured in Wired Innovation Insights
Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected...
Read More
OWASP Top 10
by Open Web Application Security Project (OWASP)
Insecure software is undermining our financial, healthcare, defense, energy, and other critical infrastructure. As our digital infrastructure gets increasingly complex and interconnected, the difficulty of achieving application security increases exponentially...
Read More
The Anatomy of Comment Spam
By Shelly Hershkovitz
Comment spam is a term used to refer to a broad category of spam bot postings which abuse web-based forms to post unsolicited advertisements as comments on forums, blogs, wikis and online guest books...
Read More
Free Wi-Fi networks have security risks
by Sophos on ABC World News
Wireless networks are everywhere, but they aren’t always secure. In New York City, where millions of people connect to free but insecure Wi-Fi hotspots every day, it’s the same story...
Read More
Do You Know Where Your Data Is And Who Reads It? Varonis Knows
by Gil Press
Edward Snowden’s job responsibilities at the NSA included accessing a file-sharing section of the agency’s intranet and...
Read More
10 Things I Know About... Social engineering
by Michelle Drolet
Featured in Worcester Business Journal
You can have endpoint security systems in place with anti-virus, URL and content filtering, anti-malware, and more, but social engineering encourages you to bypass your own defenses...
Read More
Towerwall listed among “20 Most Promising Security Consulting Companies” Also named to CRN’s “Women in the Channel” and “The Power 50”
Read Press Release
Towerwall, Inc. 2014
888.234.7404 Email Us Contact Us