Quantcast
Channel: Cloud Security – Towerwall
Browsing all 21 articles
Browse latest View live

Views from the Inside: Is your data safe with free cloud services? (guest post)

The overwhelming advantages of cloud-based file storage are not in dispute. You have an automatic backup of your files, which can be accessed on any device, at any time. Small amounts of storage are...

View Article



Image may be NSFW.
Clik here to view.

3 Keys To Keep Enterprise Clouds Secure

3 Keys To Keep Enterprise Clouds Secure Outsourcing has won out over ownership, and the rush to the cloud continues to gather pace. Where security is concerned there are two major trends that threaten...

View Article

Image may be NSFW.
Clik here to view.

Stay Secure in the Cloud with Sophos Cloud Endpoint

Towerwall and Sophos, partnering to protect data integrity in the cloud. Towerwall is now offering Sophos Cloud Endpoint, a new security option for small and medium sized businesses. Sophos Cloud...

View Article

Is Blind Trust Making You Unsafe?

Personal and business relationships rely on trust to function, but blind trust in the digital world is downright dangerous. We’re asked to trust companies all the time. We trust them with personal...

View Article

Image may be NSFW.
Clik here to view.

The Benefits of Cloud-Based Endpoint Security

The cloud computing revolution is well underway and there are lots of benefits to be realized. According to Awesome Cloud research the industry will be worth more than $150 billion this year, compared...

View Article


Image may be NSFW.
Clik here to view.

Test All Apps to Keep Hackers from Penetrating Castle Walls

Four major challenges when protecting apps and how to solve them Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected....

View Article

Image may be NSFW.
Clik here to view.

Cork That App or Face Attack

Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform...

View Article

Image may be NSFW.
Clik here to view.

Build security into your app development

Integrate security testing into your dev process now or else face cyber-attacks later The way we develop software has been radically transformed in the last few years. Agility and speed are vital...

View Article


Image may be NSFW.
Clik here to view.

Debunking 5 Reasons Businesses Use to Not Invest In Computer Security

The rise of malware seems to have passed some people by. As the ranks of cybercriminals grow and they find new ways to exploit our systems and steal our data, a lot of computer users and...

View Article


Google running late to the enterprise mobility party

Is Android secure enough for the enterprise? Android has a bad reputation when it comes to security, which is unfortunate because it’s the biggest mobile platform around in terms of market share....

View Article

‘Get Smart’ when it comes to using cloud-based services for file sharing

Encrypting data on your own might be the smartest move.   For those of you old enough to remember the TV comedy series “Get Smart” featuring a spy that used his shoe for a phone, the good guys belonged...

View Article

Applying more Critical Security Controls to your organization

The last time we looked at how Critical Security Controls (CSC) can help you build your InfoSec framework, we covered getting a handle on your software and your hardware inventories. Today, we’re going...

View Article

Image may be NSFW.
Clik here to view.

5 cybersecurity trends to watch for in 2016

As threats evolve and grow more sophisticated, securing IT systems is more important than ever.   We may welcome in the New Year with open arms, but we must also prepare for the cybersecurity threats...

View Article


Hundreds of cloud apps still vulnerable to DROWN

Complacency in addressing known vulnerabilities puts users at risk   If you have even a passing interest in security vulnerabilities, there’s no chance that you missed the news about the DROWN...

View Article

8 Tips to Secure Those IoT Devices

Make sure the Internet of Things isn’t a route for hackers to get into your home or workplace   As more and more Internet-connected devices find their way into our homes and businesses, it’s important...

View Article


Always be Prepared: Monitor, Analyze and Test your Security

Stay vigilant, plan your response and test your defenses with CIS Controls 18, 19 and 20   This is the final entry in our series on the 20 Critical Security Controls devised by the Center for Internet...

View Article

Botnets: Is your network really protected?

Security is taking a backseat as more and more devices connect to the internet The tech world moves at a tremendous pace, unleashing wave after wave of innovation intended to improve our everyday...

View Article


5 tips for better cloud security

As cloud adoption soars to new heights, security standards have failed to keep pace. Organizations need to start taking responsibility for their own cloud security and these five practical tips will...

View Article

10 Things I Know About … Cloud security

10) Got cloud? According to Cloud Security Alliance, more than 70 percent of the world’s businesses now operate in some capacity on the cloud. 9) Cloud positive. Running apps in the cloud offers lower...

View Article

5 cloud security basics and best practices

Companies that move to the cloud have to assume new responsibilities, develop new skill sets and implement new processes. The first step to better cloud security is to assume you have no security....

View Article
Browsing all 21 articles
Browse latest View live




Latest Images