Towerwall, Inc.

Towerwall, Inc.

Computer and Network Security

Framingham, MA 793 followers

For over 20 years Towerwall, a woman owned business, has helped scores of companies safeguard their critical data.

About us

The front line of cybersecurity.™ For over 20 years, Towerwall, a woman-owned business, has helped scores of companies safeguard their data and leverage their investment in IT with advanced information security technology solutions and services. Our experience in all facets of information security coupled with serving in the CIO/CISO/ISO roles provides a unique first-hand understanding of the security challenges organizations face daily.

Website
http://www.towerwall.com
Industry
Computer and Network Security
Company size
11-50 employees
Headquarters
Framingham, MA
Type
Privately Held
Founded
1999
Specialties
Data Security, Security Assessment, Compliance, Vulnerability Scans, Awareness Training, Vendor Risk Assessment, Penetration Testing, PCI, Application Penetration, Firewall Rule Review, Data Classification, DLP, BYOD, VCISO, Policy Development, GRC, Risk Assessment, HIPAA, GDPR, irp, BCP, DR, Integrated Risk Management, CyberSecurity, Ransomware protection, MDR, and Cloud Security

Locations

Employees at Towerwall, Inc.

Updates

  • View organization page for Towerwall, Inc., graphic

    793 followers

    It has been one week since the CrowdStrikesituation, underscoring the importance of developing #VendorRisk Management policies. To help you navigate these challenges, check out our recent piece for CSO Online "6 Steps for Third-Party Cyber Risk Management" https://hubs.li/Q02H_MRn0. If you need assistance in developing a comprehensive Vendor Risk Management program, contact the Towerwall team today. We are here to help you stay secure and prepared. #5thWallofSecurity #IncidentResponse #VendorRisk

    6 Steps for Third-Party Cyber Risk Management - Towerwall

    6 Steps for Third-Party Cyber Risk Management - Towerwall

    towerwall.com

  • View organization page for Towerwall, Inc., graphic

    793 followers

    7 reasons why you should choose Towerwall for Penetration Testing & Vulnerability Protection expertise.🛡️ 1. Only Senior-Level Security Experts w/ 25+ Years Experience 2. Quick Start, On Your Schedule 3. Dedicated Project Management assigned to you 4. Communicate Directly with Engineers 5. Completely Customized Approach 6. No Surprises, Findings Escalated Immediately 7. Integrated Remediation Roadmaps Do you have 15 minutes to discuss your penetration test needs? Contact the Towerwall team to schedule a call: https://hubs.li/Q02H_D4m0 #5thWallofSecurity #PenTest #Towerwall

  • View organization page for Towerwall, Inc., graphic

    793 followers

    Have you registered for our #ZeroTrust BrightTALK w/ Cloudflare yet? It's this Thursday! (7/25 12:00pm EDT) 🔍 We will cover: 1. VPN Replacement: Explore modern alternatives to traditional VPNs. 2. Privilege Access Management (PAM): Understand the importance of managing and securing privileged accounts. 3. Zero Trust Architecture: Get an overview of the Zero Trust principles. Register to join us on Jul 25 2024, 12:00pm EDT https://hubs.li/Q02HD16q0 #ZeroTrust #Webinar #5thWallofSecurity

    • No alternative text description for this image
  • View organization page for Towerwall, Inc., graphic

    793 followers

    📢 **Important Update from CrowdStrike: Remediation and Guidance Hub** CrowdStrike has made a series of updates on their Remediation and Guidance Hub to help you navigate the current challenges. The hub now includes detailed instructions on: - How Do I Identify Impacted Hosts? - How Do I Remediate Impacted Hosts? - How Do I Recover BitLocker Keys? - How Do I Recover Cloud-Based Environments? For comprehensive guidance, please visit: https://hubs.li/Q02HtFNz0 As always, Towerwall is here to help escalate any issues and provide additional information. Please do not hesitate to reach out to us for support. #5thWallofSecurity #CrowdStrike #ITSupport #Towerwall #StaySecure

    • No alternative text description for this image
  • View organization page for Towerwall, Inc., graphic

    793 followers

    “Threat actors could exploit the RockYou2024 password compilation to conduct brute-force attacks and gain unauthorized access to various online accounts used by individuals who employ passwords included in the dataset,” the team explained.

  • View organization page for Towerwall, Inc., graphic

    793 followers

    🚨 Security Alert: Heightened Email-Based Threats 🚨 Due to the ongoing worldwide disruption with CrowdStrike we are seeing an increase in email-based fraud and phishing attempts. Bad actors are taking advantage of the situation, posing as trusted representatives to exploit unsuspecting users. Some of the reported phishing attempts include: 1. Threat actors claiming to be CrowdStrike representatives 2. Threat actors posing as Microsoft staff 3. Threat actors pretending to be IT support staff Next Steps: 1. Be Vigilant: Scrutinize emails from unfamiliar or unexpected sources. 2. Verify Identities: Contact the sender through official channels to confirm their identity before clicking any links or providing information. 3. Report Suspicious Emails: Notify your IT department or use your company's designated reporting system. Stay safe and alert. If you need assistance, reach out to us directly at info@towerwall.com #5thWallofSecurity #PhishingAlert #StaySafe #ITSecurity #CrowdStrike

    • No alternative text description for this image
  • View organization page for Towerwall, Inc., graphic

    793 followers

    We understand that the CrowdStrike situation is challenging for everyone. We want to assure you that there are workarounds available for on-site users. We are still awaiting a fix for remote users, but we will update you as soon as we have more information. Per Crowdstrike, below outlines workaround steps. You can also following these steps by logging into your Crowdstrike portal and following the notification. Workaround Steps for individual hosts: 1. Reboot the host to give it an opportunity to download the reverted channel file. If the host crashes again, then: 2. Boot Windows into Safe Mode or the Windows Recovery Environment (NOTE: Putting the host on a wired network (as opposed to WiFi) and using Safe Mode with Networking can help remediation.) 3. Navigate to the %WINDIR%\System32\drivers\CrowdStrike directory 4. Locate the file matching “C-00000291*.sys”, and delete it. 5. Boot the host normally. (Note: Bitlocker-encrypted hosts may require a recovery key.) Workaround Steps for public cloud or similar environment including virtual: Option 1: 1. Detach the operating system disk volume from the impacted virtual server 2. Create a snapshot or backup of the disk volume before proceeding further as a precaution against unintended changes 3. Attach/mount the volume to to a new virtual server 4. Navigate to the %WINDIR%\System32\drivers\CrowdStrike directory 5. Locate the file matching “C-00000291*.sys”, and delete it. 6. Detach the volume from the new virtual server 7. Reattach the fixed volume to the impacted virtual server Option 2: 1. Roll back to a snapshot before 0409 UTC. Full details and new updates can be found on CrowdStrike's website - https://hubs.li/Q02HhwDH0 Towerwall is here to help escalate any issues and provide additional information. Please do not hesitate to reach out to us for support. Best regards, Team Towerwall

    • No alternative text description for this image

Similar pages

Browse jobs