A Path to Success with the TouchstoneISP Service

Companies today are receiving more and more inquiries from potential customers about their cybersecurity policies. This is becoming extremely common nowadays given the increasing number of cyberattacks each year. Cybersecurity policies and company security are now front of mind for customers. Potential customers want to know specific details of a company’s cybersecurity program and policies as a prerequisite for hiring them. Some of these requests involve asking for “Shared Assessments” questionnaires with very detailed questions about the cybersecurity measures, policies, and procedures, at a company. 

Many businesses have reached out to Touchstone Security for assistance with these complex security questionnaires. Touchstone has enabled many companies to set up a complete Information Security Program (ISP) custom-tailored to their needs and crafted with the requests set forth by potential customers in mind. Thanks to this service, our clients are now able to confidently inform each potential customer that they possess a top-tier cybersecurity program managed by a team of highly trained field experts. They no longer need to deal with things like Shared Assessment questionnaires, nor do they need to worry about any ongoing management of their cybersecurity. 

Request a Free Cloud Migration Consultation

 

This is made possible through the TouchstoneISP Service. After several collaborative strategy sessions with each client, Touchstone builds a comprehensive cybersecurity platform. This eases companies’ concerns over cybersecurity and compliance requirements. Businesses are able to assure their customers that they have a holistic set of cybersecurity policies and procedures in place to safeguard their data. Additionally, they can rest easy knowing that their cybersecurity platform is designed to meet compliance requirements. 

 

But the relationship doesn’t end there, because cybersecurity by nature is not a single-step process. Touchstone performs numerous and continuous security assessments that enable our clients to clearly see how their data is stored and secured. Through communication with key stakeholders at the companies we work with, we establish full Information Security Programs. These programs provide a detailed manual encompassing a range of cybersecurity tools including best cybersecurity practices, policies, procedures, and plans designed to protect against potential attacks and respond to incidents if they do occur. 

Our TouchstoneISP Service provides an invaluable cybersecurity toolkit to our clients. Our clients can relax knowing that their cybersecurity needs are being fully satisfied by qualified professionals. Equally important, our clients’ customers can now feel safe knowing their information is being handled correctly and according to the proper cybersecurity frameworks and regulations. This helps our clients build trust with potential clients and enables them to provide detailed documentation illustrating their top-tier cybersecurity platform. 

 

Recently, our TouchstoneISP Service was implemented for a new manufacturing client. The initial phase of the project took 2 weeks to carry out, weeks earlier than the client expected. Upon entering phase 2 of the engagement, Touchstone began to pinpoint and address weaknesses in the company’s data security and implement additional best practices for managing their entire IT infrastructure. Over the course of this process, our client was put under time-sensitive pressure by a potential Fortune 100 customer. The potential customer wanted them to deliver a detailed description of their Information Security Program.

Touchstone was amazing to work with! We had some issues with our systems and integration of new programs. We felt that the security of our systems was not up to the best standards. The CEO, Richard Shinnick, personally came over and evaluated our systems. He was able to pinpoint the holes in our systems immediately and fix any potential issues before they ever happened. One of the best IT Firms I have ever worked with. Thank you Touchstone!

Ameen Nassiri, SPS Worldwide LLC

Rich and his team are remarkable. While at Columbia University Teachers College, they helped us plan/implement several large scale projects including ubiquitous wireless deployment and a firewall implementation. Rich has an extensive IT background and is an all around great guy to work with. I recommended that we bring his team in at St. John’s as well. They were able to come in, assess the situation, and provide the same fantastic results. I highly recommend Rich and his team.

Elise Lowenstein, Columbia University

Rich brings solid IT security experience along with immense integrity in the work he has performed for IntegraMed. All of his projects were completed on time and within budget. His track record of delivering reliable concept to reality projects under the pressures of a high availability and heavily compliant environments precedes him. I endorse Rich personally and professionally and look forward to working with him again on future projects.

Vijay Reddy, IntegraMed America

Rich is deeply technical and very thorough, but most of all he is a very honest person. He can make any technical jargon simply to understand in layman terms and help you understand what he is proposing so all know the benefits that is being recommended and implemented. I would work with Richard again on any project initiative that I maybe involved in the future.

Clive Fernando, PNC

We needed a security sharpshooter to assist with responding to the stringent requirements of a major academic healthcare system based on a comprehensive audit of our platform. Touchstone expertly facilitated our response and created the missing programs and policies necessary to satisfy our needs.

Kenny Schiff, Caresight, Inc.

Touchstone Security specialists completely blew away our most experienced and technically strong managers and some of our best people in infrastructure and security. Richard was in their words “a perfect 10.” He not only addressed the issues we asked him to look at but identified other areas of improvement in our security posture. Our team rated them “a perfect 10”!

Michael Ferranti, BuyerGenomics

Touchstone Security – Your Cybersecurity Partner

Communication, collaboration, and trust were key ingredients throughout this process.  We want to establish trust and open communication with any company we work with. With our recent engagement, communication was both consistent and fast – speeding up the process and documentation. All parties involved were in communication with Touchstone including the client’s MSP. Touchstone understands how to work with the technologies and partners needed in order to carry out a successful cybersecurity engagement. This knowledge and commitment to building trust and long-term client relationships set us apart from many other cybersecurity firms who may understand the security process but not how to leverage the various technologies around the process to work in tandem with security. 

 

Touchstone also helped manage the price of meeting critical cybersecurity frameworks. After a few hours of collaboratively strategizing with the client, Touchstone was able to determine the correct cybersecurity framework to best meet the client’s needs. Having a team of professionals who can identify the most cost-effective way to ensure your cybersecurity policies align with best practices according to industry standards saves you money and headaches in the long-term. Implementing a comprehensive cybersecurity posture is a long-term investment in the future of any company in the 21st century. 

 

This client leveraged the TouchstoneISP Service to perform a comprehensive compliance evaluation, craft a complete set of cybersecurity policies and procedures, cost-effectively achieve their cybersecurity objectives and meet critical frameworks, and mitigate their risk of experiencing a cyberattack. As we continue to support them, we remain committed to assisting them with client questions and work tirelessly to ensure they meet all the necessary cybersecurity requirements for their business. The careful consideration and dedication we demonstrated through this engagement is the same high level of service we provide to all of our valued clients. 

Request a Free Cloud Migration Consultation