About Eric Clay

This author has not yet filled in any details.
So far Eric Clay has created 30 blog entries.

Cybersecurity for Financial Services

Cybersecurity for Financial Services: Best Practices The financial services industry is highly regulated and highly susceptible to cyberattacks by threat actors. Data breaches have grown larger, more frequent, and more expensive over time and the financial services industry has struggled to keep up with attacks. Financial institutions can spend an enormous amount of their revenue on their IT infrastructure. According ...

2021-07-16T13:28:08-04:00July 16th, 2021|

NIST Incident Response Plan: How to build your IRP

The NIST Incident Response Plan What happens if you implement a cybersecurity framework and still have an incident or a breach? Unfortunately in cybersecurity, you can never be 100% secure. You will always be at some risk of an incident. Even the most sophisticated cybersecurity systems in the world carry a degree of risk. However, an incident doesn’t have to ...

2021-07-12T10:31:18-04:00July 12th, 2021|

Types of Penetration Testing: What you need to know

Types of Penetration Testing Securing your business and its data from cyber-attacks and threat actors has never been more challenging. You need a strategic cybersecurity plan, experienced personnel, and well-managed cyber resources. End users and staff utilizing your business network need comprehensive security awareness training on the dangers of common cyber threats that can originate from phishing emails, smartphones, unsafe ...

2021-06-07T21:21:05-04:00June 7th, 2021|

Network Security Tips for Small Business

Network Security Tips for Small Business While large corporate organizations are targeted by malicious actors on a regular basis, small businesses are the ones that are most in danger of losing money, data and even shutting their doors in the event of a cyber attack. Small businesses are ideal targets for threat actors because they often do not invest in ...

2021-06-02T13:13:25-04:00June 2nd, 2021|

How To Prevent a Distributed Denial-of-Service (DDoS) Attack: A Definitive Guide

DDoS attacks, among other cybersecurity and cloud security vulnerabilities, have increased in size, scope, and frequency in recent years. According to a Kaspersky Lab survey, DDoS attacks increased by 80% in the first quarter of 2020 relative to the same quarter of 2019. According to research, the typical DDoS attack in 2021 will use more than 1 Gbps of data, ...

2021-05-17T16:28:25-04:00May 17th, 2021|

What is a Data Breach? A Complete Guide

A data breach occurs when protected or private/confidential information is released to an untrusted environment, whether intentionally or unintentionally. Unintentional database exposure, data theft, information leakage, and data spill are also common terminology used to describe this type of cybersecurity breach. The repercussions of a data breach are often severe for individuals, enterprise businesses, small businesses, and government agencies. A minor ...

2021-05-03T21:24:55-04:00May 3rd, 2021|

Zero Trust Architecture Explained

What Is Zero Trust Architecture? Zero Trust Architecture (Zero Trust approach) is a security model that argues there is no implicit trust provided to user accounts or properties depending on their network or physical location, or on their possession of the asset. To comply with the NIST (National Institute of Standards and Technology) Zero Trust approach, both the system and the ...

2021-05-01T21:12:08-04:00May 1st, 2021|

Adware: The Basics

What is Adware? Adware is a form of malicious software installed on your computer, laptop or cell phone that displays unwanted advertisements on your device. Adware commonly presents in the form of popups but it can also install unwanted toolbars on your computer's internet browser or even change your browser settings and homepage. It can also place spyware on your ...

2021-04-08T13:44:11-04:00April 8th, 2021|

How to Prevent Ransomware: The Definitive Guide

Ransomware is becoming a more serious threat to companies all around the world. This guide from Touchstone Security will define what ransomware is and why the proliferation of ransomware is placing many businesses at risk. This increased risk isn't due to an especially dangerous modern variant of coding. Instead, it’s because ransomware is now much more available than it has ever ...

2021-05-15T01:01:40-04:00March 30th, 2021|

Cybersecurity Basics: What is Spyware?

What is Spyware? With today’s massive shift to remote work, organizations have to be acutely aware of the new and ever-evolving threat landscape that poses new risks and vulnerabilities to the security of an organization’s sensitive information. Many organizations may be unaware, but one of the primary vulnerabilities malicious entities target to gain access to an organization is the organization’s ...

2021-03-18T06:49:26-04:00March 18th, 2021|
Go to Top