About Eric Clay

This author has not yet filled in any details.
So far Eric Clay has created 26 blog entries.

Types of Penetration Testing: What you need to know

Types of Penetration Testing Securing your business and its data from cyber-attacks and threat actors has never been more challenging. You need a strategic cybersecurity plan, experienced personnel, and well-managed cyber resources. End users and staff utilizing your business network need comprehensive security awareness training on the dangers of common cyber threats that can originate from phishing emails, smartphones, unsafe ...

2021-06-07T21:21:05-04:00June 7th, 2021|

Network Security Tips for Small Business

Network Security Tips for Small Business While large corporate organizations are targeted by malicious actors on a regular basis, small businesses are the ones that are most in danger of losing money, data and even shutting their doors in the event of a cyber attack. Small businesses are ideal targets for threat actors because they often do not invest in ...

2021-06-02T13:13:25-04:00June 2nd, 2021|

How To Prevent a Distributed Denial-of-Service (DDoS) Attack: A Definitive Guide

DDoS attacks, among other cybersecurity and cloud security vulnerabilities, have increased in size, scope, and frequency in recent years. According to a Kaspersky Lab survey, DDoS attacks increased by 80% in the first quarter of 2020 relative to the same quarter of 2019. According to research, the typical DDoS attack in 2021 will use more than 1 Gbps of data, ...

2021-05-17T16:28:25-04:00May 17th, 2021|

What is a Data Breach? A Complete Guide

A data breach occurs when protected or private/confidential information is released to an untrusted environment, whether intentionally or unintentionally. Unintentional database exposure, data theft, information leakage, and data spill are also common terminology used to describe this type of cybersecurity breach. The repercussions of a data breach are often severe for individuals, enterprise businesses, small businesses, and government agencies. A minor ...

2021-05-03T21:24:55-04:00May 3rd, 2021|

Zero Trust Architecture Explained

What Is Zero Trust Architecture? Zero Trust Architecture (Zero Trust approach) is a security model that argues there is no implicit trust provided to user accounts or properties depending on their network or physical location, or on their possession of the asset. To comply with the NIST (National Institute of Standards and Technology) Zero Trust approach, both the system and the ...

2021-05-01T21:12:08-04:00May 1st, 2021|

Adware: The Basics

What is Adware? Adware is a form of malicious software installed on your computer, laptop or cell phone that displays unwanted advertisements on your device. Adware commonly presents in the form of popups but it can also install unwanted toolbars on your computer's internet browser or even change your browser settings and homepage. It can also place spyware on your ...

2021-04-08T13:44:11-04:00April 8th, 2021|

How to Prevent Ransomware: The Definitive Guide

Ransomware is becoming a more serious threat to companies all around the world. This guide from Touchstone Security will define what ransomware is and why the proliferation of ransomware is placing many businesses at risk. This increased risk isn't due to an especially dangerous modern variant of coding. Instead, it’s because ransomware is now much more available than it has ever ...

2021-05-15T01:01:40-04:00March 30th, 2021|

Cybersecurity Basics: What is Spyware?

What is Spyware? With today’s massive shift to remote work, organizations have to be acutely aware of the new and ever-evolving threat landscape that poses new risks and vulnerabilities to the security of an organization’s sensitive information. Many organizations may be unaware, but one of the primary vulnerabilities malicious entities target to gain access to an organization is the organization’s ...

2021-03-18T06:49:26-04:00March 18th, 2021|

Cybersecurity Threats: What you need to know in 2021

Cybersecurity Threats 2021 Today, organizations are faced with incredible challenges when it comes to protecting their sensitive information and intellectual property. Through data breaches and other malicious activity, organizations are losing massive amounts of sensitive data and suffering financial losses on the order of billions globally. Even with the advanced data security measures and data protection strategies that we have access ...

2021-05-17T11:15:32-04:00March 12th, 2021|

Cloud Cybersecurity: What you need to Know

Cloud Cybersecurity The migration into public cloud computing is on the rise. Over the past five to ten years, the public cloud has grown on average around 20% year-over-year with a projected growth of 27 percent in 2021. This incredible growth has proven that the public cloud is going to continue to be a major component of today’s businesses. And the value ...

2021-03-04T13:28:35-05:00March 4th, 2021|
Go to Top