About Eric Clay

This author has not yet filled in any details.
So far Eric Clay has created 24 blog entries.

CMMC Compliance: The Complete Guide

The Complete Guide to CMMC Compliance Companies face a lot of responsibilities when working with data. Tracking use, managing backups, and ensuring integrity are all essential for controlling data flows and maintaining best practices. Any companies that want to keep data secure generally follow specific guidelines to ensure they don’t make common mistakes or fail to understand important procedures. When it ...

2022-08-14T14:59:04-04:00August 14th, 2022|

Social Engineering Attacks: 5 Things You Need to Know in 2022

Social Engineering Attacks: 5 Things You Need to Know Modern businesses must go to great lengths to protect themselves against the ongoing dangers presented by cybercrime. The wrong software stack, employee, or website can leave networks and systems vulnerable, compromising the organization’s capacity to deliver service. Understanding potential threats and how to mitigate them is essential for creating resilient business models. ...

2022-06-27T13:29:35-04:00June 27th, 2022|

10 Essential Steps for Data Backups

For many businesses, digital information represents core assets that they rely on for keeping track of users, providing services, and fixing problems. However, these assets can be easily compromised by simple user error or targeted malicious activities. Backups offer IT directors and cybersecurity professionals a means to deal with data loss before it’s too late. According to a University of Maryland ...

2022-06-27T13:28:03-04:00June 27th, 2022|

Enterprise Phishing: Key Considerations for 2022

A data breach is unauthorized access or release of sensitive information. This can be anything from a customer's bank records to credit or debit card details, social security numbers, or passwords. Any information shared with a company and used for business purposes can be vulnerable to a data breach. Why Should Businesses Care About Data Breaches? Data breaches are an ever-present ...

2022-06-23T18:47:00-04:00March 14th, 2022|

The Threat of Ransomware Attacks and other Cyberattacks from the Ukraine Crisis

Since the Russo-Ukrainian conflict was initiated by Vladimir Putin on February 24th, 2022, the world has been watching. While much of the news coverage has centered around the physical battles being fought on the streets of Ukraine, cyberattacks have been a major component of Russia’s offensive initiative. Just weeks before Russia attacked Ukraine unprovoked, threat actors surreptitiously deployed several different ...

2022-03-03T10:46:56-05:00March 3rd, 2022|

Cybersecurity Risk Management — Your Questions Answered

Cybersecurity Risk Management — Your Questions Answered The digital world expands every day, and the power technology holds over the workplace grows with it. As technology permeates professional life and digital storage becomes the norm, the impact of cyber threats grows ever-greater. Without proper precautions, your organization faces great risk. How Does a Cybersecurity Risk Management Service Benefit Me? Even in ...

2022-02-28T09:57:34-05:00February 28th, 2022|

Log4J: The Importance of Layered Security

As many of you know, a vulnerability recently came to light called Log4Shell which takes advantage of a Java library vulnerability used by organizations and devices around the world. It has been labeled CVE-2021-44228. Many Fortune 100 tech companies rely on this library along with small and mid-sized organizations. Criminal actors are already racing to find ways to abuse this to ...

2021-12-16T15:53:47-05:00December 15th, 2021|

Cybersecurity for Financial Services

Cybersecurity for Financial Services: Best Practices The financial services industry is highly regulated and highly susceptible to cyberattacks by threat actors. Data breaches have grown larger, more frequent, and more expensive over time and the financial services industry has struggled to keep up with attacks. Financial institutions can spend an enormous amount of their revenue on their IT infrastructure. According ...

2022-02-16T21:40:46-05:00July 16th, 2021|

NIST Incident Response Plan: How to build your IRP

The NIST Incident Response Plan What happens if you implement a cybersecurity framework and still have an incident or a breach? Unfortunately in cybersecurity, you can never be 100% secure. You will always be at some risk of an incident. Even the most sophisticated cybersecurity systems in the world carry a degree of risk. However, an incident doesn’t have to be ...

2022-02-16T21:38:46-05:00July 12th, 2021|

How to Prevent Ransomware: The Definitive Guide

Ransomware is becoming a more serious threat to companies all around the world. This guide from Touchstone Security will define what ransomware is and why the proliferation of ransomware is placing many businesses at risk. This increased risk isn't due to an especially dangerous modern variant of coding. Instead, it’s because ransomware is now much more available than it has ever ...

2021-05-15T01:01:40-04:00March 30th, 2021|
Go to Top