About Eric Clay

This author has not yet filled in any details.
So far Eric Clay has created 30 blog entries.

Cybersecurity Threats: What you need to know in 2021

Cybersecurity Threats 2021 Today, organizations are faced with incredible challenges when it comes to protecting their sensitive information and intellectual property. Through data breaches and other malicious activity, organizations are losing massive amounts of sensitive data and suffering financial losses on the order of billions globally. Even with the advanced data security measures and data protection strategies that we have access ...

2021-05-17T11:15:32-04:00March 12th, 2021|

Cloud Cybersecurity: What you need to Know

Cloud Cybersecurity The migration into public cloud computing is on the rise. Over the past five to ten years, the public cloud has grown on average around 20% year-over-year with a projected growth of 27 percent in 2021. This incredible growth has proven that the public cloud is going to continue to be a major component of today’s businesses. And the value ...

2021-03-04T13:28:35-05:00March 4th, 2021|

Risk Matrix: What you need to Know

What is a Risk Matrix? A risk matrix is a risk assessment tool that is used to visualize the likelihood of a risk occurring. You can think of a risk matrix like the upper right quadrant of a cartesian graph. The x-axis of a risk matrix denotes the likelihood of an occurrence taking place, and the y-axis would denote the ...

2021-02-16T12:15:02-05:00February 23rd, 2021|

The Future of Cybersecurity

The Future of Cybersecurity As any technology-focused business leader knows, we as a society are in what seems to be a constant battle to develop new unique solutions to prevent cybercriminals from gaining access and exploiting an organization’s data. As our global economy adopts new technologies to enhance global business processes, create new technological solutions, and use technology to interact ...

2021-09-10T13:58:28-04:00February 16th, 2021|

Cybersecurity Tools: What you need to know in 2021

Cybersecurity Tools Cybersecurity tools are software solutions, appliance-based solutions, and security strategies that together create an integrated, cohesive data security posture. The right tools can limit cybercrime, the risk of data breaches, malicious user activity, malware, ransomware, phishing attacks, and other modernized threats to today’s technology-focused organizations. Why Do Organizations Need Cybersecurity Tools? Today, modern business is becoming more technology-dependent ...

2021-02-10T16:56:27-05:00February 10th, 2021|

Basic Cyber Hygiene: What you need to know in 2021

Basic Cyber Hygiene - Cybersecurity Basics Here we describe basic cyber hygiene - the bare minimum any company should be doing regardless of size to protect itself from cyberattacks and liability. These items should be seen as a starting point - a way to begin making yourself safer as you work towards a full cybersecurity program and compliance. At Touchstone ...

2021-01-06T12:31:43-05:00January 6th, 2021|

Horizontal vs Vertical Scaling: What you need to know

Horizontal vs Vertical Scaling To scale up or scale out? That is the question. When your business is growing and your applications need to expand accessibility, power, and performance, you have two options to meet the challenge — horizontal scaling and vertical scaling. This Touchstone blog will help you answer that question: “Should my business scale up or scale out?” What ...

2021-02-10T13:54:22-05:00December 22nd, 2020|

What are the costs of cloud migration? 

The Cost of a Cloud Migration Many businesses are evaluating the advantages of moving on-premises IT infrastructure to cloud computing, from startups to seasoned corporations and small to large-scale organizations. Many of our clients have discovered that making this change has a variety of advantages, including increased flexibility, scalability, and cost savings. It's critical to understand both the possible costs ...

2021-09-20T12:46:41-04:00December 16th, 2020|

Incident Response Plan: Create One Today

What happens if you implement a cybersecurity framework and still have an incident or a breach? Unfortunately in cybersecurity, you can never be 100% secure. You will always be at some risk of an incident. Even the most sophisticated cybersecurity systems in the world carry a degree of risk. However, an incident doesn’t have to be devastating. With proper root cause ...

2020-12-17T14:29:29-05:00November 30th, 2020|

Cybersecurity Risk Management: A Primer

Cybersecurity risk management is a critical topic for small businesses, mid-sized businesses, and enterprises. Cyber attacks against U.S. businesses are growing substantially every year. In fact, businesses in almost all industries and sectors are seeing a year over year increase in cyber threats that result in breaches of sensitive data. Unfortunately, you probably don’t have an unlimited budget for your information ...

2021-08-12T13:01:02-04:00November 14th, 2020|
Go to Top