About Eric Clay

This author has not yet filled in any details.
So far Eric Clay has created 29 blog entries.

Basic Cyber Hygiene: What you need to know in 2021

Basic Cyber Hygiene - Cybersecurity Basics Here we describe basic cyber hygiene - the bare minimum any company should be doing regardless of size to protect itself from cyberattacks and liability. These items should be seen as a starting point - a way to begin making yourself safer as you work towards a full cybersecurity program and compliance. At Touchstone ...

2021-01-06T12:31:43-05:00January 6th, 2021|

Horizontal vs Vertical Scaling: What you need to know

Horizontal vs Vertical Scaling To scale up or scale out? That is the question. When your business is growing and your applications need to expand accessibility, power, and performance, you have two options to meet the challenge — horizontal scaling and vertical scaling. This Touchstone blog will help you answer that question: “Should my business scale up or scale out?” What ...

2021-02-10T13:54:22-05:00December 22nd, 2020|

What are the costs of cloud migration? 

Many businesses, from startups to seasoned firms and small to large-scale organizations, are considering the benefits of migrating on-premises IT infrastructure to cloud computing. Many of our clients have found a number of benefits to such a move, including optimized flexibility, improved scalability, and reduced costs. Before you take the leap, it’s important to understand both the potential costs as ...

2020-12-16T16:24:46-05:00December 16th, 2020|

Incident Response Plan: Create One Today

What happens if you implement a cybersecurity framework and still have an incident or a breach? Unfortunately in cybersecurity, you can never be 100% secure. You will always be at some risk of an incident. Even the most sophisticated cybersecurity systems in the world carry a degree of risk. However, an incident doesn’t have to be devastating. With proper root cause ...

2020-12-17T14:29:29-05:00November 30th, 2020|

Cloud Security Best Practices

What is Cloud Security? Many businesses today are migrating their critical assets to the cloud. There are numerous benefits to cloud computing such as cost reduction, scalability, faster deployment, and flexibility. In terms of security, it is generally agreed that cloud computing offers less resource-intensive security options than traditional on-premise data centers. For instance, cloud computing enables multi-site redundancy, allowing a ...

2020-12-02T10:51:00-05:00November 17th, 2020|

Cybersecurity Risk Management: A Primer

Cybersecurity risk management is a critical topic for small businesses, mid-sized businesses, and enterprises. Cyber attacks against U.S. businesses are growing substantially every year. In fact, businesses in almost all industries and sectors are seeing a year over year increase in cyber threats that result in breaches of sensitive data. Unfortunately, you probably don’t have an unlimited budget for your information ...

2021-01-10T14:47:33-05:00November 14th, 2020|

Cybersecurity in Healthcare: 10 Critical Tips

Healthcare organizations are incredibly vulnerable to cyberattacks, and that presents a major risk factor for healthcare organizations. From large hospitals to small dental practices, each organization is susceptible to attack. Smaller healthcare organizations often have limited budgets to spend on cybersecurity, and large hospital networks can struggle to manage the complexity and volume of devices on their networks. Threats have ...

2020-11-03T11:01:17-05:00November 3rd, 2020|

NIST Cybersecurity Framework: A Comprehensive Guide

What is the NIST Cybersecurity Framework? Every single business, regardless of size or sector, should be concerned about cybersecurity. Statistically, attacks are becoming more common with every passing year as an increasing amount of business is conducted online. This Touchstone guide will cover what you need to know about the NIST Cybersecurity Framework in 2020. The NIST Cybersecurity Framework for ...

2020-12-17T14:34:33-05:00October 30th, 2020|

Data Backup Best Practices: The Complete Guide

Business Guide to Data Backup and Recovery Best Practices A well maintained, encrypted backup of your company's data is the best asset you can have in the event of a breach or disaster.  A University of Maryland study discovered that hackers attack every 39 seconds. That’s an average of 2,244 times a day. Ask yourself, what would happen if ...

2020-11-03T14:38:11-05:00September 30th, 2020|

The Rise of Ransomware as a Service

Ransomware is an increasing risk to businesses around the world. This Touchstone Security guide will explain what ransomware is, and why the rise of Ransomware as a Service is putting many organizations increasingly at risk. This isn’t due to some new variant of code that is particularly damaging. Instead it’s due to the fact that Ransomware is now much more ...

2020-09-18T13:16:47-04:00September 18th, 2020|
Go to Top