marketing

About Eric Clay

This author has not yet filled in any details.
So far Eric Clay has created 34 blog entries.

Cybersecurity Threats: What you need to know in 2021

Cybersecurity Threats 2021 Today, organizations are faced with incredible challenges when it comes to protecting their sensitive information and intellectual property. Through data breaches and other malicious activity, organizations are losing massive amounts of sensitive data and suffering financial losses on the order of billions globally. Even with the advanced data security measures and data protection strategies that we have access ...

2021-05-17T11:15:32-04:00March 12th, 2021|

Cloud Cybersecurity: What you need to Know

Cloud Cybersecurity The migration into public cloud computing is on the rise. Over the past five to ten years, the public cloud has grown on average around 20% year-over-year with a projected growth of 27 percent in 2021. This incredible growth has proven that the public cloud is going to continue to be a major component of today’s businesses. And the value ...

2021-03-04T13:28:35-05:00March 4th, 2021|

Risk Matrix: What you need to Know

What is a Risk Matrix? A risk matrix is a risk assessment tool that is used to visualize the likelihood of a risk occurring. You can think of a risk matrix like the upper right quadrant of a cartesian graph. The x-axis of a risk matrix denotes the likelihood of an occurrence taking place, and the y-axis would denote the ...

2021-02-16T12:15:02-05:00February 23rd, 2021|

Cybersecurity Tools: What you need to know in 2021

Cybersecurity Tools Cybersecurity tools are software solutions, appliance-based solutions, and security strategies that together create an integrated, cohesive data security posture. The right tools can limit cybercrime, the risk of data breaches, malicious user activity, malware, ransomware, phishing attacks, and other modernized threats to today’s technology-focused organizations. Why Do Organizations Need Cybersecurity Tools? Today, modern business is becoming more technology-dependent ...

2021-02-10T16:56:27-05:00February 10th, 2021|

Horizontal vs Vertical Scaling: What you need to know

Horizontal vs Vertical Scaling To scale up or scale out? That is the question. When your business is growing and your applications need to expand accessibility, power, and performance, you have two options to meet the challenge — horizontal scaling and vertical scaling. This Touchstone blog will help you answer that question: “Should my business scale up or scale out?” What ...

2021-02-10T13:54:22-05:00December 22nd, 2020|

What are the costs of cloud migration? 

The Cost of a Cloud Migration Many businesses are evaluating the advantages of moving on-premises IT infrastructure to cloud computing, from startups to seasoned corporations and small to large-scale organizations. Many of our clients have discovered that making this change has a variety of advantages, including increased flexibility, scalability, and cost savings. It's critical to understand both the possible costs and ...

2022-02-16T20:48:34-05:00December 16th, 2020|

Cybersecurity Risk Management: A Primer

Cybersecurity risk management is a critical topic for small businesses, mid-sized businesses, and enterprises. Cyber attacks against U.S. businesses are growing substantially every year. In fact, businesses in almost all industries and sectors are seeing a year over year increase in cyber threats that result in breaches of sensitive data. Unfortunately, you probably don’t have an unlimited budget for your information ...

2021-08-12T13:01:02-04:00November 14th, 2020|

The Rise of Ransomware as a Service

Ransomware is an increasing risk to businesses around the world. This Touchstone Security guide will explain what ransomware is, and why the rise of Ransomware as a Service is putting many organizations increasingly at risk. This isn’t due to some new variant of code that is particularly damaging. Instead it’s due to the fact that Ransomware is now much more ...

2020-09-18T13:16:47-04:00September 18th, 2020|

A Quick Guide to Cybersecurity for Small Business

For many company's, cybersecurity is still an abstract concept, something they think they may have to deal with later but right now they are too small to be a target. Unfortunately this is less and less the case. Hackers are increasingly focusing on small and mid-sized businesses who lack the enterprise grade protection that many larger companies enjoy. But that ...

2020-10-18T19:13:14-04:00September 14th, 2020|

Why you should conduct a Network Security Audit

So far in 2020, the HIPAA Breach Reporting Tool has reported over 100 breaches affecting millions of people under the care of doctors offices and healthcare practices around the United States. Data breaches impact the lives of many people and tarnish the reputations of companies and organizations affected. Consumers begin to lose faith in groups with security breaches — this results ...

2020-08-21T11:24:11-04:00August 21st, 2020|
Go to Top