Blog

Incident Response Plan: Create One Today

What happens if you implement a cybersecurity framework and still have an incident or a breach? Unfortunately in cybersecurity, you can never be 100% secure. You will always be at some risk of an incident. Even the most sophisticated cybersecurity systems in the world carry a degree of risk. However, an incident doesn’t have to be devastating. With proper root cause ...

2020-11-30T11:49:25-05:00November 30th, 2020|

Cloud Security Best Practices

What is Cloud Security? Many businesses today are migrating their critical assets to the cloud. There are numerous benefits to cloud computing such as cost reduction, scalability, faster deployment, and flexibility. In terms of security, it is generally agreed that cloud computing offers less resource-intensive security options than traditional on-premise data centers. For instance, cloud computing enables multi-site redundancy, allowing a ...

2020-11-21T12:40:49-05:00November 17th, 2020|

Cybersecurity Risk Management: A Primer

Cybersecurity risk management is a critical topic for small businesses, mid-sized businesses, and enterprises. Cyber attacks against U.S. businesses are growing substantially every year. In fact, businesses in almost all industries and sectors are seeing a year over year increase in cyber threats that result in breaches of sensitive data. Unfortunately, you probably don’t have an unlimited budget for your ...

2020-11-14T13:46:39-05:00November 14th, 2020|

Cybersecurity in Healthcare: 10 Critical Tips

Healthcare organizations are incredibly vulnerable to cyberattacks, and that presents a major risk factor for healthcare organizations. From large hospitals to small dental practices, each organization is susceptible to attack. Smaller healthcare organizations often have limited budgets to spend on cybersecurity, and large hospital networks can struggle to manage the complexity and volume of devices on their networks. Threats have ...

2020-11-03T11:01:17-05:00November 3rd, 2020|

NIST Cybersecurity Framework: A Comprehensive Guide

What is the NIST Cybersecurity Framework? Every single business, regardless of size or sector, should be concerned about cybersecurity. Statistically, attacks are becoming more common with every passing year as an increasing amount of business is conducted online. This Touchstone guide will cover what you need to know about the NIST Cybersecurity Framework in 2020. The NIST Cybersecurity Framework for Improving ...

2020-10-30T16:55:26-04:00October 30th, 2020|

Data Backup Best Practices: The Complete Guide

Business Guide to Data Backup and Recovery Best Practices A well maintained, encrypted backup of your company's data is the best asset you can have in the event of a breach or disaster.  A University of Maryland study discovered that hackers attack every 39 seconds. That’s an average of 2,244 times a day. Ask yourself, what would happen if ...

2020-11-03T14:38:11-05:00September 30th, 2020|

The Rise of Ransomware as a Service

Ransomware is an increasing risk to businesses around the world. This Touchstone Security guide will explain what ransomware is, and why the rise of Ransomware as a Service is putting many organizations increasingly at risk. This isn’t due to some new variant of code that is particularly damaging. Instead it’s due to the fact that Ransomware is now much more ...

2020-09-18T13:16:47-04:00September 18th, 2020|

A Quick Guide to Cybersecurity for Small Business

For many company's, cybersecurity is still an abstract concept, something they think they may have to deal with later but right now they are too small to be a target. Unfortunately this is less and less the case. Hackers are increasingly focusing on small and mid-sized businesses who lack the enterprise grade protection that many larger companies enjoy. But that ...

2020-10-18T19:13:14-04:00September 14th, 2020|

8 Security Essentials for Small Business

Cybersecurity Essentials for Small Business If you own a small business you probably have a lot of concerns. Bookkeeping, human resources, liability Insurance, customer acquisition, and customer retention are probably all top of mind. However, it is important not to let cybersecurity get lost in the noise. In this article, we are going to outline 8 essential cybersecurity strategies that ...

2020-09-03T16:17:58-04:00September 3rd, 2020|

Why you should conduct a Network Security Audit

So far in 2020, the HIPAA Breach Reporting Tool has reported over 100 breaches affecting millions of people under the care of doctors offices and healthcare practices around the United States. Data breaches impact the lives of many people and tarnish the reputations of companies and organizations affected. Consumers begin to lose faith in groups with security breaches — this results ...

2020-08-21T11:24:11-04:00August 21st, 2020|
Go to Top