Blog

What Is Passwordless Authentication?

Passwordless authentication ushers in a new age in security. A large percentage of data breaches are caused by passwords that are incorrectly set. Furthermore, forgotten passwords cost businesses a lot of money since users are unable to access important apps.   While solutions like multi-factor authentication have helped to decrease cyber-attacks, passwordless architecture offers businesses huge potential to increase employee productivity ...

2022-02-16T23:01:21-05:00August 4th, 2021|

Microsoft Print Spooler Patch and Security Implications

Microsoft Print Spooler Patch and Security Implications from Unpatched Systems At the start of July 2021, Microsoft began rolling out an emergency patch to resolve a critical vulnerability in its Windows Print Spooler service. Nicknamed PrintNightmare, the flaw was unintentionally disclosed when security researchers accidentally published exploit code. Whereas the Redmond-based tech behemoth has issued security updates to address the gap, ...

2022-02-16T23:06:34-05:00July 23rd, 2021|

Cybersecurity for Financial Services

Cybersecurity for Financial Services: Best Practices The financial services industry is highly regulated and highly susceptible to cyberattacks by threat actors. Data breaches have grown larger, more frequent, and more expensive over time and the financial services industry has struggled to keep up with attacks. Financial institutions can spend an enormous amount of their revenue on their IT infrastructure. According ...

2022-02-16T21:40:46-05:00July 16th, 2021|

NIST Incident Response Plan: How to build your IRP

The NIST Incident Response Plan What happens if you implement a cybersecurity framework and still have an incident or a breach? Unfortunately in cybersecurity, you can never be 100% secure. You will always be at some risk of an incident. Even the most sophisticated cybersecurity systems in the world carry a degree of risk. However, an incident doesn’t have to ...

2023-05-18T20:00:02-04:00July 12th, 2021|

How to Prevent Ransomware: The Definitive Guide

Ransomware is becoming a more serious threat to companies all around the world. This guide from Touchstone Security will define what ransomware is and why the proliferation of ransomware is placing many businesses at risk. This increased risk isn't due to an especially dangerous modern variant of coding. Instead, it’s because ransomware is now much more available than it has ever ...

2021-05-15T01:01:40-04:00March 30th, 2021|

Cybersecurity Threats: What you need to know in 2021

Cybersecurity Threats 2021 Today, organizations are faced with incredible challenges when it comes to protecting their sensitive information and intellectual property. Through data breaches and other malicious activity, organizations are losing massive amounts of sensitive data and suffering financial losses on the order of billions globally. Even with the advanced data security measures and data protection strategies that we have access ...

2021-05-17T11:15:32-04:00March 12th, 2021|

Cloud Cybersecurity: What you need to Know

Cloud Cybersecurity The migration into public cloud computing is on the rise. Over the past five to ten years, the public cloud has grown on average around 20% year-over-year with a projected growth of 27 percent in 2021. This incredible growth has proven that the public cloud is going to continue to be a major component of today’s businesses. And the value ...

2021-03-04T13:28:35-05:00March 4th, 2021|

Risk Matrix: What you need to Know

What is a Risk Matrix? A risk matrix is a risk assessment tool that is used to visualize the likelihood of a risk occurring. You can think of a risk matrix like the upper right quadrant of a cartesian graph. The x-axis of a risk matrix denotes the likelihood of an occurrence taking place, and the y-axis would denote the ...

2021-02-16T12:15:02-05:00February 23rd, 2021|

Cybersecurity Tools: What you need to know in 2021

Cybersecurity Tools Cybersecurity tools are software solutions, appliance-based solutions, and security strategies that together create an integrated, cohesive data security posture. The right tools can limit cybercrime, the risk of data breaches, malicious user activity, malware, ransomware, phishing attacks, and other modernized threats to today’s technology-focused organizations. Why Do Organizations Need Cybersecurity Tools? Today, modern business is becoming more technology-dependent ...

2021-02-10T16:56:27-05:00February 10th, 2021|

Horizontal vs Vertical Scaling: What you need to know

Horizontal vs Vertical Scaling To scale up or scale out? That is the question. When your business is growing and your applications need to expand accessibility, power, and performance, you have two options to meet the challenge — horizontal scaling and vertical scaling. This Touchstone blog will help you answer that question: “Should my business scale up or scale out?” What ...

2021-02-10T13:54:22-05:00December 22nd, 2020|
Go to Top