Make IT and Cybersecurity Boring

Focus on growing your business while we keep your IT and cybersecurity running smoothly. Partner with TorchLight to eliminate the noise, simplify your tech, and make growth feel effortless.

“TorchLight has been more than a vendor to our multi-branch Credit Union, they are more like our partner. Our relationship with TorchLight dates back to 2007 when we were one of their very first clients who worked with them on a security assessment and gap analysis. TorchLight has worked with us ever since to help us achieve success for its employees and members through technology. They continue to strategically align with us to provide a full suite of services and have continued to deliver for almost 20 years.”

– Annettee Babb, CEO, PrimeSource Credit Union

Torchlight Managed & Securited IT Logo
  • The Year Systems Broke and Why 2026 Demands Action

    The Year Systems Broke and Why 2026 Demands Action

    If you assumed your security controls were working in 2025, you weren’t alone. So did 99% of defense contractors who failed CMMC compliance. So did organizations running on AWS when a 15-hour DNS error took down their operations.

  • Evolving With the Threats: Strengthening Your Security Posture with EDR and ITDR

    Evolving With the Threats: Strengthening Your Security Posture with EDR and ITDR

    Pen testing shows vulnerabilities at a moment in time. It is an important part of any security program, but threats do not wait for annual assessments. Attackers move continuously, often quietly, and increasingly through identities and endpoints rather than traditional network perimeters.

  • Payment Remittance Phishing Attacks Security Bulletin

    Over the past several days, the TorchLight Security Operations Center has observed a rapid escalation in payment remittance phishing attacks targeting end users across multiple industries. While these phishing techniques aren’t new, the scale and frequency of this week’s activity represent a significant shift in threat actor behavior. In this post, we break down what these attacks look like, how to spot them, and what steps your team should take to stay protected.

  • What Palo Alto’s Breach Teaches About Protecting SaaS Applications

    In August, Palo Alto Networks got breached. Not through their firewall. Not through phishing. Through a Salesforce integration. Over 700 organizations were affected. And their security tools never saw it coming.

  • Strategic Guidance – Getting The Most From Your Pen Test Report

    It’s Q4 and pen test reports are piling up. Most companies scan for critical findings, patch them, and move on. But those medium and low-risk findings everyone ignores? They’re revealing where your security posture is quietly deteriorating. Gary Blosser, our vCISO and Principal Security Architect, shows you how to extract real value from every section of your pen test report and why strategic guidance beats simple report delivery.

  • Docusign Phishing Attacks Security Bulletin

    The TorchLight Security Operations Center has seen a massive increase in fake Docusign phishing emails since Monday of this week. While these threat vectors has been in use since early 2024, the massive rise in attacks this week is real. At this point, consider all Docusign emails to be hostile and must be carefully reviewed to ensure they are legitimate.