
About Us
Lighting The Way
TorchLight was founded in 2007 as an IT security first organization. Since then, we’ve helped shape IT policy, governance and management from 2 employee startups to 500 bed hospitals all over the United States. We pride ourselves in our Culture and consider it a key differentiator of our business:
Candor
Accountability
Service
Proactive Communication
Growth Mindset
The Way Forward – TorchLight Blog
-

New NIST Guidelines Offer Starting Point for Cybersecurity
Important highlights about the National Institute of Standards and Technology (NIST) update of its guidance to organizations for assessing their internal security IT system.
-

Customer Testimonial: WETA
The proactive nature of the WETA’s leadership, spearheaded by Ken Jones (Senior Director, IT), drove WETA to form a partnership with TorchLight to ensure appropriate support for an infosec foundation as effective—and agile—as the ever-evolving threats and risks it faces.
-

Statement on Russia Cyberattacks
While we are aware of no specific or credible Russian cyber threats to the United States at this time, CISA recommends that organizations continue to be prepared to respond to any disruptive cyber activity.
-

Why Zero Trust is Essential for Remote Work
The rise of Zero Trust has helped businesses remain secure – even in remote working environments. Here are a few things that you should know about zero trust for your business and why it is essential for remaining cyber secure in both hybrid and remote workspaces.
-

Financial Institutions and Ransomware
Get ahead of attackers and protect valuable assets from impending ransomware attacks. Here are a few things that financial institutions should know about ransomware – its current trends, targets, and tactics.
-

Enterprise Business and Ransomware
The manufacturing industry has embraced automation and digitization as timelines have gotten tighter and business continuity has become essential. These aspects, along with the high-value data that manufacturing enterprises own (intellectual property, trade secrets, etc.) have made these types of companies more attractive cyber attack targets. Keep your supply chain running smoothly by protecting against…
-

Manufacturing and Ransomware
The manufacturing industry has embraced automation and digitization as timelines have gotten tighter and business continuity has become essential. These aspects, along with the high-value data that manufacturing enterprises own (intellectual property, trade secrets, etc.) have made these types of companies more attractive cyber attack targets. Keep your supply chain running smoothly by protecting against…
-

Healthcare and Ransomware
For the past several years, healthcare systems and hospitals have been high-profile victims of ransomware and other attacks. Find out what vectors for ransomware the healthcare sector faces.
-

SUEX, Crypto, and Ransomware
This year, the cryptocurrency platform SUEX was the first to be identified and sanctioned by the U.S. Government for its role in the ransomware payment chain, but it will likely not be the last. Here’s what you should know about SUEX and other cryptocurrencies.
-

Email Security in Ransomware Defense
Email security is an essential first step in patching vulnerabilities and protecting your business from malware and ransomware threats.
