TruShield Security Solutions

With over 25 years of industry experience, TruShield delivers cost-effective, high quality security

Cybersecurity sector continues to heat up 06/04/2019

Cybersecurity sector continues to heat up

In case you missed it, read about Avertium in the Washington Post as the cybersecurity sector continues to intensify. https://wapo.st/2HU09SQ

Cybersecurity sector continues to heat up Two D.C.-area companies announced deals recently.

05/30/2019

www.linkedin.com

On May 30, 2019 TruShield Security Solutions changed its corporate identity to Avertium. Please follow our official company page here: https://www.linkedin.com/company/avertium-cybersecurity

Sunstone Partners, a leading growth equity firm, acquired Terra Verde Security LLC, TruShield Security Solutions and Sword & Shield Enterprise Security and formed one combined company: Avertium – the new cyber element.

Avertium will focus its comprehensive expertise on supporting mid-to-large enterprises, making it one of the largest managed cybersecurity services companies focused on this market.

Avertium will be led by Jeff Schmidt, a security industry veteran, who has previously held executive leadership roles at a variety of successful technology and security companies, including International Network Services, All Covered, BT Counterpane, SQS, and Authomate.

Avertium is a leading provider of managed cybersecurity services with more than 150 employees and growing, and security operations centers in Arizona and Tennessee, the company serves more than 1,000 customers in the retail, healthcare, hospitality, financial services, manufacturing and government sectors. For more information and career opportunities, visit https://www.avertium.com/

www.linkedin.com

Timeline photos 08/17/2017

Watch this on-demand webinar to find out what you should be doing to remain SEC/FINRA compliant and ensure the integrity, resiliency, and capacity of your infrastructure: http://ow.ly/e9aB307Z2pN

Timeline photos 08/17/2017

Are you at too? Make sure to visit us at booth 806! Matt and Patrick are available to chat ow.ly/5LkD30dKOk4

Timeline photos 08/16/2017

A company’s investment in firewalls, encryption, password protections and other security measures can be completely undermined, even by accident, by a single employee. http://ow.ly/abCz30e7idS

Timeline photos 08/16/2017

Many companies assume they are too small to be the target of cybercrime. While the monetary gain is a huge factor that drive cyberattacks, there are many other reasons that systems are compromised. Find out what your options are to mitigate these risks: http://ow.ly/lTtn30dvW6o

How to Create a Strong Password 08/16/2017

How to Create a Strong Password

Your enemy isn’t some guy in a ski mask trying to guess your password one try at a time.

How to Create a Strong Password The U.S. government recently revamped its password recommendations, abandoning its endorsement of picking a favorite phrase and replacing a couple...

Timeline photos 08/15/2017

Are you at ? Come visit us at booth 806! Matt and Patrick are available to chat! ow.ly/5LkD30dKOk4

Timeline photos 08/15/2017

A common problem is incomplete SIEM integration of devices or data sources in the environment. Find out other common problems in our latest blog post http://ow.ly/Xw3S30eocoU

Timeline photos 08/14/2017

Cybercriminals have not been found to discriminate the type of business from which they chose to steal data. Find out which 2017 trends your company should be on the lookout for: http://ow.ly/YV9i30bA0su

Timeline photos 08/13/2017

Find out the Top 6 Cybersecurity Secrets that a Credit Union should know in this on-demand webinar: http://ow.ly/VoDG305YYoT

Timeline photos 08/12/2017

Law firms have enticing data that cybercriminals want, is your firm able to withstand an attack? http://ow.ly/5DzZ30dRHjT

Timeline photos 08/12/2017

Looking forward to in Las Vegas this coming week! Make sure you visit us at booth 806 and check out our awesome raffle prize! Hint- it will spin you right round... http://ow.ly/5LkD30dKOk4

Timeline photos 08/11/2017

Over-Reliance on Prevention- our reason #2 why cybersecurity is ongoing project. Find more here: http://ow.ly/FP5830dU6vz

Timeline photos 08/11/2017

Legal firms can Learn How to Create an Effective and Successful Long-Term Cyberstrategy in this on-demand webinar: http://ow.ly/hELC306jGpB

NIST Releases Cybersecurity Definitions for the Workforce 08/10/2017

NIST Releases Cybersecurity Definitions for the Workforce

The NICE Cybersecurity Workforce Framework improves communication, about how to identify, recruit, develop, and retain cyber security talent

NIST Releases Cybersecurity Definitions for the Workforce In an effort to bring consistency when describing the tasks, duties, roles, and titles of cybersecurity professionals, the National Institute of...

Timeline photos 08/10/2017

Are you ready for Vegas? We are! We are packing our bags for and will be at booth 806 so make sure to visit us! http://ow.ly/5LkD30dKOk4

Why state and local government still struggle with cybersecurity -- GCN 08/10/2017

Why state and local government still struggle with cybersecurity -- GCN

Unfortunately, it’s very difficult for any government entity to have a 100 percent effective security.

Why state and local government still struggle with cybersecurity -- GCN In addition to mitigating malware and phishing attacks, agencies must build domain name system resilience into their risk management programs.

Timeline photos 08/10/2017

Increased number of nuclear power plants and reactors dramatically increases the risks associated with the facilities, more so if the network is unsecured properly and in the event of a cyberattack. What you should know about SCADA devices http://ow.ly/uhaV30ayP6P

08/10/2017

A new research has revealed that cyber criminals and hackers are not as anonymous as we think

Understanding the human aspects of cybercriminals - where they live, what they do, who they know, how they are organised and operate - is key to addressing the problem in a more complete way

A new research has revealed that cyber criminals and hackers are not as anonymous as we think Those faceless hackers who operate behind thick curtains of binary language and breach your computer to ask for ransom may not be as anonymous...

Timeline photos 08/09/2017

Many companies assume they are too small to be the target of cybercrime. While the monetary gain is a huge factor that drive cyberattacks, there are many other reasons that systems are compromised. Find out what your options are to mitigate these risks: http://ow.ly/lTtn30dvW6o

Report: The US government has a massive footprint on the darknet 08/09/2017

Report: The US government has a massive footprint on the darknet

It's unfortunate when corporate data is leaked, but it's dangerous when it's the government.

Report: The US government has a massive footprint on the darknet Like commercial entities, government agencies have a tendency to find their secrets leaked to the dark web. Unfortunately, US government secrets...

There's a Simple New Way to Find Out if Hackers Already Have Your Password 08/09/2017

There's a Simple New Way to Find Out if Hackers Already Have Your Password

This website lets people check to see if their email addresses & usernames have been involved in a data breach

There's a Simple New Way to Find Out if Hackers Already Have Your Password Passwords suck. They're hard to remember, we all have about a million of them, and they're not supposed to be anything easy or memorable like your...

Timeline photos 08/08/2017

With 50 billion security events collected and analyzed every day and 27 ransomware strains stopped daily, find out how TruShield can help mitigate risk at your law firm: http://ow.ly/5DzZ30dRHjT

Timeline photos 08/08/2017

What should a SEC or FINRA registrant know about cybersecurity? Find out by watching our on-demand with BW Cyber and SECCC: http://ow.ly/e9aB307Z2pN

Timeline photos 08/07/2017

Increased number of nuclear power plants and reactors dramatically increases the risks associated with the facilities, more so if the network is unsecured properly and in the event of a cyberattack. What you should know about SCADA devices http://ow.ly/uhaV30ayP6P

Timeline photos 08/07/2017

Looking forward to in Las Vegas this year, make sure you visit us at booth 806 and check out our awesome raffle prize! Hint- it will spin you right round... http://ow.ly/5LkD30dKOk4

Timeline photos 08/07/2017

A company’s investment in firewalls, encryption, password protections and other security measures can be completely undermined, even by accident, by a single employee. http://ow.ly/abCz30e7idS

Timeline photos 08/06/2017

A company’s investment in firewalls, encryption, password protections and other security measures can be completely undermined, even by accident, by a single employee. http://ow.ly/abCz30e7idS

“Worse than death:” The far-future dystopia of genome hacking 08/06/2017

“Worse than death:” The far-future dystopia of genome hacking

What if, by investing in hacking the human genome for good, we’ve opened it up to be hacked for evil?

“Worse than death:” The far-future dystopia of genome hacking This scientist’s thought experiment will give you nightmares.

Hackers Can Turn Some Amazon Echo Models Into Bugging Devices 08/05/2017

Hackers Can Turn Some Amazon Echo Models Into Bugging Devices

A security researcher has found a way to hack into older units of Amazon's Echo, in a way that could turn the microphone-equipped device into a bug http://ow.ly/qR2630e6Zw2

Hackers Can Turn Some Amazon Echo Models Into Bugging Devices A security researcher has shown how to turn pre-2017 models of the Amazon Echo into a bugging device.

Timeline photos 08/05/2017

Whether criminals are looking for credit card information to sell on the black market, insider information to make illicit trades, or private details they can use for political gain, they are working extremely hard to access your systems. Find out how you can protect your investments http://ow.ly/5WdX30dKPa5

08/04/2017

32 percent of companies hit by at least one malware attack last year, one fifth had to completely stop operations immediately. http://ow.ly/hgXz30e6YHm

Videos (show all)

Telephone

Address


22375 Broderick Drive, Ste 100
Sterling, VA
20166

Other Business Services in Sterling (show all)
i3solutions i3solutions
21515 Ridgetop Cir Ste 260
Sterling, 20166

i3solutions creates digital experiences that helps customers use data to improve decision-making, productivity & business processes

Dulles Electric Supply Dulles Electric Supply
22570 Shaw Road
Sterling, 20166

Dulles Electric Supply Has Been a Leader in the Lighting Industry Since 1985

ArchiBIM, Inc. - Renderings, Scale Models, BIM ArchiBIM, Inc. - Renderings, Scale Models, BIM
22135 Davis Drive
Sterling, 20164

One-Stop Shop for every Developer, Home Builder, Architect, Marketing Agency.

ColorCraft of Virginia ColorCraft of Virginia
22645 Sally Ride Drive
Sterling, 20164

Commercial & Digital Printer while also functioning as a Marketing Service Provider.

Environmental Enhancements, Inc. Environmental Enhancements, Inc.
22311 Shaw Road, Suite C
Sterling, 20166

EE provides landscape services for property managers, data centers, HOAs, and high-end residences.

econopcs.com econopcs.com
101 E Holly Avenue Ste 14
Sterling, 20164

Econo PC Services Inc, Is a Small Family Own Business, Serving the Norther VA Area Since 2005. We gi

Fox Pest Control - D.C. West Fox Pest Control - D.C. West
22560 Glenn Drive Ste. 116
Sterling, 20164

One summer job. Empowered for life.

Collaborative Testing Services Collaborative Testing Services
21331 Gentry Drive
Sterling, 20166

Founded in 1971; CTS continues to assist laboratories in meeting their quality assurance objectives

Gerson Landaverde Marketing Gerson Landaverde Marketing
206 Trail Ridge Court Sterling Va 20164
Sterling, 206

Hey World, This channel is about , Digital Marketing, Money Making Online and Online Businesses. Hop

Luxury Egyptian Linens Luxury Egyptian Linens
21010 Southbank Street, Suite 215
Sterling, 20166

We specialize in the finest 100% Egyptian Cotton First-class bed linens worthy of the most elite hot

Construction Bonds, Inc. a division of Murray Construction Bonds, Inc. a division of Murray
22365 Broderick Drive Suite 310
Sterling, 20166

Construction Bonds, Inc. works with customers to prepare the facts needed to acquire an accurate and

VRY Cleaning Services VRY Cleaning Services
6 Pidgeon Hill Drive
Sterling, 20165

We provide a better, cleaner, and safer environment for your employees and customers. Our main goal