TechR2 Commits $1.4M to Stem Tide of Cyber Attacks, Creating Up to 50 Full-time Jobs in Central Ohio

[vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””]

Magazine Article

TechR2 Commits $1.4M to Stem Tide of Cyber Attacks, Creating Up to 50 Full-time Jobs in Central Ohio

By Tony Johnson
COO

Benzinga

[/vc_column_text][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””][button size=’small’ style=’color’ link=’https://www.benzinga.com/pressreleases/19/04/r13540717/techr2-commits-1-4m-to-stem-tide-of-cyber-attacks-creating-up-to-50-full-time-jobs-in-central-ohio’ linktarget=’_blank’ icon=”]View the Article[/button][/vc_column_text][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/3″ dp_animation=””][vc_column_text dp_animation=””]COLUMBUS, Ohio, April 15, 2019

As company crippling mega data breaches make headlines nearly daily, TechR2 is committing$1.4M</spa n> to install 1,000 Tear-A-Byte® data security solutions over the next 12 months to stem the tide of these debilitating cyber-attacks. TechR2’s pledge to abate the wave of cyber-crime will focus primarily on organizations being hit the hardest such as healthcare and financial service institutions, universities, and insurance companies.

TechR2’s patented Track-Contain-Destroy-Verify process is a state-of-the-art solution designed to ensure protection of an organization’s data at rest. The Tear-A-Byte® ensures that no data bearing device ever leaves the 4 walls of an organization’s facility, closing the door on one of the most significant threats to company loose media.

[/vc_column_text][/vc_column][vc_column width=”1/3″ dp_animation=””][vc_column_text dp_animation=””]

“TechR2 has made this a priority and is lending its data security expertise to protect organizations from the relentless pursuit of cyber-crime,” said Tony Johnson, EVP and COO of TechR2.

“We are committed to a collaborative effort to quash the effects of what is quickly becoming
TechR2 also believes this initiative will create 40 to 50 full time positions in the location alone.

COO Tony Johnson is available for further comment at the contact information listed above.[/vc_column_text][/vc_column][vc_column width=”1/3″ dp_animation=””][vc_column_text dp_animation=””]

About TechR2

TechR2 is a global leader in the data security industry backed by multiple ISO Certifications (i.e., ISO 27001 for Information Security; 14001 for Environmental Protection; 9001 for Quality Assurance Management and ISO 45001 for Occupational Health and Safety). TechR2’s core Tear-A-Byte® solution is unmatched in the industry and coupled with TechR2’s ISO 31000 compliant risk assessment, auditing, decommissioning and secure transport services ensure the utmost protection of our clients. TechR2’s offerings fully comply with international laws (e.g., GDPR); federal regulations (such as, NIST, SOC, HIPAA, PCI, FERPA and FFIEC); and state statutes, including the California Privacy Act, New York Data Privacy Law and Ohio Safe Harbor Act.[/vc_column_text][/vc_column][/vc_row][vc_row type=”grid” video_bg=”” row_type=”section” bg_image_repeat=”repeat” padding_top=”24″ padding_bottom=”24″][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-right”][/vc_column][/vc_row]

Tags

What do you think?

Related articles

Datacenters are a cybersecurity target

I’m a recovering intelligence officer. I’m always a recovering intelligence officer for one trauma or another. And I’ve had the benefit, the pleasure, the honor to apply a lot of those skills I use in defense of our nation in the commercial section and in the commercial world as well, rising all the way to chief operating officer of a company that I thought was pretty obscure.

Read more

Loss of data hurts everyone

Whether I’m a nation state targeting data, whether I’m a criminal enterprise targeting data, or a transnational organization targeting that, that data is valuable. And while it’s valuable to me, there is a negative externality to the people that I’m taking it from as well. It’s not a victimless crime, right?

Read more

Datacenters are the obvious target

Anybody ever watch storage wars?
You can go on the dark web and buy drives like you were buying a storage unit. “I’ll give you a thousand dollars for that storage unit”. I know there’s got to be a couple thousand bucks worth of stuff in it. Your data out there is the same way.

Read more
Contact us

Why risk it alone?
Get started today.

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.
Your benefits:
What happens next?
1

Schedule a call at your convenience

2

We do a discovery and consulting meeting 

3

We prepare a proposal 

Schedule a Free Consultation