Tom Shock

Tom Shock is a seasoned IT professional with over 15 years of experience modernizing technology environments in mid-market organizations. Currently serving as the Director of IT at Shepherd Electric Supply, Tom is known for his hands-on approach, instilling  a customer service-oriented IT culture. His leadership style focuses on cultivating engagement and passion within his team by providing opportunities, guidance, and autonomy. Throughout his tenure, he has driven accelerated growth, improved efficiency, and enhanced productivity.

While Tom’s primary expertise lies in IT modernization, he also possesses significant knowledge of cybersecurity, especially in addressing the unique challenges faced by companies with 200-1000 employees. His pragmatic approach ensures that security solutions are both effective and aligned with business operations.

Securing the Mid-Market: Tom Shock’s Step by Step Approach to Cybersecurity

How can mid-market companies protect themselves against cyber threats without breaking the bank? Tom Shock, Director of IT at Shepard Electric Supply, shares his expertise on implementing effective cybersecurity measures for mid-sized businesses. From endpoint detection to email security and beyond, Tom outlines practical steps companies can take to strengthen their defenses, emphasizing the importance of a layered approach and continuous improvement.

Look for solutions that provide 80% of the value with only 20% of the complexity. Ease of maintenance is crucial for smaller IT teams

3 Key Takeaways

Listen To The Full Episode Below

Securing the Mid-Market: Tom Shock's Practical Approach to Cybersecurity
Dissecting Popular IT Nerds
311- Securing the Mid-Market: Tom Shock's Step by Step Approach to Cybersecurity
Loading
/

Episode Show Notes

00:01 – Introduction and guest background

01:35 – Challenges and advantages of mid-market cybersecurity

05:47 – Starting with endpoint detection and response

12:31 – Importance of email security

14:11 – User awareness training

23:21 – Patch management as a critical security layer

28:03 – Adapting to remote work security needs

35:41 – AI in cybersecurity tools

44:13 – Backup strategies and immutability

48:31 – Choosing right-sized solutions for mid-market

51:29 – Three-pronged approach to cybersecurity

Resources

QR Code