TerraHealth Inc.

Cyber security

Information security

The cyberspace domain is mushrooming, and with every technical improvement made, there are also problems — many of which are concealed. Threats to business operations are real and are driving organizations of all sizes to protect and secure their electronic data.

Because technology‘s impact on security is more critical today than ever, THI continues to expand the scope of its IT consulting services to offer clients the most up-to- date support in the vital sphere of Intelligence Information Systems (IIS) and Cyber Operations. Every major business system has been attacked, and will remain a target for viruses and hackers.

THI‘s senior IIS experts identify system weak points and vulnerabilities, and provide Certification & Accreditation (C&A) support to ensure networks have the highest level of security required by government agencies and commercial clients. We also show teams how to operate more efficiently and protect their information systems by providing security training.

The risk to our information security in the U.S. is higher today than it has ever been, and although there are excellent policy guides and instructions in place for managing risks while supporting the Global Information Grid (GIG), they do not provide a permanent shield against attacks. More needs to be done to ensure the United States does not suffer damage to its national security through weak cyber-security. A lack of attention to detail, and bottlenecks in current processes, will put our intellectual property and technology at risk for being stolen or exploited.

We at THI know that threats to our national security cannot be eradicated; therefore we are committed to remaining vigilant and focused on those that target our growing cyber-security environment, and will provide our clients with the highest level of support they require in this sensitive area.


Cyber and Cyber Med Services


  • Botnet Attack Vulnerability Management
  • Contingency Planning
  • Cyber Terrorism Law
  • Firewall Management
  • DMZ Management
  • Terminal Server Management
  • OS Patch management
  • VPN Remote SVA Access Management
  • Automated Vulnerability Scanning
  • Intrusion Detection Prevention
  • Anti-Virus Updates
  • Medical IT Platform Management
  • Consulting Services
  • Electronic Key Management Systems
  • Information Security Assessments
  • Managed Security Services
  • Public Key Infrastructure
  • Security Education and Training