May 8, 2020 | Risk Assessment
All organizations that store, manage, transmit, or otherwise handle data are responsible for keeping these digital assets secure from internal and external threats. IT risk assessment involves identifying, controlling, correcting, and mitigating vulnerabilities both...
May 8, 2020 | Information Security
The importance of information security cannot be overstated. Protecting the data your business stores, manages, or transmits should be one of your company’s most important priorities. To that end, you need to implement an information security program that includes a...
May 7, 2020 | Information Security
Data is the lifeblood of countless organizations. Whether you focus on healthcare, hospitality, tax processing, communications, education, or retail, the security and privacy of the information you store, manage, and transmit is of paramount importance. However, the...
May 7, 2020 | Blog, Risk Assessment
Blog What is Compliance Risk Management What is Compliance Risk Management Many industries set guidelines for quality, that provides governance for the businesses that fall under their purview. These standards protect all parties from liability and quantify what is...
May 7, 2020 | Blog, SOC, SOC 2, SOC 3
Blog SOC 2 vs SOC 3 SOC 2 vs SOC 3 Navigating the labyrinth of data security standards can seem bewildering. One crucial fact to grasp is that SOC 2 and SOC 3 are both audit standards devised by AICPA, yet they differ in their level of detail and application....
May 7, 2020 | Blog, Compliance, SOC
Blog SOC Bridge Letter: Closing the Gap with Customer Timelines SOC Bridge Letter: Closing the Gap with Customer Timelines A SOC report’s covered period does not always coincide with your customers’ fiscal calendar. It might, for example, have an end date of...
Feb 18, 2020 | Managed Security
An organization must constantly be on guard against external network attacks, threats from its own staff and third-party vendors and even fatal flaws in their own technology that can place data and systems at risk. In order to address this constantly evolving...
Feb 18, 2020 | Blog, Penetration Testing
Blog NIST Penetration Testing NIST Penetration Testing When assessing the overall cybersecurity of an organization, it is important to do a thorough inspection of all systems and protocols in order to check for and target weaknesses or vulnerabilities. Equally...
Feb 18, 2020 | Blog, Compliance, ISO 27001
Blog ISO 27001 vs. ISO 27002 ISO 27001 vs. ISO 27002 In the world of information security, two standards often come up: ISO 27001 and ISO 27002. But what exactly are they? ISO 27001 specifies the requirements for establishing, implementing, maintaining, and...
Jan 29, 2020 | Blog, Compliance, ISO 27001
Blog ISO 27001 vs NIST Cybersecurity Framework ISO 27001 vs NIST Cybersecurity Framework Numerous laws and regulations worldwide require corporations to adopt them to secure their data. NIST CSF and ISO 27001 are two of the most prevalent in North America. While both...
Jan 29, 2020 | Blog, Compliance, ISO 27001
Blog ISO 27001 Certification Process Step-by-Step ISO 27001 Certification Process Step-by-Step Increasingly, information security management is becoming a critical, top-priority issue for organizations of all sizes. Whether you serve a domestic or global customer...