AICPA Updates SOC 2 Guidance: What’s Changed?

AICPA Updates SOC 2 Guidance: What’s Changed?

  The AICPA has revised and updated the SOC 2 guidelines. There are no changes to the SOC 2 trust services criteria (commonly referred to as control objectives) however, there are new and revised “points of focus.” At the core, the points of focus provide...
PCI DSS 3.1: In Review of the Old Standard

PCI DSS 3.1: In Review of the Old Standard

Blog  PCI DSS 3.1: In Review of the Old Standard PCI DSS 3.1: In Review of the Old Standard The PCI DSS is a set of security standards created by the Payment Card Industry Security Standards Council (PCI SSC). The council was formed by the major credit card companies...
PA DSS vs. PCI DSS: Understanding the Differences

PA DSS vs. PCI DSS: Understanding the Differences

Blog  PA DSS vs. PCI DSS: Understanding the Differences PA DSS vs. PCI DSS: Understanding the Differences Businesses that process, store, or transfer credit card data must adhere to the rules of the two main compliance frameworks in the payments sector: PCI DSS and PA...
PCI Password Requirements

PCI Password Requirements

Blog  PCI Password Requirements PCI Password Requirements Among the myriad of standards to enhance data security, the Payment Card Industry Data Security Standard (PCI DSS) stands out as a critical framework for credit card information organizations. This set of...
SOC for Cybersecurity

SOC for Cybersecurity

Blog  SOC for Cybersecurity SOC for Cybersecurity Managing customer data and exchanging digital information on a global level provides your organization with both unparalleled flexibility and versatility. However, opening up your resources and assets to the outside...
ISO 27001 vs. ISO 27002

ISO 27001 vs. ISO 27002

Blog  ISO 27001 vs. ISO 27002 ISO 27001 vs. ISO 27002 In the world of information security, two standards often come up: ISO 27001 and ISO 27002. But what exactly are they? ISO 27001 specifies the requirements for establishing, implementing, maintaining, and...
ISO 27001 vs NIST Cybersecurity Framework

ISO 27001 vs NIST Cybersecurity Framework

Blog  ISO 27001 vs NIST Cybersecurity Framework ISO 27001 vs NIST Cybersecurity Framework Numerous laws and regulations worldwide require corporations to adopt them to secure their data. NIST CSF and ISO 27001 are two of the most prevalent in North America. While both...
ISO 27001 Certification Process Step-by-Step

ISO 27001 Certification Process Step-by-Step

Blog  ISO 27001 Certification Process Step-by-Step ISO 27001 Certification Process Step-by-Step Increasingly, information security management is becoming a critical, top-priority issue for organizations of all sizes. Whether you serve a domestic or global customer...
ISO 27001 Risk Assessment Methodology

ISO 27001 Risk Assessment Methodology

Blog  ISO 27001 Risk Assessment Methodology ISO 27001 Risk Assessment Methodology Conducting an internal ISO 27001 audit enables you to assess your company’s security equipment, systems, protocols and procedures to ensure that they are in compliance with industry...
How to Conduct an Internal ISO 27001 Audit

How to Conduct an Internal ISO 27001 Audit

Blog  How to Conduct an Internal ISO 27001 Audit How to Conduct an Internal ISO 27001 Audit In order for your information security management system (ISMS) to be viable, you must periodically receive an internal, independent audit that shows how it is meeting the...