May 24, 2022 | Blog, PCI DSS Compliance
There is no one-size-fits-all answer to this question, as the necessary steps for becoming PCI compliant will vary depending on your organization’s specific needs. However, there are some general guidelines that all organizations should follow to ensure...
Apr 12, 2022 | Blog, PCI DSS Compliance
In keeping with its ongoing goal of safeguarding cardholder information, the PCI Security Standards Council (PCI SSC) is rolling out a new version of its Payment Card Industry Data Security Standard (PCI DSS). This updated iteration came from extensive feedback from...
Mar 12, 2022 | Blog, ISO 27001
Blog 2022 Revisions to ISO 27002 2022 Revisions to ISO 27002 Impacts on ISO 27001 ISO 27002 is the companion standard to ISO 27001 and provides best practices for implementing information security controls. The latest version, ISO 27002:2022, was published on...
Mar 2, 2022 | Blog, SOC 2
Blog SOC 2 Report Example SOC 2 Report Example SOC 2 reports are essential for any organization that handles customer data, ensuring that your systems are secure, available, and private. Essentially, a SOC 2 report gives your customers peace of mind, knowing that...
Jan 11, 2022 | Blog, SOC 2
With cybersecurity concerns at an all-time high, organizations cannot afford to downsize or procrastinate when it comes to protecting your and your customer’s systems and data. Combine these realities with an increase in the use of employee personal devices and...
Oct 12, 2021 | Blog, SOC 2
During a SOC 2 examination, an auditor will thoroughly evaluate the risks and privacy protocols you have put in place to protect the data that flows through and is stored by your information systems. The assessor uses several measures to benchmark your system’s...
Oct 11, 2021 | Blog, Compliance, SOC 2
Blog Does SOC 2 require data to be encrypted “at rest” or only “in transit“? Does SOC 2 require data to be encrypted “at rest” or only “in transit“? Installing strong firewalls and keeping your antivirus software up to date are excellent protections to promote an...
Feb 22, 2021 | Blog, ISO 27001
What Are ISO27001 controls? Improving the security of information assets is an intensely complex process that varies according to organizational need, industry, and risk level. Therefore, the ISO 27001 controls list that a specific company focuses upon would be...
Jan 18, 2021 | Blog, SOC, SOC 2
Blog SOC for Azure: Securing Microsoft Azure Environments SOC for Azure: Securing Microsoft Azure Environments If you’re looking for a SOC report for Microsoft Azure-hosted environments, you’re not the only one. Many companies working with sensitive data understand...
Dec 16, 2020 | SOC, SOC 3
What is a SOC 3? System and Organization Controls 3 reports, also known as a SOC 3 report, is one of three audits that organizations can undertake to meet the specified Trust Service Principles, as defined by the AICPA. The audit is performed by accredited...