
SOC 2 Principles
During a SOC 2 examination, an auditor will thoroughly evaluate the risks and privacy protocols you have put in place to protect the data that flows through and is stored by your information systems. The assessor uses several measures to benchmark your system’s...

Does SOC 2 require data to be encrypted “at rest” or only “in transit“?
Blog Installing strong firewalls and keeping your antivirus software up to date are excellent protections to promote an effective security posture. However, it would be best if you had other safeguards in addition to these layers of defense. Information is,...

Gaming Industry Under Attack
In December of 2020, after much fanfare, the CD Project Group launched Cyberpunk 2077. However, contrary to the hype, the game was riddled with bugs and soon earned a cascade of blistering customer feedback. Two months later, hackers capitalized on the game's bugs,...

T-Mobile: 49 Million Customers Hit by Data Breach
In the era when smartphones have become indispensable in so many aspects of life, data breaches can be more devastating than ever before. The recent T-Mobile attack is a perfect example of such breaches. Here is what we know about the incident: The first and last...

Email Security in the Post-COVID Workplace
The post-pandemic “new Normal” impacts all aspects of our lives, including the job site. Even when COVID was at its peak, collaboration among staff members scattered across the country and around the world happened thanks to adaptations in organizational technology...

Data Leak in Fertility Clinic: Reasons & Consequences
Georgia-based fertility clinic Reproductive Biology Associates is one of the latest victims of the recent rash of ransomware attacks plaguing our country. Data from an estimated 38,000 victims were compromised as a result of this breach. Reproductive Biology...

Attackers Found New Ways to Exploit Google Docs
Google Docs can provide your organization with excellent tools to promote real-time collaboration among team members at different locations. However, this cloud-based service can also be used by criminals to breach company's security protocols. As is often the case,...

What Are the Benefits of CSA STAR Certification?
Cloud Security Providers furnish unique services to their customers that require special attention to digital security. In an effort to address this, the Cloud Security Alliance has adopted a framework encompassing 11 control areas. There are several benefits that a...

Virtual CISO: All You Need to Know
Security and protection from external threats have become even more important than ever. The growing number of cyberattacks indicates that even companies that spend huge amounts of money on their security, cannot be 100% sure that their data is safe. However, not all...

ISO 27001 Controls: Identify and Address Information Risks
What Are ISO27001 controls? Improving the security of information assets is an intensely complex process that varies according to organizational need, industry, and risk level. Therefore, the ISO 27001 controls list that a specific company focuses upon would be...