Underutilized benefit of SOC reporting Two questions we often hear from organizations going through the SOC reporting process are: What are the benefits of a SOC report other than to satisfy our customer contractual requirements? How can I further leverage my SOC report for marketing purposes? These are great questions that highlight the benefits of […]
If you have recently finished a SOC 1 or a SOC 2 Examination, you may be tempted to put a hold on thinking about your next annual audit. However, the truth is that the sooner you start planning, the smoother your next audit will go. Below are ten best practices to consider as you prepare […]
Overview Organizations who intend to issue a SOC 1 Report to their customers and business partners in 2023 should be well into planning now for changes in the guidance that impact service organizations and their auditors. This article highlights changes released in February 2023 by the American Institute of Certified Public Accountants (AICPA), who publishes […]
Organizations currently subject to a SOC 2 Examination or that intend to be subject to a SOC 2 Examination, along with their auditors, must use guidance issued by the American Institute of Certified Public Accountants (AICPA), as the “rule-book” for these reports. In October 2022, the AICPA issued updates to this SOC 2 guidance that […]
What is SOC 2 Logical and Physical Access (CC6)? Organizations are responsible for controlling logical and physical access to their protected information by using appropriate security software, infrastructure, and architectures. Implementing and maintaining these necessary controls will protect your company’s valuable data and prevent unwanted security events. It will also help you meet the requirements […]
We have learned yet one more reason to refrain ourselves from sending confidential information through email. Yesterday, Microsoft released a statement confirming that zero-day vulnerabilities have been used in an effort to siphon emails from Microsoft Exchange servers. HAFNIUM, a group of Chinese hackers that typically target U.S sectors including private business and government, used […]
Reduce Costs And Data Loss / Windows Virtual Desktop Background Organizations of all sizes struggle with the new norm of supporting a remote workforce. The first challenge is provisioning appropriate hardware, usually a laptop that can be secured and managed. Then there are the physical security concerns of the remote worker. Where are they setting […]
In a world where everything is connected via the internet, companies continue the battle to keep their digital assets protected. Retail chains work relentlessly to keep customer credit cards from being stolen. The medical industry is tasked with keeping HIPAA and PII (Personal Identifiable Information) data locked down. Small businesses battle to keep their systems […]