Navigating Security and Compliance Frameworks

Navigating Security and Compliance Frameworks

Overview From the inception of technology, security concerns have always been at the forefront. Information security preserves an organization’s reputation, maintains business continuity, and prevents financial losses. In today’s evolving cyber landscape and global economy, securing a competitive advantage and demonstrating a commitment to information technology security has become more critical than ever before. Audit […]

HITRUST Assessment Types – Which One Is Right For Your Organization?

What is HITRUST? HITRUST is an organization that develops and maintains the Common Security Framework (CSF). The HITRUST CSF is a certifiable framework, which incorporates various regulatory requirements and industry standards, designed to address security and privacy needs of organizations focused on the healthcare industry. The choice between HITRUST Certification and other frameworks such as […]

PCI Updates V3.2.1 to V4.0 – What You Need to Know

PCI Updates V3.2.1 to V4.0 – What You Need to Know

Overview In 2022, a new version of PCI Data Security Standard (DSS) was released updating the current V3.2.1 to V4.0. PCI DSS Version 4.0 (PCI DSS V4.0) seeks to enhance the security of cardholder data and align with evolving threats. Organizations have until March of 2025 for mandatory compliance with the newest changes; however, the […]

What’s New for SOC 1 Reports in 2023

Overview Organizations who intend to issue a SOC 1 Report to their customers and business partners in 2023 should be well into planning now for changes in the guidance that impact service organizations and their auditors. This article highlights changes released in February 2023 by the American Institute of Certified Public Accountants (AICPA), who publishes […]

Third Party Vendor Management: What You Need to Know

When you’re doing business with third parties, you may be exposing your organization to financial, operational, and reputational risks. While third-party suppliers may be necessary to run your business efficiently, you need to take proactive steps to mitigate risks. This is where vendor management and assessment programs come in. What is Vendor Management? Vendor management […]

Top 10 Things to Look for in a Pen Testing Vendor

Many organizations are required by law to adhere to regulations or industry standards (for example, NIST, CMMC, PCI DSS, GLBA, HIPAA, SOC 2, ISO 27001, etc.) that include the use of security assessment techniques like penetration testing (aka, “pen testing”) as a component. Other organizations want to be proactive and find the “open doors and […]

Getting Ready for the FTC Safeguards Rule

A Company can never be too safe in making sure that its systems are protected from cyberattacks. Responsibility of information security does not only lie with your Information Security Group but also at the highest levels within a company.  Based on a recent ruling by the FTC, CEOs are now responsible for their company’s compliance, […]