Skip to content

ISO 27001 Implementation and Certification Process


Organizations are increasingly seeking to implement ISO 27001 and achieve certification. However, if you are starting from scratch it will be challenging to find out where to start. databrackets can help customers either implement ISO 27001 controls for a potential certification or help companies get certified on ISO 27001. Join our webinar where we answer […]

GDPR Compliance Readiness

The far-reaching global data privacy laws, GDPR, is applicable to all companies handling the consumer data of citizens within the European Union (EU), no matter the size, industry, or country of origin of the business. GDPR compliance requirement ranges from understanding the type of personal data being processed by the company, developing a customer data […]

NIST 800-171 Compliance Audit Overview


NIST SP 800-171 standards refers to National Institute of Standards and Technology Special Publication 800-171, which governs Controlled Unclassified Information (CUI) in Non-Federal Information Systems and Organizations. It is essentially a set of NIST standards that define how to safeguard and distribute material deemed sensitive but not classified. NIST 800-171 compliance is being used by […]

SOC 2 Audit Certification

SOC 2 (System and Organization Controls – commonly pronounced “sock 2”) audit certification for service organization reports is designed to help service organizations to build trust and confidence in the service performed and controls related to the services through a report by an independent CPA ( Certified Public Accountant). Each type of SOC for Service […]

PCI Compliance Assessment

The Payment Card Industry Data Protection Standard (PCI DSS) is checked through a PCI evaluation. It’s a set of security standards for companies that accept, process, store, or transfer credit card information. During the assessment, a PCI Qualified Security Assessor (QSA) determines if the merchant has met the PCI DSS 12 requirements, either directly or […]

Security Hardening of Microsoft Office 365

The recommendations for organizations to assess and ensure that their newly deployed environment is configured to protect, monitor, and respond to potential 365 attackers are reaffirmed in Microsoft Office 365 Security Observations. The redesigned Microsoft 365 security center brings together email, collaboration, identity, and device threat prevention, detection, investigation, and response in a single location. […]