Skip to content

Security Insights

Explore insights and recommendations by security experts from the world of cybersecurity

Can you submit a SOC 2 Report instead of a Vendor Security Questionnaire?

Over the last decade, service organizations have been asked to prove their level of cyber hygiene before they are awarded a contract. The RFQs and contracts of small-medium sized businesses,…

SOC 2 versus ISO 27001

Organizations frequently face a tough choice between SOC 2 and ISO 27001 certifications as a means to showcase their security maturity. Comparing the two security standards can be tough and…

Transition to ISO 27001:2022

The ISO 27001:2022 certification standard was released in October 2022. It has replaced the ISO 27001:2013 edition via a three-year transition period, which ends on October 31, 2025. Companies with…

Cybersecurity Checklist for 2024

Cybersecurity is a critical concern for organizations in 2024 as the digital landscape continues to evolve and cyber threats become more sophisticated. Though organizations across industries have regulatory requirements related…

How to Prevent the Impact of Ransomware

Verizon’s Data Breach Investigations Report found that 74% of all breaches were a result of human error due to social engineering. This statistic is based on the analysis of 16,312…

Technologies To Detect And Prevent Ransomware Attacks

Verizon’s Data Breach Investigations Report puts the cost of 95% of security incidents at $1 million – $2.25 million dollars. The report is based on the analysis of 16,312 security…

Can you have a Ransomware attack if you are HIPAA-compliant?

The short answer: Yes   The in-depth answer: The Health Insurance Portability and Accountability Act (HIPAA) sets the minimum standards for protecting sensitive patient health information (PHI). The Department of Health…

Sources of Ransomware Attacks on Healthcare Systems

A cohort study published in The Journal of the American Medical Association in December of 2022 revealed that Ransomware attacks targeting Healthcare delivery organizations more than doubled from 2016 to…

Protect your DICOM from Cyber Attacks

DICOM stands for Digital Imaging and Communications in Medicine. It is a standard protocol for managing, storing, and transferring medical images and related data in a digital format. It ensures…

databrackets is an Authorized C3PAO for CMMC

We are thrilled to announce that databrackets is an authorized Certified Third-Party Assessment Organization (C3PAO) — a milestone that reflects our deep commitment to cybersecurity excellence and integrity in the
Read More

Understand Cyber Liability Insurance Coverage, Policy Language and How your Premium is Calculated

When a ransomware attack locks your systems, or a data breach exposes customer information, cyber liability insurance becomes the financial safety net between recovery and significant loss. Yet most organizations approach this
Read More

How to Reduce your Cyber Liability Insurance Premium with a Security Risk Assessment

IBM reports that the average cost of a data breach in 2025 was $4.44 million globally. However, in the United States, the average cost was significantly higher at $10.22 million.
Read More

NEN 7510: A Guide to Healthcare Information Security in the Netherlands

When a ransomware attack hit Maastricht University in December 2019, the entire digital infrastructure collapsed. Nineteen thousand students couldn’t access course materials, researchers faced looming grant deadlines with no access
Read More

Understanding the CAIQ

Is CAIQ for You? Are you evaluating cloud service providers and drowning in security questionnaires? Do you need to prove your cloud vendor did their due diligence before the next
Read More

NIST SP 800-53 – The Gold Standard for Cybersecurity

NIST Special Publication 800-53 is the backbone of federal cybersecurity that protects everything from your Social Security data to national defense systems. But what most people don’t realize is that
Read More

Securing CUI with NIST SP 800-171 Revision 2

NIST SP 800-171 Revision 2 stands as the mandatory cybersecurity standard for any organization handling Controlled Unclassified Information (CUI) under federal contracts. This isn’t voluntary guidance or a best-practice recommendation.
Read More

Building a Practical Cybersecurity Program with NIST CSF

How do you build a cybersecurity program that’s both comprehensive and practical- without breaking the bank or overwhelming your team? The answer lies in a framework that strips away complexity
Read More

Understanding the NIST AI Risk Management Framework

The question isn’t whether AI will transform your business—it’s whether you’ll manage the risks before they manage you. Every day, AI systems make thousands of decisions that affect real people:
Read More

Trusted by Hundreds of Companies

Do you want to become a databrackets Consultant?

We Are Here to Help You