Security Insights
Explore insights and recommendations by security experts from the world of cybersecurity
What is CCPA?
Financial Services Modernization with GLBA
Complying with GDPR
Complying with HIPAA
What is the Federal Trade Commission (FTC) Act?
Cybersecurity Checklist for Startups
What is the HIPAA Security rule?
Security Certifications for Startups
Can you submit a SOC 2 Report instead of a Vendor Security Questionnaire?
Over the last decade, service organizations have been asked to prove their level of cyber hygiene before they are awarded a contract. The RFQs and contracts of small-medium sized businesses, particularly SaaS providers typically include an annual Vendor Security Questionnaire,...
Read MoreSOC 2 versus ISO 27001
Organizations frequently face a tough choice between SOC 2 and ISO 27001 certifications as a means to showcase their security maturity. Comparing the two security standards can be tough and the decision-making process can be complex, as each certification brings...
Read MoreCybersecurity Checklist for 2024
Cybersecurity is a critical concern for organizations in 2024 as the digital landscape continues to evolve and cyber threats become more sophisticated. Though organizations across industries have regulatory requirements related to data privacy and cyber security, attackers have found innovative...
Read MoreTransition to ISO 27001:2022
The ISO 27001:2022 certification standard was released in October 2022. It has replaced the ISO 27001:2013 edition via a three-year transition period, which ends on October 31, 2025. Companies with an ISO 27001:2013 certification are required to transition to ISO...
Read MoreHow to Prevent the Impact of Ransomware
Verizon’s Data Breach Investigations Report found that 74% of all breaches were a result of human error due to social engineering. This statistic is based on the analysis of 16,312 security incidents and 5,199 breaches. This report puts Ransomware as...
Read MoreTechnologies To Detect And Prevent Ransomware Attacks
Verizon’s Data Breach Investigations Report puts the cost of 95% of security incidents at $1 million - $2.25 million dollars. The report is based on the analysis of 16,312 security incidents and 5,199 breaches. They found 74% of all breaches...
Read MoreSources of Ransomware Attacks on Healthcare Systems
A cohort study published in The Journal of the American Medical Association in December of 2022 revealed that Ransomware attacks targeting Healthcare delivery organizations more than doubled from 2016 to 2021. This exposed the Personal Health Information of nearly 42...
Read MoreCan you have a Ransomware attack if you are HIPAA-compliant?
The short answer: Yes The in-depth answer: The Health Insurance Portability and Accountability Act (HIPAA) sets the minimum standards for protecting sensitive patient health information (PHI). The Department of Health and Human Services (HHS) regulates HIPAA compliance, while the Office for Civil...
Read MoreProtect your DICOM from Cyber Attacks
DICOM stands for Digital Imaging and Communications in Medicine. It is a standard protocol for managing, storing, and transferring medical images and related data in a digital format. It ensures that medical images and information can be exchanged between different...
Read MoreWhat are the new controls added to ISO 27001 in 2022?
ISO 27001 is a globally respected information security standard. It is officially referred to as ‘ISO/IEC 27001’ and is part of the ISO/IEC 27000 family of standards for information security management. It is designed, updated and regulated by the International Organization...
Read MoreTop 5 CMMC Implementation Gaps
CMMC is a security framework that is mandatory for contractors who want to work with the Department of Defense (DoD). It is based on the US National Institute of Standards and Technology (NIST) family of standards, specifically on NIST SP...
Read MoreSecurity Tech Investments for Top 10 trends in 2023
How do you prevent cyberattacks from impacting your business operations? This is the big question organizations have been asking in the wake of growing cyberattacks across industries. A growing number of data breaches have led to loss of customer data,...
Read MoreSOC 2 Type 2 Audit for SaaS Companies
Getting a SOC 2 Type II Report can be a game-changer for a SaaS Company. It can transform how you respond to RFQs and how you assure potential leads that your systems are secure. Most SaaS companies view the cost...
Read MoreChallenges you may face with a SOC 2 auditor
A SOC 2 certification / examination is pursued by service organizations who want to prove to potential customers that they can manage their data effectively. Typically a SaaS provider, Managed Service Provider (MSP), Network service provider and other service providers...
Read MoreAnatomy of a Ransomware Attack and Lessons Learned
The average ransomware attack caused $1.85 million in losses to the company in 2021, up 41% from 2020. This estimate factors in the amount paid, downtime, expense for IT technicians, device cost, network cost, lost opportunity, and more. Leadership turnover...
Read More











