Skip to content

Security Insights

Explore insights and recommendations by security experts from the world of cybersecurity

Pen Testing versus Vulnerability Assessment

Feeling confused about security assessments? Are you unsure if a Vulnerability Assessment or Penetration Test is the right assessment for your organization? While both aim to test your defenses and
Read More

Can you submit a SOC 2 Report instead of a Vendor Security Questionnaire?

Over the last decade, service organizations have been asked to prove their level of cyber hygiene before they are awarded a contract. The RFQs and contracts of small-medium sized businesses,
Read More

SOC 2 versus ISO 27001

Organizations frequently face a tough choice between SOC 2 and ISO 27001 certifications as a means to showcase their security maturity. Comparing the two security standards can be tough and
Read More

Transition to ISO 27001:2022

The ISO 27001:2022 certification standard was released in October 2022. It has replaced the ISO 27001:2013 edition via a three-year transition period, which ends on October 31, 2025. Companies with
Read More

Cybersecurity Checklist for 2024

Cybersecurity is a critical concern for organizations in 2024 as the digital landscape continues to evolve and cyber threats become more sophisticated. Though organizations across industries have regulatory requirements related
Read More

How to Prevent the Impact of Ransomware

Verizon’s Data Breach Investigations Report found that 74% of all breaches were a result of human error due to social engineering. This statistic is based on the analysis of 16,312
Read More

Technologies To Detect And Prevent Ransomware Attacks

Verizon’s Data Breach Investigations Report puts the cost of 95% of security incidents at $1 million – $2.25 million dollars. The report is based on the analysis of 16,312 security
Read More

Can you have a Ransomware attack if you are HIPAA-compliant?

The short answer: Yes   The in-depth answer: The Health Insurance Portability and Accountability Act (HIPAA) sets the minimum standards for protecting sensitive patient health information (PHI). The Department of Health
Read More

Sources of Ransomware Attacks on Healthcare Systems

A cohort study published in The Journal of the American Medical Association in December of 2022 revealed that Ransomware attacks targeting Healthcare delivery organizations more than doubled from 2016 to
Read More

Is HITRUST Worth The Investment?

What is HITRUST? HITRUST, or Health Information Trust Alliance, is a non-profit organization that uses the ‘HITRUST approach’ to help the healthcare industry control data protection standards and effectively manage data, information risk, and compliance. It’s similar to HIPAA, but...

Read More

databrackets Is Accredited To Provide ISO/IEC 27001 Certification

databrackets received accreditation by the International Accreditation Service (IAS) to provide ISO/IEC 27001 Certification for Information Security Management Systems (ISMS) and joins an exclusive group of certification bodies.   About International Accreditation Service (IAS): IAS is a nonprofit, public-benefit corporation that has...

Read More

databrackets Is Accredited By A2LA Inspection Bodies For ISO/IEC 17020:2012

American Association for Laboratory Accreditation (A2LA) has accredited databrackets for technical competence in and compliance with the Inspection Body Accreditation Program. databrackets is pleased to announce that it has been accredited by the American Association for Laboratory Accreditation (A2LA) as a...

Read More

Comparing NIST, ISO 27001, SOC 2, and Other Security Standards and Frameworks

Over the last decade, an increasing number of organizations have been demanding security and compliance based certifications before awarding contracts to SaaS and other service providers. This has lead to an increase in the demand for certifications like SOC 2,...

Read More

Trusted by Hundreds of Companies

Do you want to become a databrackets Consultant?

We Are Here to Help You