Information Security Management Series: Making Sense of the Regulatory Alphabet Soup

by Sarah Harvey / December 16, 2022

Have you heard of SOC 1, SOC 2, HIPAA, PCI, FISMA, or ISO 27001/27002 frameworks but are unsure of what they entail? Have you been asked for verification of regulatory compliance but don’t know where to begin? This webinar will educate you on the basics of these frameworks so that you are better equipped to discuss your compliance goals with prospects and clients, and are also more informed on your…

3 Things You Can Do to Avoid Being the Next Anthem Headline

by Sarah Harvey / December 16, 2022

The recent Anthem data breach is potentially the largest breach to date in the Healthcare space. When your CEO or your largest clients ask you what your plan is to prevent the same from happening to you, what are you going to tell them? Safeguarding Personally Identifiable Information (PII) is essential for avoiding a data breach. Here are three things you should do immediately to avoid a data breach: Advanced…

3 Reasons to Stop Hesitating and Complete your SSAE 16 Audit

by Sarah Harvey / December 16, 2022

With the compliance landscape rapidly changing, it’s important to stay up to date with current standards to gain trust and respect from your clients. If you’ve been considering getting an SSAE 16 Audit, but keep putting it off, what are you waiting for? Here are 3 Reasons to stop hesitating and start your SSAE 16 Audit today: 1. To gain a competitive advantage Completing an SSAE 16 allows you to…

Anthem Data Breach: Recent Hack Affects Millions

by Sarah Harvey / December 16, 2022

Joseph R. Swedish, CEO of Anthem Inc., one of the largest healthcare providers in the US, announced Wednesday, that despite efforts to appropriately safeguard their information, they suffered a major cyberattack. This attack is said to have affected as many as 80 million people. According to Anthem, this attack compromised both patient and employee information, names, birthdays, medical ID’s, Social Security numbers, street addresses, email addresses, and employment and income…

5 Steps to Mastering a Risk Assessment

by Sarah Harvey / June 14, 2023

Performing a Risk Assessment is a critical component of any Information Security Program. It’s mandated by several frameworks (SSAE 16, SOC 2, PCI DSS, ISO 27001, HIPAA, FISMA). In order to comply with those frameworks, your organization has to complete a risk assessment, and then assess and address the risks by implementing security controls. The Risk Assessment process is a constantly moving and evolving process for an organization. So, where…