Why is a SOC 2 Valuable for Software Companies?

by Sarah Harvey / June 14, 2023

Regardless of the products they offer or the industries they serve, there’s one thing all software companies have in common: the responsibility of securing user data. With the advancing threat landscape, ensuring that an organization’s software remains as secure, available, and confidential as is available on the market has become more difficult. Recognizing this, our client Ziflow, the leading enterprise online proofing software solution for enterprise agencies and brands, continues…

What is Wireless Penetration Testing?

by Sarah Harvey / December 15, 2022

The convenience and accessibility of wireless technology makes it an integral part of business today. No cords, no cables – just waves of information streaming to your device of choice. Unfortunately, wireless technology is just as susceptible to a malicious attack as any other type of technology. From poor wireless security configurations to choosing a flawed encryption scheme, there are so many things can go wrong. How is your internal…

Go Through a Gap Analysis Without the Stress

by Sarah Harvey / June 14, 2023

At KirkpatrickPrice, our goal is to partner with our clients to help them achieve their challenging compliance objectives. While many other CPA firms solely focus on performing audits and delivering reports, our dedicated team of experienced Audit Support Professionals and Information Security Specialists are there to guide you through the audit process so that you leave the engagement feeling confident in your organization’s security hygiene and are prepared to tackle…

Onsite Visits vs. Remote Audits

by Joseph Kirkpatrick / June 15, 2023

When you start an audit, you’re looking for a quality experience in a timely manner. One of the biggest aspects of an audit is the onsite visit - but what if an auditing firm that you're considering working with offers to skip the onsite visit in order to deliver your report faster? What if they say your internal controls don't require an onsite visit? What if you have an entirely…

What is Mobile Application Penetration Testing?

by Sarah Harvey / December 15, 2022

So often, mobile devices are assumed to be the causes of security incidents or breaches, but mobile applications usually serve as the attack vector. In 2018, one in 36 mobile devices had high risk apps installed. There were 2,328 variants of mobile malware. Only about 50% of mobile apps were running on the newest, major iOS version and 19% for Android. Mobile applications and their risks aren’t something you can avoid.…