How Can Employees in the Hospitality Industry Look Out for Social Engineering Attempts?

by Sarah Harvey / December 16, 2022

Employees in the hospitality industry are trained to meet needs, so it doesn’t take much effort for hackers to take advantage of their willingness to help. Employees are so valuable, but they can also be your weakest link. How much customer service is too much? When should an employee become suspicious of a guest or visitor’s behavior? Unfortunately, not often enough. What is Social Engineering? How sure are you that…

What Happens in Vegas Doesn’t Always Stay in Vegas: Is Your Data Being Protected?

by Sarah Harvey / June 14, 2023

What do cities like Las Vegas, Atlantic City, Monte Carlo, and Macau all have in common? They’re some of the most lucrative cities in the world for gambling, which means that they all are at risk for data breaches. Whether it’s the casinos themselves or the hotels connected to the casinos, there are sensitive assets to be stolen. Let’s take a look at why the gaming industry is at such…

Ohio Takes on Cybersecurity with the CyberOhio Initiative

by Sarah Harvey / June 14, 2023

The threat of a cyberattack is something all businesses must be cognizant of, but unfortunately, many are not. As it has become increasingly challenging to understand and implement cybersecurity best practices, states across the US are beginning to roll out cybersecurity initiatives aimed at helping businesses combat advancing cyber threats. While we’ve touched on the innovative cybersecurity initiatives like the ones that New York has implemented, Ohio is paving the…

SOC 2 Academy: Documentation of Inputs

by Joseph Kirkpatrick / December 16, 2022

Processing Integrity Criteria 1.5 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. For example, if an organization opts to include the processing integrity category in their audit, they would need to comply with the…

SOC 2 Academy: Complete, Accurate, and Timely Outputs

by Joseph Kirkpatrick / December 16, 2022

Processing Integrity Criteria 1.4 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. For example, if an organization opts to include the processing integrity category in their audit, they would need to comply with the…