5 Information Security Considerations to Make Your Startup Successful

by Sarah Harvey / June 15, 2023

From Silicon Valley to Times Square, startups of all kinds are popping up all over the United States and beyond. It’s easy for the founders to put all of their resources into starting the business and taking it to market, but what happens when the data that fuels that startup is breached? What happens when an immature information security program causes that startup to fail? What Makes a Startup Successful?…

Web Application Vulnerability Leads to Compromised Data

by Sarah Harvey / December 16, 2022

Georgia Tech Data Breach Last week, Georgia Tech announced a vulnerability in a web application that compromised 1.3 million individuals’ information, spanning from current students to alumni to employees. The vulnerability allowed unauthorized, third party access to a central Georgia Tech database. The university hasn’t released many details yet, but we do know the basics of the incident. The Georgia Tech data breach was found in late March but the…

SOC 2 Academy: Identifying Logging Errors

by Joseph Kirkpatrick / December 16, 2022

Processing Integrity Criteria 1.3 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. If an organization opts to include the processing integrity category in their audit, they need to comply with the additional criteria for…

SOC 2 Academy: How is Data Put Into Your System?

by Joseph Kirkpatrick / December 16, 2022

Processing Integrity Criteria 1.2 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there are additional criteria for the availability, confidentiality, processing integrity, and privacy categories. If an organization opts to include the processing integrity category in their audit, they need to comply with the additional criteria…

SOC 2 Academy: Quality and Accuracy of Your Data

by Joseph Kirkpatrick / December 16, 2022

Processing Integrity Criteria 1.1 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. If an organization opts to include the processing integrity category in their audit, they need to comply with the additional criteria for…