Top Cybersecurity Challenges for the Hospitality Industry

by Sarah Harvey / June 14, 2023

The hospitality industry needs personal data to be successful – but that comes with a price. If you’re collecting or processing personal data, you’re responsible for securing it. The hospitality industry relies on the feeling of being secure, in every aspect of guests’ visits. Organizations within the hospitality must consider why they’re a target for cybersecurity attacks, which data privacy and security frameworks and regulations apply to them, and what…

Cyber NYC Initiative: Will NYC Become the Next Cybersecurity Hub?

by Sarah Harvey / June 14, 2023

New York City is known for its state-of-the-art architecture, fast-paced lifestyle, variety of cultures, and endless supply of street food, but it’s about to be known for an initiative that some might believe to be long overdue: Cyber NYC. As cybersecurity threats continue to impact businesses and cities of all sizes, local governments, like that of New York City’s, have taken it upon themselves to ensure the security of their…

SOC 2 Academy: How Contractual Obligations Impact Confidential Information

by Joseph Kirkpatrick / December 16, 2022

Confidentiality Criteria 1.2 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. For example, if an organization opts to include the confidentiality category in their audit, they would need to comply with the additional criteria…

SOC 2 Academy: Testing Your Business Continuity Plan

by Joseph Kirkpatrick / December 16, 2022

Availability Criteria 1.3 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. For example, if an organization opts to include the availability category in their audit, they would need to comply with the additional criteria…

SOC 2 Academy: Classifying Confidential Information

by Joseph Kirkpatrick / December 16, 2022

Confidentiality Criteria 1.1 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. For example, if an organization opts to include the confidentiality category in their audit, they would need to comply with the additional criteria…