SOC 2 Academy: Data Backup Processes

by Joseph Kirkpatrick / December 16, 2022

Availability Criteria 1.2 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. For example, if an organization opts to include the availability category in their audit, they would need to comply with the additional criteria…

6 Information Security Basics Your Organization Needs to Implement

by Sarah Harvey / December 16, 2022

What Should be Included in an Information Security Program? Ensuring that sensitive information remains secure, available, and confidential is the most important goal when setting up an information security program, but knowing what you need to include to make that happen can be challenging. In today’s threat landscape, organizations must make it a priority to identify and mitigate any potential vulnerability in their information security system and that process begins…

Internal Accountability: Monitoring Compliance

by Sarah Harvey / February 20, 2023

Ensuring that your organization is up-to-date on compliance requirements can be an overwhelming task, and many organizations don’t know where to begin. While many resources are about becoming compliant, they don’t explain why internal accountability is important or give you actionable steps to maintain compliance. In this webinar, our Director of Regulatory Compliance, Mark Hinely, discusses the next steps your organization can take after you’ve identified your compliance requirements and…

Is Endpoint Protection a Comprehensive Security Solution?

by Sarah Harvey / December 16, 2022

Does your organization have a bring-your-own-device policy? Do your employees use external storage devices? How do you protect workstations, servers, and mobile devices that connect to your network? The perimeter of businesses today only keep expanding – and so does the use of endpoint protection. Is endpoint protection the best way to protect your network, though? The Rise of Endpoint Protection With the number of endpoints with the ability to…

Celebrating Women’s History Month at KirkpatrickPrice

by Sarah Harvey / November 14, 2023

The Role of Women in Information Security Women play critical roles in advancing science, medicine, human rights, social justice issues, and so much more, but there’s one industry where women are just getting their foot in the door: information and cybersecurity. While this growing industry has been long dominated by men, it’s quickly starting to change. In fact, according to Cybersecurity Ventures, the percentage of women in the industry is…