Data Security 101: Make Sure You Know Where Your Data Is and How It’s Working for You

by Randy Bartels / February 1st, 2023

Data is the key to your operation. Make sure you’re keeping it safe. Whether it’s the data you receive from your customers, information you use to run your business, or the source code for your applications, data is at the very heart of any organization. Securing that data is job #1 for any information security program.  A good place to start is understanding where the data is, who uses it,…

KirkpatrickPrice Launches Cloud Security Posture Management Solution

by Lindsay Culbreath / January 19th, 2023

Cybersecurity auditing firm KirkpatrickPrice has launched a Cloud Security Posture Management Solution that allows organizations to scan their cloud environments against industry benchmarks for Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure. This solution customizes a report that will allow users to identify and prioritize their cloud security risks.  Videos and recommendations are integrated in the report from KirkpatrickPrice cloud security experts to assist with remediation efforts. …

6 Expert Tips to Help Craft Your Information Security Policy

by Mike Wise / December 20th, 2022

When someone mentions the term “information security policy,” images of an archaic document held in a vault covered in dust, containing hollow words that no one actually knows come to mind. But is that what an information security policy is? The short answer is no. Building a culture of security at your organization really does start with an information security policy. Here are six key ways to help your organization…

6 Common Information Security Compliance Risks To Avoid

by Hannah Grace Holladay / December 12th, 2022

Your business is at risk.  Information security compliance may be the key to protecting your valuable data and reputation.  Most  businesses are likely required to comply with one or more information security regulations and industry standards, whether it’s PCI DSS, HIPAA, FERPA, FISMA, GDPR, SOX, or other regulations with information security components.  Information security compliance should be a priority in your organization, especially if your company handles personally identifiable information,…

6 AWS Cloud Security Features You Should Be Using

by Hannah Grace Holladay / December 5th, 2022

The security of your AWS cloud environment is your responsibility. Partly. Amazon Web Services (AWS) shares security responsibility with users. They are responsible for configuring and using cloud services securely and in compliance with information security regulations and standards.  But AWS doesn’t leave its users high and dry where security and compliance are concerned. The platform offers an array of cloud security features and tools to help users with AWS…