Man working on computer

How to Build an IT Asset Management Plan

by Sarah Harvey / June 14, 2023

How you can best manage your data and assets in a time where information security threats are everywhere? What is asset management and where do you start with it? Let's start with a basic definition. Asset management is properly defining and categorizing an organization’s assets. A well-developed asset management plan can help you make strategic moves to increase your organizational security. With any plan for IT asset management in place,…

What to Include in Your Employee Handbook

by Sarah Harvey / June 14, 2023

What’s the purpose of an employee handbook? Why are you required to have a detailed employee handbook to be compliant with information security standards? What should you include in your employee handbook to meet these standards? These are all great questions you might have when you’re preparing for an audit. Let’s start with a quick explanation of the purpose of an employee handbook and how a well-designed handbook can add…

Most Common Privacy Gaps

by Sarah Harvey / October 4, 2023

As more and more governing bodies are implementing data privacy laws, it’s becoming even more important for organizations to mitigate gaps in their systems before they are met with a data breach and hefty fines. We can see the effects laws GDPR and CCPA have had on the privacy and security landscape already. Take it from British Airways’ experience – the airline was fined $228 million for leaking 500,000 customers’…

business people walking

Understanding Your Audit: Locations and Sampling

by Sarah Harvey / June 13, 2023

During the audit process, our qualified Information Security Specialists use best practices to determine the scope of the work. If you've never completed an audit, you’ve probably had questions about scoping and sampling. How many locations should be audited? Which locations are most important? How does an auditor develop a scope? What kind of sampling takes place during the audit? These are all valid questions asked by organizations undergoing an…

Most Common HIPAA Gaps

by Sarah Harvey / June 13, 2023

It’s not uncommon for healthcare breaches to make the headlines these days. Whether it’s a major breach like Anthem’s $16 million breach or a smaller HIPAA violation such as improper disposal of secure records, healthcare organizations are falling victim to security breaches at an alarming rate. According to IBM Security’s 2019 Cost of a Data Breach Report, the highest industry average cost of $6.45 million is the healthcare industry. Do…