Encrypted Backups: What They Are and How to Use Them

by Sarah Harvey / February 5th, 2020

Today’s cyber landscape is riddled with advancing threats. From simple phishing attacks to intricate DoS attacks, businesses must ensure that the data they collect,…

Combining SOC 1 and SOC 2 Audits

by Sarah Harvey / February 3rd, 2020

We get a lot of questions about SOC 1 and SOC 2 audits. What’s the difference between the two? Should your company do both?…