What Type of Compliance is Right for You? 10 Common Information Security Frameworks

by Hannah Grace Holladay / April 11th, 2023

We know that when it comes to threats you want to make sure that you’re ready. In order to do that, you need a quality cybersecurity and compliance audit report that gives you results you can trust.   The problem is choosing the right framework for your business and unique data needs can be complicated.  There are so many frameworks and regulations to learn about and sift through to see what…

Preparing for a CCPA Audit

by Sarah Harvey / November 5th, 2020

The California Consumer Protection Act gives consumers more rights related to their personal data and requires businesses to be more transparent about the way personal data is used and shared. The law applies to certain businesses that collect, use, receive or transmit the personal data of California consumers. Specifically, this law applies to for-profit businesses that do business in California and have annual gross revenues of over $25,000,000, buy, sell,…

How to Prepare for a FISMA Audit

by Sarah Harvey / October 22nd, 2020

FISMA is U.S. legislation enacted as part of the Electronic Government Act of 2002, intended to protect government information and assets from unauthorized access, use, disclosure, disruption, modification, or destruction. To comply with FISMA, organizations must demonstrate that they meet the standards set forth by NIST SP 800 series. Unique to a FISMA audit, organizations can tailor the relevant security control baseline so that it more closely aligns with their…

Considering an Audit Readiness Tool? 4 Questions to Ask

by Sarah Harvey / October 8th, 2020

Using KirkpatrickPrice for Audit Readiness We've seen more and more automated solutions and tools enter the market that promise easy and cheap compliance, no commitment, and expert guidance. Don't be fooled, though! These audit prep solutions and tools are actually only promising one thing: readiness. Unlike firms with automated solutions and tools that focus solely on audit readiness, KirkpatrickPrice provides a comprehensive audit experience. They cannot provide what you actually…

Cheat Sheet for Office 365 Forwarding Rules

by Sarah Harvey / September 22nd, 2020

Protecting Your Office 365 Accounts A key part of your organization's information security strategy is correct configurations for Office 365, because compromising your Office 365 accounts is a gateway to much more sophisticated attacks. Many industry breach reports speculate that hacking Office 365 email accounts is the first thing an attacker wants to do, because it has the potential to give them access to so much more information. Phishing is…