Cheat Sheet for Office 365 Forwarding Rules

by Sarah Harvey / November 20, 2023

Protecting Your Office 365 Accounts A key part of your organization's information security strategy is correct configurations for Office 365, because compromising your Office 365 accounts is a gateway to much more sophisticated attacks. Many industry breach reports speculate that hacking Office 365 email accounts is the first thing an attacker wants to do, because it has the potential to give them access to so much more information. Phishing is…

Guide to PCI Policy Requirements

by Sarah Harvey / April 12, 2023

Introduction to the 12 PCI Requirements The purpose of the PCI DSS is to ensure that all of that data that lives within the cardholder data environment (CDE) is protected and secured from theft or unauthorized use. If you are a merchant, service provider, or subservice provider who stores, processes, or transmits cardholder data, you are subject to comply with the PCI DSS but doing so may seem daunting. Why?…

Quickstart to Information Security Policies for Startups

by Sarah Harvey / December 16, 2022

Why Startups Need to Make Information Security Policies a Priority No matter what industry they’re in, startups are especially susceptible to cybersecurity attacks. This is largely due to financial reasons, as startups are far less likely to have the capital needed to implement robust information security management programs. Moreover, often times, startups neglect to place an emphasis on information security from the start because of a lack of understanding of…

7 Deadly Sins of a HITRUST CSF Assessment

by Shannon Lane / October 11, 2023

 7 Deadly Sins of HITRUST At KirkpatrickPrice, we’ve worked with clients of all sizes – from startups to enterprise-level organizations. By working with so many organizations of varying sizes and industries, we’ve been able to identify seven primary pitfalls that make for a challenging audit environment, all of which represent initial difficulties that often lead to a failed or very drawn out HITRUST validated assessment attempts. In recognizing how significant…

Where a Breach Happens: Threats to Financial Institutions

by Sarah Harvey / December 16, 2022

Securing Financial Institutions Every business has an asset that they can’t bear to lose, and for financial institutions, those assets include money, financial information about consumers, and consumers’ personal data. Financial institutions need personal data in order to verify financial information and protecting all of that data is a responsibility. In this white paper, we’ll discuss four major areas of concern that financial institutions must take into consideration when securing…