6 Information Security Basics Your Organization Needs to Implement

by Sarah Harvey / December 16, 2022

What Should be Included in an Information Security Program? Ensuring that sensitive information remains secure, available, and confidential is the most important goal when setting up an information security program, but knowing what you need to include to make that happen can be challenging. In today’s threat landscape, organizations must make it a priority to identify and mitigate any potential vulnerability in their information security system and that process begins…

Privacy Policies Built for CCPA Compliance

by Sarah Harvey / December 16, 2022

Updating Your Privacy Policy for CCPA Compliance If 2018 was the year spent anticipating the GDPR enforcement deadline, 2019 will be the year US states begin enforcing their own data privacy laws. While the California Consumer Protection Act (CCPA) isn’t the first US data privacy law to go into effect, it has certainly gained more attention than others. This could largely be in part because of its similarities to GDPR,…

ISO 27001 FAQs – Information Security Management for Your Organization

by Sarah Harvey / April 26, 2023

What is an ISO 27001 Audit? ISO 27001 is the only internationally-accepted standard for governing an organization’s information security management system (ISMS), created by the International Organization for Standardization (ISO). ISO is an independent, non-governmental international organization with a membership of 161 national standards bodies. It brings together experts to share knowledge and develop voluntary, consensus-based, market relevant international standards that support innovation and provide solutions to global challenges. The…

Risk Assessment Checklist – 5 Steps You Need to Know

by Sarah Harvey / April 12, 2023

What is a Risk Assessment? A risk assessment is a process by which an organization analyzes vulnerabilities, potential threats and risks to the organization's security posture and IT systems. Performing a risk assessment is a critical component of any Information Security program. Because it’s mandated by several frameworks (SOC 1, SOC 2, PCI DSS, ISO 27001, HIPAA, FISMA), organizations wanting to comply with these frameworks must conduct risk assessments on…

FERPA FAQ – What You Need to Know About FERPA Compliance

by Sarah Harvey / December 16, 2022

Does your organization process, store, transmit, or use educational records? Are you responsible for ensuring that the information of students remains secure? FERPA is one of the most significant federal regulations in the education sector, aimed at protecting the privacy of students and their parents. Undergoing a FERPA audit is one way that educational institutions can identify and mitigate any vulnerabilities in their security infrastructure and are doing what is needed…