SOC 2 Academy: How is Data Put Into Your System?

by Joseph Kirkpatrick / December 16, 2022

Processing Integrity Criteria 1.2 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there are additional criteria for the availability, confidentiality, processing integrity, and privacy categories. If an organization opts to include the processing integrity category in their audit, they need to comply with the additional criteria…

SOC 2 Academy: Quality and Accuracy of Your Data

by Joseph Kirkpatrick / December 16, 2022

Processing Integrity Criteria 1.1 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. If an organization opts to include the processing integrity category in their audit, they need to comply with the additional criteria for…

Top Cybersecurity Challenges for the Hospitality Industry

by Sarah Harvey / June 14, 2023

The hospitality industry needs personal data to be successful – but that comes with a price. If you’re collecting or processing personal data, you’re responsible for securing it. The hospitality industry relies on the feeling of being secure, in every aspect of guests’ visits. Organizations within the hospitality must consider why they’re a target for cybersecurity attacks, which data privacy and security frameworks and regulations apply to them, and what…

Cyber NYC Initiative: Will NYC Become the Next Cybersecurity Hub?

by Sarah Harvey / June 14, 2023

New York City is known for its state-of-the-art architecture, fast-paced lifestyle, variety of cultures, and endless supply of street food, but it’s about to be known for an initiative that some might believe to be long overdue: Cyber NYC. As cybersecurity threats continue to impact businesses and cities of all sizes, local governments, like that of New York City’s, have taken it upon themselves to ensure the security of their…

SOC 2 Academy: How Contractual Obligations Impact Confidential Information

by Joseph Kirkpatrick / December 16, 2022

Confidentiality Criteria 1.2 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. For example, if an organization opts to include the confidentiality category in their audit, they would need to comply with the additional criteria…