SOC 2 Academy: Testing Your Business Continuity Plan

by Joseph Kirkpatrick / December 16, 2022

Availability Criteria 1.3 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. For example, if an organization opts to include the availability category in their audit, they would need to comply with the additional criteria…

SOC 2 Academy: Classifying Confidential Information

by Joseph Kirkpatrick / December 16, 2022

Confidentiality Criteria 1.1 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. For example, if an organization opts to include the confidentiality category in their audit, they would need to comply with the additional criteria…

SOC 2 Academy: Data Backup Processes

by Joseph Kirkpatrick / December 16, 2022

Availability Criteria 1.2 When an organization pursues SOC 2 compliance, an auditor will verify that they comply with the common criteria listed in the 2017 Trust Services Criteria. In addition to the common criteria, though, there’s additional criteria for the availability, confidentiality, processing integrity, and privacy categories. For example, if an organization opts to include the availability category in their audit, they would need to comply with the additional criteria…

6 Information Security Basics Your Organization Needs to Implement

by Sarah Harvey / December 16, 2022

What Should be Included in an Information Security Program? Ensuring that sensitive information remains secure, available, and confidential is the most important goal when setting up an information security program, but knowing what you need to include to make that happen can be challenging. In today’s threat landscape, organizations must make it a priority to identify and mitigate any potential vulnerability in their information security system and that process begins…

Internal Accountability: Monitoring Compliance

by Sarah Harvey / February 20, 2023

Ensuring that your organization is up-to-date on compliance requirements can be an overwhelming task, and many organizations don’t know where to begin. While many resources are about becoming compliant, they don’t explain why internal accountability is important or give you actionable steps to maintain compliance. In this webinar, our Director of Regulatory Compliance, Mark Hinely, discusses the next steps your organization can take after you’ve identified your compliance requirements and…