• KP Logo
  • KP Logo
  • Audit
    • Overview
    • SOC 1 Audit
    • SOC 2 Audit
    • Advisory Services
    • Cloud Security
    • HIPAA Audit
    • HITRUST
    • ISO 27001 Audit
    • NIST Audit
    • PCI Audit
    • Privacy Audit
    • Risk Assessments
    • Vendor Compliance Assessment
  • Pen Test
    • Overview
    • API
    • Cloud
    • Continuous
    • Code Review
    • IoT
    • Mobile Application
    • Network
    • Red Teaming
    • Social Engineering
    • Web Application
    • Wireless
  • Resources
    • Podcasts
    • Overview
    • Blog
    • Compliance Glossary
    • Events
    • FAQs
    • Market your Compliance
    • Newsletter
    • Press Releases
    • Video
    • Webinars
    • White Papers
  • Online Audit Manager
  • About
    • About Us
    • Meet the Auditors
    • Meet the Pen Testers
    • Quality Audit
    • Testimonials
    • Working at KirkpatrickPrice
  • Contact
  • Search
  • Connect with an Expert

Search Results for:

What Is an Incident Response Plan? The Collection and Evaluation of Evidence

by Tori Thurmond / July 18th, 2023

As of 2022, 83% of organizations have had more than one data breach, costing those organizations millions of dollars in damages. In today's cyber-landscape,…

Understanding Gramm Leach Bliley (GLBA) Compliance and Personally Identifiable Information

by Benjamin Wright / August 9th, 2018

 What is the Gramm-Leach-Bliley Act? The Gramm-Leach-Bliley Act (GLBA) is a law that requires all financial institutions in the United States to safeguard…

Advice for Making Legal Agreements via Electronic Communication

by Benjamin Wright / August 9th, 2018

 How Should I Make Legal Agreements via Electronic Communication? Electronic communications have become an integral component of conducting business in today’s society. Agreements…

Monitoring Employee Records and Communications Best Practices

by Benjamin Wright / July 31st, 2018

 Should Companies Monitor Employee Records and Communications? When organizations supply their employees with personal electronic devices, such as laptops, cell phones, or tablets,…

Who has the Legal Right to Employee Mobile Phones, Tablets, and Computers?

by Benjamin Wright / July 31st, 2018

 What are the Challenges of a Bring-Your-Own-Device Policy? Given that personal electronics are so prevalent in today’s society, navigating how to implement and…

  • 1
  • 2
  • 3
  • »

Categories

  • Auditor Insights
  • The Audit Process
  • Cloud Security
  • Compliance Best Practices
  • Industry News
  • Online Audit Manager
  • Privacy
  • Webinars + Events
  • Compliance Frameworks
    • SOC 1
    • SOC 2
    • PCI
    • HIPAA
    • ISO 27001
    • GDPR
  • Audit Subjects
    • Application Development
    • Configuration Management
    • Data Security
    • Environmental Security
    • Human Resources
    • Information Security Policy
    • Logical Access
    • Management Control
    • Network Monitoring
    • Penetration Testing
    • Physical Security
    • Regulatory Compliance
    • Risk Assessment
    • Service Delivery
    • Vendor Management
Newsletter

We want to be your audit partner, not just an item to check off on a list. We strive to enhance your business by placing security and compliance at the forefront of the current cyber threat landscape.

Contact Us

800-770-2701

Get Our Newsletter

book e-reader

Learn what you need to get started with our Audit Readiness Guide.

Get the Guide

Popular Blog Posts

The Ultimate SOC 2 Compliance Checklist

The Purpose of Policies and Procedures

Data Classification: Why It’s Important and How To Do It

Popular Videos

SOC 2 Academy: Recovering from a Security Incident

SOC 2 Academy: Managing Vendor Risk

SOC 2 Academy: Mitigating Risks that Lead to Business Disruptions

  • Twitter
  • YouTube
  • LinkedIn
  • Online Audit Manager
  • Terms and Conditions
  • Privacy Policy
  • All Rights Reserved
  • © 2024 KirkpatrickPrice
search icon