Mike Bailie

How to prepare for a HIPAA certification for IT professionals

How to prepare for a HIPAA certification for IT professionals

Healthcare information technology systems are a favorite target for cybercriminals. Protected health information (PHI) contains a wealth of valuable data that can sell for a lot of money on the dark web markets. Another common threat against healthcare services is ransomware, as organizations are more likely to pay ransoms to regain access to their data. On top of that, the sector is often viewed ...

Dark Web Monitoring For SOC 2 Security: How Your Company Can Benefit

Dark Web Monitoring For SOC 2 Security: How Your Company Can Benefit

Businesses around the globe are being hit by data breaches every day, but did you ever think about what cybercriminals do with the information they steal in these attacks? More often than not, the stolen information is sold by cybercriminals on the dark web.

How External Vulnerability Scanning Can Help with SOC 2 Data Security

How External Vulnerability Scanning Can Help with SOC 2 Data Security

The system and organization controls (SOC) compliance frameworks set out the standards of a secure information architecture. By design, the framework leaves a high degree of flexibility to allow businesses to make their own decisions regarding how they ensure the security and privacy of their information assets. This is because every service provider has different needs and systems in place.

Why Cybersecurity Awareness Training is Vital to Passing a SOC 2 Audit

Why Cybersecurity Awareness Training is Vital to Passing a SOC 2 Audit

For far too long has cybersecurity been viewed by the average employee as a technical issue and therefore something for the IT department to take care of. In reality, everyone has a role to play when it comes to safeguarding potentially sensitive information, especially when others are putting their trust in you to do just that.

Why Managed Detection is Helpful for SOC 2 Type 2 Compliance

Why Managed Detection is Helpful for SOC 2 Type 2 Compliance

SOC 2 stands for service organization controls version 2, which was introduced to document and validate a business’s efforts to secure client data.

SOC 2 Explained: SOC 2 Type 1 Vs. Type 2 Compliance

SOC 2 Explained: SOC 2 Type 1 Vs. Type 2 Compliance

If you’re a service provider that stores or transmits personally identifiable customer data, then there’s a good chance you’ve already been asked about SOC 2 compliance. Compliance has become a practical necessity for almost all service-based companies, and it’s a requirement for meeting the demands of the Sarbanes-Oxley Act (SOX).