The Charles IT Blog

Get the latest insights, information, and news to help you keep up with all that is happening in the fast-moving world of IT!

Why you can’t afford to make a mistake when performing a HIPAA risk assessment

Why you can’t afford to make a mistake when performing a HIPAA risk assessment

March, 2021 | Foster Charles

Healthcare is a favorite target of cybercriminals due to the high value of personally identifiable information on the black market. One of the main tenets of the HIPAA security rule is that covered [...]

Achieving HIPAA IT Compliance: Begin Preparing for Success Now

Achieving HIPAA IT Compliance: Begin Preparing for Success Now

March, 2021 | Foster Charles

Advancements in technology have made it easier for cybercriminals and insider threats to steal, leak, and misuse electronic personal health information (ePHI). If your organization handles ePHI or [...]

IT Items That Should Be on Every HIPAA Compliance Checklist

IT Items That Should Be on Every HIPAA Compliance Checklist

March, 2021 | Foster Charles

The COVID-19 pandemic ravaged the healthcare industry in 2020, and cybercriminals were quick to take advantage of the dire circumstances to launch cyberattacks on healthcare organizations to steal [...]

What Is HIPAA Compliance? 5 Common Mistakes IT Companies Make

What Is HIPAA Compliance? 5 Common Mistakes IT Companies Make

March, 2021 | Foster Charles

The Health Insurance Portability and Accountability Act (HIPAA) was formed to standardize the ways patient health information (PHI) is protected. Healthcare providers and their IT partners, whether [...]

4 of the easiest security gaps to correct for SOC 2 compliance

4 of the easiest security gaps to correct for SOC 2 compliance

March, 2021 | Foster Charles

Faced with the constantly evolving cyberthreat landscape, businesses must do everything in their power to avoid getting breached. The standards are growing stricter as the threats grow ever more [...]

How To Get SOC 2 Compliance: Why SIEM Is A Game Changer

How To Get SOC 2 Compliance: Why SIEM Is A Game Changer

March, 2021 | Foster Charles

While today’s business leaders generally understand how important it is to implement multiple layers of security over their customer data, they can’t protect what they don’t know about. This is why [...]

What Must Every SOC 2 Compliance Checklist Contain to Achieve Compliance?

What Must Every SOC 2 Compliance Checklist Contain to Achieve Compliance?

February, 2021 | Foster Charles

If you're running a service organization that collects, stores, and shares sensitive customer information, you need to have a System and Organization Controls 2 (SOC 2) certificate. Being SOC 2 [...]

5 Critical SOC 2 Principles You Can't Afford to Overlook

5 Critical SOC 2 Principles You Can't Afford to Overlook

February, 2021 | Foster Charles

If you're a business owner providing third-party services, keeping your customers' sensitive information secure should be one of your top priorities. With the number of data breaches happening every [...]

What is end-to-end encryption, and how does it affect SOC 2 compliance?

What is end-to-end encryption, and how does it affect SOC 2 compliance?

February, 2021 | Foster Charles

While standard layers of defense, such as network firewalls and antivirus software, are critical for maintaining a good security posture, they’re far from fail-proof. Determined attackers can and [...]

Why Is Vulnerability Testing Crucial to Preparing for a SOC 2 Audit?

Why Is Vulnerability Testing Crucial to Preparing for a SOC 2 Audit?

February, 2021 | Charles IT

Cloud computing and Software-as-a-Service providers play a big role in their clients' data security. When providers mishandle data, organizations can be left vulnerable to cyberattacks like malware [...]

Most tech consulting starts with “Press 1”

We just like to start with “Hello.”