cgcompliance - kn

SOC 2 Compliance Checklist: Preparing for an Audit

If you are a service organization and your customers trust you with their data, you may need to pass a SOC 2 audit to sell your products. A SOC 2 Compliance Checklist can help you prepare for an audit. 

Whether your customers demand an audit report from you or industry regulations require one, you may have to provide proof of SOC 2  compliance to demonstrate that the data you’ve been entrusted with is properly secured.

Read More

Malware from Aliens: Why Zero Trust is the Only Policy

Researchers from Germany and Hawaii demonstrated how communication from outer space—yes, outer space—is inherently untrustworthy. In their paper, they demonstrate how in the time and effort taken to decipher the extraterrestrial “hello,” we may miss alien malware that is completely foreign to us. They recommend completely destroying any complex message from space in order to avoid all risk, , or in other words, a zero trust policy. 

Read More

Why You Need to Get a SOC 2 Type 2 Report

The recent prevalence of high-profile cybersecurity attacks have spotlighted just how vulnerable corporate, government, and other organization’s networks are to breaches. One way to set your company apart and demonstrate how seriously you take cybersecurity is a SOC 2 Type 2 report. 

The financial and reputational damage caused by these attacks cannot be underestimated or taken lightly by any organization handling private data. In fact, the “2017 Cost of Data Breach Study” commissioned by the Ponemon Institute estimated the average total cost of an organizational data breach was $3.62 million.

Read More

Cybersecurity Framework Guidelines for Healthcare

Ransomware and other forms of digital extortion continue their unprecedented march, attacking computers, stealing the private data of millions of individuals, and forcing IT managers to play whack-a-mole in order to stem the tide of new threats entering network servers every year. The good news is, the healthcare industry can better prevent data breaches by adopting NIST's Cybersecurity Framework. 

Read More

Reasons to Get a SOC 2 Type 1 Report

Securing data is essential for satisfying your existing customers and getting new ones. People and organizations want to ensure that their sensitive information is protected against breaches. Providing them with proof that their data is secure is equally important, because many customers require such documentation as a condition of doing business with you. One way to provide that proof is with a SOC 2 Type 1 audit. 

Given their ability to provide that assurance to customers, IT assessments, audits, and reports can be beneficial as you grow your business, whether you’re launching new products or services or approaching prospective customers who request proof of security.

Read More

Lag In Healthcare Data Security Has Cost the Industry

It is no secret that healthcare data security has been lacking in comparison to other industries. With the heavy increase in cyberattacks and security breaches over the last couple of years, the healthcare industry has shown to be no less susceptible to IT security risks than other industries. In 2015, KPMG conducted a survey of 223 healthcare executives and found that nearly 80 percent of their IT had been compromised by cyberattacks. Additionally, according to KPMG, “the healthcare industry is behind other industries in protecting its infrastructure and electronic protected health information.”

Read More