Skip to main content

Resources

Entries for March 2019

SOC 2 vs. SOC for Cybersecurity Reports

Wednesday, March 27, 2019

There are a variety of different types of SOC reports, including SOC 1, SOC 2, and SOC 3, as well as the newest member of the team – the SOC for Cybersecurity. While each report has its own purpose, we’re going to dive into the difference between the SOC 2 and SOC for Cybersecurity reports.

Read More...

Categories: Blog

FTC Proposes Changes to GLBA Safeguards Rule

Friday, March 22, 2019

The first major changes to the GLBA and the Safeguards Rule have been proposed. On March 5th, 2019, the FTC announced proposed revisions to the Safeguards Rule, including an expansion of the companies covered by the Rule and requiring specific controls to secure customers’ information.

Read More...

Categories: Blog, In the News

Scoping Your IT Audit Based on Risk

Wednesday, March 20, 2019

"Scoping your IT Audit based on risk" is a phrase that’s thrown around a lot by IT Audit companies and examiners, but what does it really mean? How do you know if your IT Audit is truly risk-based, or if it’s based on an auditor’s idea of what security ought to be?

Read More...

Categories: Blog

A Guide to Performing Internal Social Engineering Testing

Wednesday, March 13, 2019

Social engineering testing more than once a year is proven to be a beneficial way to keep employees alert and hold them responsible for their actions. Since hiring regular testing throughout the year is not an option for everyone, let’s go through some options for performing your own internal social...

Read More...

Categories: Blog
Page 1 of 2First   Previous   [1]  2  Next   Last