
Many organizations choose to complete a readiness assessment prior to their System and Organization Controls (SOC) examination. The readiness period of your SOC audit prepares your organization’s policies and procedures…
Many organizations choose to complete a readiness assessment prior to their System and Organization Controls (SOC) examination. The readiness period of your SOC audit prepares your organization’s policies and procedures…
Data breaches can have disastrous consequences, particularly for startups or small to medium-sized businesses. According to Cybercrime Magazine, 60 percent of small companies go out of business within six months…
Vulnerability scans and penetration tests—they sound similar, right? Some use them interchangeably, but the truth is these terms are quite different when it comes to how they are carried out,…
Strong policies and procedures are the benchmark of any organization’s information security program. An information security policy defines the organization’s security standards and provides practical guidance to the company’s employees…
The demand for HITRUST certifications is at an all-time high. According to Health IT Security, since the founding of HITRUST in 2007, more than 80% of hospitals and health systems…
Today, BARR Advisory celebrates the 53rd observance of Earth Day by reflecting on the theme—invest in our planet—and sharing ways in which we work toward a sustainable culture. As environmental…
With data risk on the rise, you may be questioning which security framework is best for your organization. Two compliance standards to consider are the International Organization for Standards (ISO)…
In a recent survey by Cisco, 84% of respondents indicated they care about data privacy—their own data, the data of others, and the desire for more control over how that…
Not sure what to include in your company’s SOC 2 report system description? You’re not alone. Some of the most common questions we get from our clients are related to…
April 12 marks Identity Management Day, a day dedicated to raising awareness and inspiring individuals to take action when it comes to safely managing digital identities, hosted by the Identity…