
With the Center for Internet Security (CIS) recently releasing version eight of its controls, consolidating the previous 20 controls into 18, let’s dive into the final set of six controls…
With the Center for Internet Security (CIS) recently releasing version eight of its controls, consolidating the previous 20 controls into 18, let’s dive into the final set of six controls…
With the Center for Internet Security (CIS) recently releasing version eight of its controls, consolidating the previous 20 controls into 18, let’s dive into the second set of six controls…
The Center for Internet Security (CIS) recently released version eight of its controls, consolidating the previous 20 controls into 18 (more on this here). Let’s dive into the first six…
The Center for Internet Security (CIS) recently released version eight of its controls, consolidating the previous 20 controls into 18. This latest list is organized by activity, rather than by…
By Mitch Evans, Director of CISO Advisory, and Larry Kinkaid, Senior Consultant, CISO Advisory With the increase in data breaches, businesses are more cautious than ever when it comes to…
Every business needs a way to achieve its objectives and address risks. Businesses big and small, brick-and-mortar or in the cloud, require strong leadership, a plan to mitigate risks, and…
Any service organization that wants to establish an element of trust between its services and the end user and its customers needs transparency. Service Organization Controls (SOC) Reports® are one form of reporting to verify this element of trust.
While every business faces some measure of risk, one of the ultimate factors in any successful enterprise is an effective risk management program. One of the most difficult things for…
Intro to HIPAA Compliance: 5 Things You Need to Know The official act of implementing safeguards to protect personal health information, also known as PHI, has been in place for…