
By: Swathi West, healthcare and privacy manager Our work lives have changed drastically over the last two years. Instead of spending mornings getting ready for work, sitting in traffic, and…
By: Swathi West, healthcare and privacy manager Our work lives have changed drastically over the last two years. Instead of spending mornings getting ready for work, sitting in traffic, and…
With summer now behind us, BARR Advisory associates are reminiscing about where they traveled—and worked from—this summer. From jaunts across the country to international excursions, associates took advantage of BARR’s…
Ever wondered what a day in the life of an IT auditor looks like? Luckily for you, Senior Consultant Emma Ostrowski is here to walk you through a day in…
By: Angela Redmond, Director of Cyber Risk Advisory Cybersecurity is an ever-changing field. Hackers and cybercriminals are getting smarter and constantly changing their approach, which is why it’s important to…
By: Kyle Helles, Head of Attest Having a vision of what you’d like to achieve is important for all strategic business priorities—and cybersecurity is no different. With a constantly evolving…
BARR Advisory continues to expand our team. In a few short months, we’ve welcomed several new senior consultants to our cyber risk advisory practice, including Sydney Buchel, Brianna Plush, Nick…
Each year, Verizon researchers release the annual Data Breach Investigations Report (DBIR). Verizon began releasing the report in 2008, and for the past 15 years, the DBIR has been one…
According to a study by VMLR, workplace belonging leads to a 56 percent increase in job performance. At BARR Advisory, we value belonging, which is why Pride is more than…
By: Brett Davis, senior CISO consultant An information security management system (ISMS) is a critical component of every organization. An ISMS consists of the documented set of security controls in…
By: Jeff Hoskins, senior consultant, CISO Advisory According to the 2022 Verizon Data Breach Investigations Report, 82 percent of data breaches had some human element, such as phishing, misused credentials,…