
By: Angela Redmond and Hannah Kenney How can you tell if your cybersecurity program is effective? While audits give you a deep dive over your program at a point in…
By: Angela Redmond and Hannah Kenney How can you tell if your cybersecurity program is effective? While audits give you a deep dive over your program at a point in…
Vulnerability scans and penetration tests—they sound similar, right? Some use them interchangeably, but the truth is these terms are quite different when it comes to how they are carried out,…
News of a widespread security exploit within the Log4j internet software (also called Log4shell) sent IT and security teams into emergency mode earlier this week. With lots of information swirling…
BARR Advisory recently partnered with Bitcoin ATM vendor Bitaccess to complete SOC 1 and SOC 2 audits. Bitaccess has more than 3,800 Bitcoin Teller Machines (BTMs) around the world, serving…
In honor of National Cybersecurity Awareness Month (NCSAM), we’ve asked BARR associates for their favorite go-to resources for all things information security. From entertaining insight to informative technical analysis, here…
Today, most businesses rely on third-party vendors and service providers to outsource business processes. For small businesses especially, this practice is the norm for good reason. Vendors can cut costs…
Joe from the marketing department could lose his documents if your outsourced infrastructure isn’t secure. That might not seem like the end of the world (unless you’re Joe), but if…
Every business needs a way to achieve its objectives and address risks. Businesses big and small, brick-and-mortar or in the cloud, require strong leadership, a plan to mitigate risks, and…