
As Mother’s Day approaches, we take time to reflect on all of the things mothers, and all caregivers, do to ensure the safety and security of their children. From the…
As Mother’s Day approaches, we take time to reflect on all of the things mothers, and all caregivers, do to ensure the safety and security of their children. From the…
In August of 2022, LastPass, the cloud-based password saver, was breached as bad actors stole information that would eventually lead them to access a copy of the data vaults of…
by: Larry Kinkaid Defining the scope of your information security management system (ISMS) is a crucial step in your security and compliance journey. The scoping statement is a core element…
By: Angela Redmond, Director of Attest Services Cybersecurity is an ever-changing field. Hackers and cybercriminals are getting smarter and constantly changing their approach, which is why it’s important to stay…
By: Kyle Helles, Head of Attest Having a vision of what you’d like to achieve is important for all strategic business priorities—and cybersecurity is no different. With a constantly evolving…
By: Angela Redmond and Hannah Kenney How can you tell if your cybersecurity program is effective? While audits give you a deep dive over your program at a point in…
Vulnerability scans and penetration tests—they sound similar, right? Some use them interchangeably, but the truth is these terms are quite different when it comes to how they are carried out,…
News of a widespread security exploit within the Log4j internet software (also called Log4shell) sent IT and security teams into emergency mode earlier this week. With lots of information swirling…
BARR Advisory recently partnered with Bitcoin ATM vendor Bitaccess to complete SOC 1 and SOC 2 audits. Bitaccess has more than 3,800 Bitcoin Teller Machines (BTMs) around the world, serving…