
So what goes into a SOC 2 report, anyway? There are five trust services criteria (TSC) that can be included in a SOC 2 report: security, availability, confidentiality, processing integrity,…
So what goes into a SOC 2 report, anyway? There are five trust services criteria (TSC) that can be included in a SOC 2 report: security, availability, confidentiality, processing integrity,…
A recently released survey conducted by Health3PT confirms 72% of vendors believe today’s third-party risk management practices are not effective. Health3PT and HITRUST Assurance Program have partnered together to provide…
by: Devin Olsen One of the worst mistakes a business leader can make is believing that compliance equals security. There are many examples of this, but the most egregious often…
We recently sat down with Steve Ryan, manager of Attest Services, to discuss his thoughts on why businesses struggle to meet compliance requirements. Here’s what he had to say: Steve,…
Building and operating a data management plan can be time consuming and overwhelming. You don’t have to go it alone. BARR Advisory asked Dariek Howard, manager, Attest Services, to share…
Last year, the Securities and Exchange Commission (SEC) proposed new rules to enhance and standardize cybersecurity risk management, strategy, governance, and incident reporting disclosure practices by public companies and other…
BARR Advisory is excited to announce our launch of a new quarterly publication, For Your Information: A cyBARR Quarterly. Since we’re all about being future ready at BARR, we wanted…
BARR Advisory recently teamed up with Cobalt and anecdotes to host a free webinar titled, “Compliance-Driven Pentesting: Driving Business Growth and Resilience.” In the webinar, we took a deep dive…
According to the 2022 IBM Cost of Data Breach report, 83% of organizations surveyed experienced more than one data breach with an average total cost of $4.35 million. This cost…
By Marc Gold and Megan Sajewski You’ve worked hard to successfully complete several cybersecurity audit engagements—now what? Partnering with BARR means you get an evolutionary approach to your cybersecurity compliance…