19 02, 2023

Preparing for SOC 2 Type 2 Compliance Certification

2023-02-19T11:03:50-08:00

SOC2 Type 2 compliance is a set of security standards for service providers that handle sensitive data such as financial information, personal identification, or protected health information. The goal of SOC2 Type 2 compliance is to ensure that service providers [...]

Preparing for SOC 2 Type 2 Compliance Certification2023-02-19T11:03:50-08:00
22 08, 2021

Components of an Incident Response Plan

2021-08-22T12:33:24-07:00

Generally speaking, while organizations will focus on how to prevent a cyber incident, they may not have a plan for what to do in the event that one occurs, or understand the high cost of recovery from a breach. Reacting properly [...]

Components of an Incident Response Plan2021-08-22T12:33:24-07:00
11 04, 2021

Cybersecurity and the Consumer: Reacting to Apple Inc’s Security Slips

2021-04-11T08:21:57-07:00

Like most people, he assumed that the applications from Apple’s App Store were safe, the consequence was losing $600,000. The repercussions of poor cybersecurity is now expanding drastically into people’s private lives. This is a paradigm shift from the typical [...]

Cybersecurity and the Consumer: Reacting to Apple Inc’s Security Slips2021-04-11T08:21:57-07:00
Go to Top