Category: Compliance Standards

Staying informed about all of the cyber security compliance standards is essential to keeping your company safe from hackers. Read on to learn about the various steps you can take to stay up to date with your industry’s compliance standards.

  • Beginner’s PIPEDA Requirement Checklist

    Beginner’s PIPEDA Requirement Checklist

    Does your company do business in Canada? If so, and it includes transmitting, storing, and using personally protected information (PII), the organization must meet the Personal Information Protection and Electronic Documents Act (PIPEDA) requirements. This is where a PIPEDA compliance checklist will come in handy. 

    (more…)

  • Why CIS Controls Are Critical for Effective Cyber Defense

    Why CIS Controls Are Critical for Effective Cyber Defense

    No matter how robust a company’s information technology (IT) resources and protections are, they’re always subject to risk. Even the most proactive companies struggle to keep pace with the evolution of cybercriminals’ methods and vectors of attack. The Center for Internet Security (CIS) has developed a framework to help reduce these risks; the CIS critical security controls for effective cyber defense are a key area of security for all business. 

    (more…)

  • What is the PCI DSS 4.0 Standard Draft?

    What is the PCI DSS 4.0 Standard Draft?

    All businesses that process payments via credit card face a certain amount of risk with every transaction. On one level, fraudulent payments are always a concern. But on another, cardholder information is extremely valuable, and cybercriminals who target it can impact your clients and business. To keep your customers safe and avoid the potential consequences of noncompliance, it’s important to know what the PCI DSS 4.0 draft is.

    (more…)

  • How Much Does SOC 2 Certification Cost?

    How Much Does SOC 2 Certification Cost?

    Businesses that process client data need to find ways to make their valued clients trust them.  Whether your business is storing delicate financial information, transporting medical records, or processing intricate biographical details, it’s important to follow the SOC 2 guidelines set out by the American Institute of CPAs (AICPA). But what do these guidelines entail? What does SOC 2 certification cost, and what factors impact and influence cost?

    (more…)

  • Your Basic FAIR Risk Asssessment Guide

    Your Basic FAIR Risk Asssessment Guide

    Your organization manages data threats every day and new ones are constantly appearing. You might feel safe if you meet industry cybersecurity compliance standards but this doesn’t mean that all of the potential risks have been identified. This is why we’ve created your basic FAIR methodology risk assessment guide. 

    (more…)

  • How To Measure And Manage Information Risk

    How To Measure And Manage Information Risk

    Most businesses feel confident that their data is protected from outside and internal threats, but their information could still be at risk. Knowing how to measure and manage information risk is an important part of your cybersecurity practices.

    (more…)

  • Navigating ADA Web Content Accessibility Guidelines

    Navigating ADA Web Content Accessibility Guidelines

    There are multiple rules and guidelines set forth by the Americans with Disabilities Act (ADA) regarding website accessibility. Learn what they are and what the ADA means to your business.

    (more…)

  • What’s coming in CCPA 2.0?

    What’s coming in CCPA 2.0?

    CCPA 2.0 compliance is necessary for businesses in the state of California. Learn about future privacy regulations under consideration at the federal or state level for the upcoming November 2020 ballot.

    (more…)

  •  How to Make Your Website ADA Compliant

     How to Make Your Website ADA Compliant

    It is a generally accepted belief that the Internet should be accessible to every person because access to knowledge is a basic human right. Yet, it’s sometimes easy to overlook the minority of people living with disabilities and how this affects their capacity to use the Internet. Learn everything you need to know about making your organization’s website ADA  compliant. 

    You may be asking,what exactly is the ADA? The ADA stands for Americans With Disabilities Act. 

    (more…)

  • What are the Ten Foundational CIS Critical Security Controls?

    What are the Ten Foundational CIS Critical Security Controls?

    The CIS sets for ten foundational cybersecurity controls that will help protect your organization against more sophisticated hackers.

    George Orwell’s book “1984” may have predicted it best. He said, “Big Brother is watching you.” And indeed, the growing shift to the digital realm of organizations across the globe has given rise to another dangerous industry — cybercrime. Hence the subsequent development and implementation of critical security controls.

    (more…)