Cloud computing is growing exponentially in scale, scope, and service sophistication. While this provides many opportunities for service providers, organizations, and consumers alike, the rapid evolution of this technology has…
-
-
Ransomware Awareness Training: Best Practices and Top Considerations
by RSI Securityby RSI SecurityHundreds of millions of ransomware attacks occur across the globe every year. Unfortunately, it’s a growing problem that puts countless IT environments continually at risk. Thankfully, ransomware awareness training ensures…
-
Privacy by Design certification helps ensure acceptable privacy standards per the European Union’s (EU) General Data Protection Regulation (GDPR). Although certification is not explicitly a GDPR requirement, the concept of…
-
System and Organizations Controls (SOC) reporting comes in multiple varieties, with each kind applying to different industries or intended for different audiences. SOC 2 is primarily aimed at Software-as-a-Service (SaaS)…
-
Cloud security tools have never been more critical to day-to-day operations. With so many organizations moving increasing amounts of their functionality into the cloud and increasing their reliance on cloud-based…
-
Wireless Security Issues and Solutions for Organizations in Healthcare
by RSI Securityby RSI SecurityHealthcare organizations are in the business of storing, sharing, and processing sensitive patient health information (PHI). This requires stringent data protection and cybersecurity safeguards. When it comes to wireless networks,…
-
In the context of ever-escalating cyberthreats, a dedicated Chief Information Security Officer (CISO) proves to be indispensable. A CISO provides invaluable direction and can help avert potentially debilitating crises. But…
-
Enterprise Security Architecture Requirements and Best Practices for Sustained Growth
by RSI Securityby RSI SecuritySecurity architecture can be defined as the controls that support IT infrastructure. For a large enterprise, security architecture extends beyond prescriptive processes; it must adapt to address evolving cybersecurity threats…
-
Overseen by the American Institute of Certified Public Accountants (AICPA), SOC 2 evaluates the implementation of effective standards and controls for organizations outside the financial sector, including software-as-a-service (SaaS) providers.…
-
Recap: Understanding SOC 2 Reports: Types, Purposes & Key Benefits Explained
by RSI Securityby RSI SecurityRSI Security hosted a webinar with Mueller to discuss the types, purposes, and benefits of SOC 2 reports. Panelists discussed aspects of SOC 2 audits, risk management, and assessment of…