RSI Security recently partnered with Trustifi to discuss some significant considerations for the future of data privacy and security. Panelists discussed companies’ pain points concerning various, overlapping compliance frameworks and how RSI Security and Trustifi can help address them. Read on for a comprehensive recap of the data privacy webinar. (more…)
Blog
-

Top Security Monitoring Solutions for SOC 2 Compliance
Service organizations vary widely in nature, but all need to assure their clients’ trust. One significant hurdle to that effect is securing the networks upon which you and your customers rely. A SOC 2 audit, using the American Institute of Certified Public Accounts (AICPA) Trust Services Criteria (TSC), goes a long way toward earning that trust. Implementing network security monitoring solutions and techniques help ensure a successful SOC 2 audit report and optimize your cyberdefenses more broadly. (more…)
-

The HITRUST Cybersecurity Framework Assessment Methodology
One of the most comprehensive cybersecurity frameworks companies can implement is the HITRUST Alliance’s CSF. Full certification has many benefits, including streamlined compliance across other regulations and optimal security. Conducting a HITRUST Readiness Assessment, internally or with professional help, is one of the best ways to prepare for full implementation. (more…)
-

Why Business Should Use Disk Encryption Software
Encryption protects data by rendering it unreadable without the associated key. Thus, encrypted hard drives secure the entirety of data stored on a given device. While not a substitute for other cybersecurity measures that restrict access, disk encryption software provides a sort of “last line of defense” effort. When employed, it often means the difference between succeeding and failing to prevent data loss and its repercussions should a hacker breach your IT environment. (more…)
-

What Threats Does a Web Application Security Assessment Prevent?
If your organization conducts business via web applications, it’s critical to protect your web application infrastructure from threats such as denial-of-service (DDoS) attacks, malware, and ransomware. With increased web traffic due to the COVID-19 pandemic, there was a reported 20% surge in DDoS attacks in 2020 alone, emphasizing the need for web application security. (more…)
-

What Are Managed Antivirus Services and Solutions?
Viruses have long plagued computers and users and remain a significant threat to data and IT system integrity. While your organization can choose to oversee antivirus software implementations and updates in-house, you should consider outsourcing the responsibility to a managed security services provider (MSSP) via managed antivirus service.
-

A Comprehensive Guide to PCI DSS Audit Procedures
Compliance with the Payment Card Industry’s (PCI) Data Security Standards (DSS) requires annual reporting. This annual compliance reporting involves extensive PCI DSS audit procedures for organizations that handle the highest transaction volumes. The audit procedures are conducted during the completion of an on-site assessment known as a Report on Compliance (ROC). (more…)
-

What is the HITRUST De-Identification Framework?
The HITRUST Alliance is a trusted cybersecurity institution that develops frameworks to help organizations optimize their cybersecurity programs, often with the help of a managed security services provider (MSSP). One of the most useful guidance documents HITRUST publishes is the HITRUST De-Identification Framework, which standardizes practices that apply primarily to healthcare institutions but are easily adaptable and scalable to organizations in any industry. (more…)
-

How to Build a Security Operations Center
Security operations centers (SOC) comprise the people, processes, and technology that manage an organization’s cybersecurity strategy and its execution. Designing a security operations center architecture from the ground up or reorganizing an existing team will always revolve around these three components, and each necessitates specific considerations. (more…)
-

Are VCISO’s in High Demand?
With so many organizations focusing on IT implementation and integration, chief information security officers (CISOs) and virtual CISOs (vCISOs) are more important than ever before. But the popularity of these roles means that CISOs are currently in very high demand, which may leave you wondering—are vCISOs in high demand, too? (more…)
