Illinois: (312) 533-4033
Pennsylvania: (814) 333-3117
Wisconsin: (262) 686-5070

Menu

Tag Archive: 2w tech’s cyber security compliance program

How to Maintain IT Compliance Documentation

Every information security and IT compliance professional knows that compliance documentation is critical to the ongoing viability of an IT compliance program. But even knowing this, many organizations fail at creating and maintaining documentation around their IT compliances. Many regulations specifically require the formal documentation of security controls and processes. Written descriptions of security controls are important to ensure continuity…
Monday, August 13, 2018

PCI DSS 3.2 : Are You Compliant?

If you work for a company who takes card payments from customers over the phone, you are responsible for keeping that data as safe and secure as possible. This is not just to protect your customers but to protect your business as well. PCI DSS 3.2 was introduced in April 2016, and it’s been considered best practice in the industry since…
Monday, March 19, 2018

National Institute of Standards and Technology (NIST)

Another compliance that is affecting companies with their technology and security is NIST. Compliance with NIST standards and guidelines has become a top priority in many high tech industries today. The National Institute of Standards and Technology is a non-regulatory government agency that develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S based organizations in the science and…
Monday, March 5, 2018

System and Organization Controls (SOC) Reporting

System and Organization Controls (SOC) is a suite of service offerings CPA’s may provide about system-level controls of a service organization or entity-level controls of other organizations. Internal control reports on the services provided by a service organization providing valuable information that users need to assess and address the risks associated with an outsourced service. It consists of SOC for Service…
Monday, February 26, 2018

Using a Third Party to Help With Compliance

Are you being hounded by your customers and/or suppliers to get compliant? 2018 is the year that many of the regulations and compliances that were introduced in 2017, will be audited. Most organizations must abide by and maintain a standard for controls that safeguard the confidentiality and privacy of information stored and processed. Being Cyber Security Compliant is not an…
Monday, January 8, 2018