Resources

Browse the posts by categories, please select on the category you'd like to read:

How Do HITRUST, HIPAA, and NIST Work Together?
April 11, 2023
How Do HITRUST, HIPAA, and NIST Work Together?

If your company deals with credit card numbers, patient records, customer information or other sensitive data, the list of compliance standards, federal […]

Read More
Here’s What You Need to Know about HITRUST’s New Assessment and Updates
January 19, 2023
Here’s What You Need to Know about HITRUST’s New Assessment and Updates

In an effort to stay relevant with current and emerging threats, HITRUST has made several updates. First, the big news: HITRUST has […]

Read More
What is a SOC Report and Why Does My Company Need One?
December 5, 2022
What is a SOC Report and Why Does My Company Need One?

System and Organization Controls (SOC) reports enable companies to feel confident that service providers, or potential service providers, are operating in an […]

Read More
Cybersecurity Awareness Is ‘Understanding That Breaches Will Very Likely Happen’
October 31, 2022
Cybersecurity Awareness Is ‘Understanding That Breaches Will Very Likely Happen’

In 2004, as threats to technology were becoming more and more common, President George W. Bush and Congress declared October as Cybersecurity […]

Read More
Cybersecurity and Compliance Programs in a Recession? (Yes. Here’s Why.)
October 26, 2022
Cybersecurity and Compliance Programs in a Recession? (Yes. Here’s Why.)

With experts forecasting that a recession is looming, many businesses might be making tough choices about what’s important to their bottom line. […]

Read More
Sr. Practice Manager Sushma Uniyal’s Tips for Audit Success Published in ISACA Journal
August 31, 2022
Sr. Practice Manager Sushma Uniyal’s Tips for Audit Success Published in ISACA Journal

360 Advanced Senior Practice Manager Sushma Uniyal’s article “The Top Five Audit Essentials for Driving Efficiency and Value” was recently published in […]

Read More
Demystifying SOC 2, HIPAA & HITRUST—Top 5 Common Questions 
August 30, 2022
Demystifying SOC 2, HIPAA & HITRUST—Top 5 Common Questions 

In our recent August webinar, “Demystifying SOC 2, HIPAA & HITRUST,” 360 Advanced Practice Director Ryan Winkler and Sr. Compliance Executive Kris […]

Read More
Log4j Vulnerability Still Poses Major Threat
August 16, 2022
Log4j Vulnerability Still Poses Major Threat

In January, the FTC warned companies about the catastrophic consequences of the vulnerability caused by Log4j, a Java library for logging error […]

Read More
SOC 2 Webinar—Top 5 Takeaways
July 21, 2022
SOC 2 Webinar—Top 5 Takeaways

The question of how to better prepare for a SOC 2 assessment comes up frequently for the assessors at 360 Advanced. In […]

Read More
The Difference between HITRUST i1 and r2
July 5, 2022
The Difference between HITRUST i1 and r2

HITRUST is the most widely adopted security and privacy framework in the healthcare industry, and it’s required by more than 84% of […]

Read More