Resources

Browse the posts by categories, please select on the category you'd like to read:

Why Passwords and 2FA Aren’t Enough
Why Passwords and 2FA Aren’t Enough
prod360 June 19, 2019

Amid growing threats of cyberattack, companies are requiring both password protocols and two-factor authentication (2FA). Some of today’s more popular methods include answering secret questions, using biometrics such as a fingerprint, or entering a one-time authentication code (OTP) sent to your phone via SMS text. But as the popular site Reddit recently found out the […]

Read More
Why Penetration Testing Needs to Be Part of Your Cybersecurity Strategy
Why Penetration Testing Needs to Be Part of Your Cybersecurity Strategy
prod360 April 30, 2019

To protect your company’s valuable and sensitive data, the best offense is a good defense — a solid cybersecurity strategy that not only keeps data safe but identifies areas of weakness and vulnerability before the bad guys do. This is why penetration testing needs to be part of your cybersecurity strategy. Penetration testing, or “pen […]

Read More
3 Questions to Ask Before Your SOC Assessment
3 Questions to Ask Before Your SOC Assessment
prod360 April 18, 2019

A System and Organization Controls (SOC) examination is an independent, third-party assessment of a service organization’s commitment to service and trustworthiness. For any company that intends to outsource a part of its business, such as payroll, record-keeping or IT, it’s a way to vet and gain reasonable assurance that potential service providers are operating under […]

Read More
Integrated Compliance Solutions Save Time and Money
Integrated Compliance Solutions Save Time and Money
prod360 April 2, 2019

Data security is of paramount importance as technology continues to evolve for businesses of all sizes. Conducting compliance audits on data security on a regular basis is vital, but sometimes the sheer volume of data security compliance audits can result in audit fatigue and in financial losses as well as wasting time. An integrated compliance […]

Read More
Data Security Controls That Last
Data Security Controls That Last
prod360 March 22, 2019

Data is the lifeblood of the 21st century, and protecting it should be a top priority for everyone who touches it. Data security is also required by law, a deal-maker or breaker for some customers, and a public-interest issue that makes headlines when it fails. If a company is entrusted with sensitive data, enacting the […]

Read More
Why HITRUST CSF Needs to Be On Your Radar for 2020
Why HITRUST CSF Needs to Be On Your Radar for 2020
prod360 March 11, 2019

When it comes to protecting privacy and securing data and other sensitive information, healthcare organizations are some of the most scrutinized. They face a huge number of federal regulations, compliance standards and state laws, including HIPAA, HITECH, ISO 27001, PCI DSS, NIST, COBIT, and FTC. For third-party healthcare partners, this makes proving trustworthiness with sensitive […]

Read More
What is a SOC Report and Why Does My Company Need One?
What is a SOC Report and Why Does My Company Need One?
prod360 March 1, 2019

System and Organization Controls (SOC) reports enable companies to feel confident that service providers, or potential service providers, are operating in an ethical and compliant manner. No one likes to hear the word audit, but SOC reports establish credibility and trustworthiness for a service provider — a competitive advantage that’s worth both the time and […]

Read More
Microsoft Vendors Must Meet Tough SSPA Security Standards; 360 Advanced Offers Audits to Assess Your MSSPA Compliance
prod360 June 16, 2015

TAMPA, Fla., June 16, 2015 (GLOBE NEWSWIRE) — As Microsoft continues to require its data management vendors to comply with its Supplier Security and Privacy Assurance Program (MSSPA), leading Tampa-based IT audit firm 360 Advanced is meeting increasing demand by offering MSSPA attestation services to help vendors achieve compliance. The Microsoft SSPA initiative is designed […]

Read More
360 Advanced finds cyber underwriters prefer Data vendors with third-party compliance examinations
prod360 December 17, 2014

TAMPA, Fla., Dec. 12, 2014 /PRNewswire/ — Cyber insurance underwriters will favor – and may offer premium reductions – for third party data management providers and their clients if they have undergone formal data security compliance reviews by certified outside examiners, research by 360 Advanced, Inc. shows. A poll of five leading insurance executives by […]

Read More
360 Advanced analysis shows firms to be punished for breaches under new laws being considered by states and Congress
prod360 August 21, 2014

TAMPA, Fla., Aug. 21, 2014 /PRNewswire/ — A legislative survey by 360 Advanced, Inc. shows the U.S. Congress and some states are considering legislation that would require organizations managing databases of personal information to put in place safeguards against hacking – or face significant fines after a breach.

Read More