Resources

Browse the posts by categories, please select on the category you'd like to read:

What is a SOC Report and Why Does My Company Need One?
December 5, 2022
What is a SOC Report and Why Does My Company Need One?

System and Organization Controls (SOC) reports enable companies to feel confident that service providers, or potential service providers, are operating in an […]

Read More
Cybersecurity Awareness Is ‘Understanding That Breaches Will Very Likely Happen’
October 31, 2022
Cybersecurity Awareness Is ‘Understanding That Breaches Will Very Likely Happen’

In 2004, as threats to technology were becoming more and more common, President George W. Bush and Congress declared October as Cybersecurity […]

Read More
Cybersecurity and Compliance Programs in a Recession? (Yes. Here’s Why.)
October 26, 2022
Cybersecurity and Compliance Programs in a Recession? (Yes. Here’s Why.)

With experts forecasting that a recession is looming, many businesses might be making tough choices about what’s important to their bottom line. […]

Read More
Spike in Ransomware Attacks Spurs Cyber Insurance Providers to Expand Requirements 
October 10, 2022
Spike in Ransomware Attacks Spurs Cyber Insurance Providers to Expand Requirements 

In the second quarter of 2022, US cyber insurance prices surged 79% compared to a year earlier. And in the two quarters […]

Read More
360 Advanced and Ballast Services Co-Host Tampa Bay Tech’s Quarterly Meeting
September 12, 2022
360 Advanced and Ballast Services Co-Host Tampa Bay Tech’s Quarterly Meeting

TAMPA, Fla. (PRWEB) September 12, 2022 — Tampa Bay Tech CEOs’ August meeting, co-hosted by Dan Collins of 360 Advanced and Keith […]

Read More
Sr. Practice Manager Sushma Uniyal’s Tips for Audit Success Published in ISACA Journal
August 31, 2022
Sr. Practice Manager Sushma Uniyal’s Tips for Audit Success Published in ISACA Journal

360 Advanced Senior Practice Manager Sushma Uniyal’s article “The Top Five Audit Essentials for Driving Efficiency and Value” was recently published in […]

Read More
Demystifying SOC 2, HIPAA & HITRUST—Top 5 Common Questions 
August 30, 2022
Demystifying SOC 2, HIPAA & HITRUST—Top 5 Common Questions 

In our recent August webinar, “Demystifying SOC 2, HIPAA & HITRUST,” 360 Advanced Practice Director Ryan Winkler and Sr. Compliance Executive Kris […]

Read More
Log4j Vulnerability Still Poses Major Threat
August 16, 2022
Log4j Vulnerability Still Poses Major Threat

In January, the FTC warned companies about the catastrophic consequences of the vulnerability caused by Log4j, a Java library for logging error […]

Read More
SOC 2 Webinar—Top 5 Takeaways
July 21, 2022
SOC 2 Webinar—Top 5 Takeaways

The question of how to better prepare for a SOC 2 assessment comes up frequently for the assessors at 360 Advanced. In […]

Read More
The Difference between HITRUST i1 and r2
July 5, 2022
The Difference between HITRUST i1 and r2

HITRUST is the most widely adopted security and privacy framework in the healthcare industry, and it’s required by more than 84% of […]

Read More