Resources

Browse the posts by categories, please select on the category you'd like to read:

Johnson & Quin Achieves SOC 2 Compliance
Faith Kubicki November 4, 2019

Johnson & Quin, a full-service provider of direct mail production and mailing services, today announced successful completion of their 2019 SOC 2 Type 2 examination. The company initially completed their SOC 2 Type 1 examination in 2018. Completing the examination “verifies that our security processes are consistent, ongoing and sustainable,” explained Manish Haria, VP, CISO […]

Read More
Colo Solutions Achieves 5 Consecutive Years of SOC 1, HIPAA, and PCI Compliance
Faith Kubicki October 28, 2019

Colo Solutions, a colocation and cloud services provider located in downtown Orlando, Florida, today announced successful completion of their 2019 SOC 1 Type 2 examination, HIPAA Security Compliance assessment, and PCI DSS assessment. As the company’s top priority, “customer needs” are the driving force behind the comprehensive initiative, noted Clayton Mynard, CEO. The company’s five […]

Read More
From Zero to Security and Compliance Hero
From Zero to Security and Compliance Hero
prod360 July 22, 2019

Ontic Technologies, the leading provider of Protective Intelligence Security Software, delivers technology to empower security teams to protect assets, employees and customers. In today’s world, you, your company, your employees, your students, or your physical assets may come under some kind of threat or attack. Investments in physical and other security systems have already been […]

Read More
Elevate Your Cybersecurity Program with ISO 27001 Certification
Elevate Your Cybersecurity Program with ISO 27001 Certification
prod360 June 30, 2019

A cybersecurity program that’s strong is good, but one that’s ISO 27001 certified is best-in-class. Why? Earning certification means the systems that protect your company’s sensitive data have passed rigorous and specific testing against cyber attacks and other vulnerabilities that could lead to a breach. What is ISO 27001? ISO 27001 is an international standard […]

Read More
Why Passwords and 2FA Aren’t Enough
Why Passwords and 2FA Aren’t Enough
prod360 June 19, 2019

Amid growing threats of cyberattack, companies are requiring both password protocols and two-factor authentication (2FA). Some of today’s more popular methods include answering secret questions, using biometrics such as a fingerprint, or entering a one-time authentication code (OTP) sent to your phone via SMS text. But as the popular site Reddit recently found out the […]

Read More
How Do HIPAA, NIST, and HITRUST CSF Work Together?
How Do HIPAA, NIST, and HITRUST CSF Work Together?
prod360 June 5, 2019

If your company deals with credit card numbers, patient records, customer information or other sensitive data, the list of compliance standards, federal regulations, and state laws can be very long. And if you’re a healthcare organization? It’s even more complex. What is HIPAA? Probably the most well-known compliance standard is the Health Insurance Portability and […]

Read More
Don’t Miss These Ways to Strengthen Your Cybersecurity Plan
Don’t Miss These Ways to Strengthen Your Cybersecurity Plan
prod360 May 17, 2019

Creating a sound cybersecurity plan means anticipating likely scenarios that might lead to a breach, and then building a strong defense. It can be complicated, nuanced, and a huge challenge — especially since cybercrime accounted for as much as $2.7 billion in financial losses in 2018. With tech that’s ever-evolving and hackers who will increasingly […]

Read More
One Year Anniversary of GDPR Compliance
One Year Anniversary of GDPR Compliance
prod360 May 7, 2019

Time moves fast, and that is especially true in the world of business regulation and compliance. It’s already been a year since GDPR, the European Union’s privacy law, went into effect. It took two years after GDPR was passed by the European Parliament, the Council of the European Union and the European Commission for it […]

Read More
Why Penetration Testing Needs to Be Part of Your Cybersecurity Strategy
Why Penetration Testing Needs to Be Part of Your Cybersecurity Strategy
prod360 April 30, 2019

To protect your company’s valuable and sensitive data, the best offense is a good defense — a solid cybersecurity strategy that not only keeps data safe but identifies areas of weakness and vulnerability before the bad guys do. This is why penetration testing needs to be part of your cybersecurity strategy. Penetration testing, or “pen […]

Read More
3 Questions to Ask Before Your SOC Assessment
3 Questions to Ask Before Your SOC Assessment
prod360 April 18, 2019

A System and Organization Controls (SOC) examination is an independent, third-party assessment of a service organization’s commitment to service and trustworthiness. For any company that intends to outsource a part of its business, such as payroll, record-keeping or IT, it’s a way to vet and gain reasonable assurance that potential service providers are operating under […]

Read More