Resources

Browse the posts by categories, please select on the category you'd like to read:

Log4j Vulnerability Still Poses Major Threat
August 16, 2022
Log4j Vulnerability Still Poses Major Threat

In January, the FTC warned companies about the catastrophic consequences of the vulnerability caused by Log4j, a Java library for logging error […]

Read More
Webinar: Demystifying SOC 2, HIPAA & HITRUST
August 3, 2022
Webinar: Demystifying SOC 2, HIPAA & HITRUST

Read More
SOC 2 Webinar—Top 5 Takeaways
July 21, 2022
SOC 2 Webinar—Top 5 Takeaways

The question of how to better prepare for a SOC 2 assessment comes up frequently for the assessors at 360 Advanced. In […]

Read More
The Difference between HITRUST i1 and r2
July 5, 2022
The Difference between HITRUST i1 and r2

HITRUST is the most widely adopted security and privacy framework in the healthcare industry, and it’s required by more than 84% of […]

Read More
Webinar: StateRAMP 101-The States’ Equivalent of FedRAMP
June 30, 2022
Webinar: StateRAMP 101-The States’ Equivalent of FedRAMP

Read More
The Top 3 Reasons You Need a SOC 2 Report
June 14, 2022
The Top 3 Reasons You Need a SOC 2 Report

Security frameworks like SOC 2 (System and Organization Controls) are becoming increasingly important for companies that process or store client data. SOC 2 reports […]

Read More
Ransomware Remains a Top Threat
June 6, 2022
Ransomware Remains a Top Threat

It’s hard to imagine it could surge higher, but ransomware continues its upward climb with a “rise as big as the last […]

Read More
360 Advanced Team Selected to Serve on 2022 HITRUST External Assessor Council
June 2, 2022
360 Advanced Team Selected to Serve on 2022 HITRUST External Assessor Council

360 Advanced’s Quality Assurance Manager Chelsea Higgins and Practice Director Ryan Winkler have been selected by HITRUST to serve on the 2022 […]

Read More
5 Things to Know about StateRAMP
May 20, 2022
5 Things to Know about StateRAMP

While workers were shifting to remote work in droves in 2020, cybercriminals were paying attention to the cloud security vulnerabilities that created. […]

Read More
Here’s What Penetration Testers Do
May 17, 2022
Here’s What Penetration Testers Do

Ryan Edmondson will do anything to get in your building. And once he gets in, he gets busy. “I’ll plug in USB […]

Read More