A-LIGN Blog

Ask an Assessor: Death Master File

The Death Master File (DMF) is a protected file that includes information regarding the deceased such as: Name Date of Birth Date of Death Social Security Number Since November 28, 2016, organizations have faced a stricter certification process to be granted access to the DMF. In that time, A-LIGN has served as an Accredited Conformity […]

Read More

Blockchain: Not Just for Bitcoin

blockchain

Following the 2017 AICPA Engage Conference in Las Vegas, one topic has been the center of discussion: Blockchain. Previously associated with online currencies such as bitcoins, blockchain has now grown to acquire investments in the billions. According to Google Trends, ‘blockchain’ has reached its peak search interest this past month since its first recorded interest […]

Read More

The Expedition to Information Security [Infographic]

expedition-information-security

As the world continues to advance, organizations are utilizing new technologies for improving their operations. The abundance of these new and emerging tools facilitate the way organizations conduct business through seamless communication and data transmission. The significant threat regarding this movement are the various cyber security risks. Due to the value of data in this […]

Read More

7 Information Security Tips for Your Organization

7-security-tips

Do you take the necessary precautions to ensure your information is stored and secured safely online? As the internet plays a larger role in our daily activities, it is important to highlight the type and amount of information we share can be used against us. As a result, we compiled the top information security tips […]

Read More

Are You Ready for the DOE Annual Audit? 6 Steps to Ensure Compliance

As the digital landscape evolves and transforms the way organizations run their operations, many experience unprecedented opportunities as well as new challenges. In recent years, universities and colleges have experienced a higher number of cyber-attacks and security breaches due to a lack of a proper security infrastructure to secure student information, including financial aid. For […]

Read More

The A-LIGN Way: Focus on the Client and Not on Sales Quotas

At A-LIGN, we relentlessly strive to exceed our clients’ expectations on every level by delivering the highest quality of service and unparalleled support. As a global information security and cyber risk advisory, and compliance solutions provider, we are committed to providing proactive guidance on information security risks that could affect our clients’ business, while solving […]

Read More

[Webinar] A-LIGN Presents: Using HITRUST CSF v9 to Meet Your Compliance Requirements

A-LIGN, a global information security and cyber risk advisory, and compliance solutions provider, is committed to staying current on emerging regulations and changes in security frameworks. On September 19, A-LIGN Managing Consultant and HITRUST CCSFP, Blaise Wabo, will host a HITRUST webinar called Using HITRUST CSF v9 to Meet Your Compliance Requirements, to educate healthcare […]

Read More

Employee Spotlight: Get to Know Strategic Account Manager Ty Brush

A-LIGN was recently recognized in Florida State University’s Seminole 100 list as one of the fastest growing Seminole-owned businesses in the United States. As we begin recruiting at universities across the nation, A-LIGN would like to highlight a member of our business development team and Florida State University alumnus, Ty Brush. What is your role […]

Read More

FedRAMP: Understanding the Fundamentals (FAQ)

Any organization seeking to provide cloud products or solutions to a federal agency will need to go through a FedRAMP Readiness Assessment and then a full FedRAMP assessment to receive an Authorization to Operate (ATO) which ensures the security of its hosted information meets FedRAMP requirements. The Federal Risk and Authorization Management Program (FedRAMP) is […]

Read More

Inside DEF CON 25

inside-defcon

What is DEF CON? DEF CON is an annual global hacking conference which brings together the brightest minds in information and it covers a variety of topics such as SMB replay attacks, web packet manipulation, and deauthentication attacks on wireless access points. This conference, now in its 25th year in existence, is an opportunity for […]

Read More