Preparing for HITRUST CSF v9 Enhancements

Ahead of its late August/early September 2017 release, HITRUST has released details around HITRUST CSF v9. To address the evolving information security landscape to include new threat Ahead of its late August/early September 2017 release, HITRUST has released details around HITRUST CSF v9. To address the evolving information security landscape…

Read More

The Advantages of Accredited ISO 27001 Certifications

To protect the sensitive data within an information security management system (ISMS), organizations should consider the comprehensive information security standard, published by the International Organization for Standardization, ISO 27001. This audit is a standardized-industry approach used to define and validate the processes and controls of an ISMS. Before conducting the…

Read More

Employee Spotlight: Get to Know Senior Consultant Van Bettis

With DefCon coming up this weekend, A-LIGN would like to take the time to highlight one of our senior consultants, Van Bettis, who specializes in penetration testing. What is your role at A-LIGN? At A-LIGN, I perform penetration testing services for PCI-DSS, FISMA, and regular penetration testing. The types of…

Read More

Building Teamwork by Building Bikes

A-LIGN recently held its annual summer training, CLIMB 2017: ALTITUDE in central Florida. The training included interactive sessions designed to empower employees by fostering thought leadership, addressing evolving information security and compliance standards, and providing knowledge on new and emerging services. The schedule this year included a philanthropic and team…

Read More

SOC 2 vs SOC for Cybersecurity: 3 Main Differences

Organizations want to ensure that the personal assets of potential and existing clients are protected. To do so, organizations can validate their controls through a variety of assessments, but choosing the right one for your organization’s specific needs can be a difficult process. Through the new SOC for Cybersecurity examination,…

Read More

Choosing the Right Security Applications for Your Organization

There are various methods to protect your computer from malware and other malicious attacks. Identifying the hardware, techniques, and software that work best for your organization is essential to having a system that can manage your entire business environment. Failing to do so can be risky: per a survey done…

Read More

Types of Malware and How to Prevent Malware Attacks

Malware is ‘malicious software’ intended to damage, disable, or exploit computers or computer systems. It is a term most have become familiar with in the digital age because of its high presence and problematic consequences. Furthermore, the use of malware continues to dramatically increase and evolve each year. G DATA…

Read More

Preparing for Disaster: Understanding Business Continuity Management and Disaster Recovery

Operating in an environment that continually transforms can be challenging and sometimes system failure is inevitable. Although having proactive prevention programs is necessary, it is equally as important to have reactive disaster strategies. Potential causes of downtime include: Natural risks: Hurricane, fire, earthquake, etc. Human-caused risks: Terrorism, crime, manmade structure…

Read More