Achieving GLBA Compliance for Data Protection

GLBA Compliance Blog A-LIGN

What is the Gramm-Leach-Bliley Act of 1999 (GLBA)? The Gramm-Leach-Bliley Act of 1999 (GLBA), also known as the Financial Services Modernization Act of 1999, requires that organizations protect the privacy of consumer financial information.

Read More

FTV Capital Leads $54.5 Million Growth Equity Investment in Cybersecurity and Compliance Solutions Leader A-LIGN

FTV Capital Growth Equity Investment A-LIGN

As Cyber Risk Grows, A-LIGN Helps Businesses Meet Regulatory, Compliance and Data Privacy Mandates

Read More

The Uber Security Breach: 3 Takeaways to Secure Your Organization


In October 2016, Uber the global car sharing company, experienced a massive breach whereby hackers stole personal data from approximately 57 million users and drivers. After a year of concealment without regulatory notice and payment to the hackers to destroy the data, Uber finally disclosed the breach. As a result, Uber has undertaken a large […]

Read More

Inside DEF CON 25


What is DEF CON? DEF CON is an annual global hacking conference which brings together the brightest minds in information and it covers a variety of topics such as SMB replay attacks, web packet manipulation, and deauthentication attacks on wireless access points. This conference, now in its 25th year in existence, is an opportunity for […]

Read More

Choosing the Right Security Applications for Your Organization


There are various methods to protect your computer from malware and other malicious attacks. Identifying the hardware, techniques, and software that work best for your organization is essential to having a system that can manage your entire business environment. Failing to do so can be risky: per a survey done by Ponemon Institute, the average cost […]

Read More

Phishing 201: What are the Different Types of Phishing Attacks?

In our initial blog, Phishing 101, we covered the basics of phishing, including what phishing is and how to prevent it. Today, we will cover the different types of phishing attacks that your organization could be vulnerable to. Types of Phishing Deceptive phishing Deceptive phishing is the most common type of phishing scam. These scams occur […]

Read More

5 Steps to Succeed in Your Next Compliance Audit

By: Jay Anthony, President of Audit Liaison, PA Your organization has determined that there is a need for a compliance audit. But you have so many questions or don’t know where to start? A-LIGN has asked us to put together a short guide to help you decide the correct course of action and the steps […]

Read More

Webinar: “Countdown to Compliance: What you need to know for PCI 3.0”

A-LIGN to present, “Countdown to Compliance: What you need to know for PCI 3.0” on Tuesday, December 10, 2013, from 2:00-3:00 pm EST. Gene Geiger, Director of A-LIGN Security and Compliance Services, will provide highlights of the changes in the standard from PCI DSS Version 2.0 to 3.0, the required implementation timeline and how organizations […]

Read More

Webinar: “CFPB Examination – Getting Your Agency Ready!”

A-LIGN to present webinar entitled, “CFPB Examination – Getting Your Agency Ready!” on Tuesday, October 1, 2013, from 1-2 p.m. EST. The presentation will provide a high-level overview of the key areas that collection agencies should focus on as they prepare for the CFPB Examination.

Read More

A-LIGN will participate in Junior Achievement’s (JA) Pep Rally at the Alley Bowl-A-Thon

A-LIGN will participate in Junior Achievement’s (JA) Pep Rally at the Alley Bowl-A-Thon on November 9, 2013. Junior Achievement’s annual Bowl-A-Thon is a fundraising event to encourage companies to participate and support in the funding of JA’s programs, which focus on mentoring students, K-12th grade, in the areas of work-readiness, entrepreneurship and financial literacy skills. […]

Read More