Compliance

Using HITRUST for Industries Beyond Healthcare

Using HITRUST for Industries Beyond Healthcare

Organizations around the world, especially ones in the HITRUST XChange program, are moving to quickly implement the HITRUST Common Security Framework (CSF) for their organization. With the recent HITRUST CSF v9.2 update, organizations across all industries – not just healthcare – can benefit greatly from the HITRUST framework.

Read More

HITRUST CSF v9.2 Opens Up the Framework for All Organizations

HITRUST CSF v9.2

With HITRUST v9.2, the Common Security Framework (CSF) continues to be a very powerful and useful security framework for any organization – both inside and outside the healthcare industry.

Read More

Leveraging Your Compliance Report

Leveraging Your Compliance Report

Compliance examination reports are more than an attestation of your commitment to quality and security; they can drive revenue, build client trust and position your organization as a cybersecurity leader in your industry.

Read More

Protect Your Supply Chain From Security Threats

Protect Your Supply Chain From Security Threats

In today’s increasingly connected environment, businesses rely more on third-party vendors than ever before to help them bring their ideas to life. Those vendors include suppliers, affiliates, contractors and service providers. 

Read More

A Quick NIST Cybersecurity Framework Summary

Running an organization today means not only performing expected business requirements and generating revenue, but also defending yourself against an endless onslaught of cybersecurity threats. The NIST Cybersecurity Framework is designed to help you grow your organization while defending yourself from cyberattacks.

Read More

Leveraging a SOC 2 Examination to Differentiate Your MSP

IT security is an ever-growing concern from consumers and businesses. The last few years of breaches resulting from insecure IT environments have changed the buying process and selection criteria for many organizations.

Read More

Understanding the HITRUST Inheritance Program

What is HITRUST? Because of the number of patients seeing medical professionals every day and the nature of their visits, the healthcare industry faces unique security challenges that no other industry sees.

Read More

Compliance Doesn’t Have to be Scary

Compliance Doesn't have to be Scary

Every October during National Cybersecurity Awareness Month, we show you why cybersecurity is vital to protecting your organization from outside threats – but that’s only one side of the coin when it comes to defense.

Read More

Achieving GLBA Compliance for Data Protection

GLBA Compliance Blog A-LIGN

What is the Gramm-Leach-Bliley Act of 1999 (GLBA)? The Gramm-Leach-Bliley Act of 1999 (GLBA), also known as the Financial Services Modernization Act of 1999, requires that organizations protect the privacy of consumer financial information.

Read More

Why You Should Conduct a SOC for Cybersecurity Examination to Manage Your Organization’s Cyber Risk

SOC for Cybersecurity Examination Blog A-LIGN

In response to the increase in cyber threats, the American Institute of CPAs (AICPA) issued the Cybersecurity Risk Management Reporting Framework, also known as System and Organization Controls (SOC) for Cybersecurity, a flexible and voluntary framework for organizations in any industry to take a proactive approach to cybersecurity risk management.

Read More