Uncategorized

HITRUST Releases Guidance for Reliance on the Work of Others

HITRUST Guidance

On September 11, 2019 HITRUST released updated guidance regarding the reliance of others as part of the HITRUST certification process. This includes a more defined scope for reliance on the results of audits, assessments, and inspections that have been completed in the past.

Read More

What is the Cybersecurity Maturity Model Certification (CMMC)?

What is the Cybersecurity Maturity Model Certification (CMMC)?

The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense’s (DoD) newest verification mechanism designed to ensure that cybersecurity controls and processes adequately protect Controlled Unclassified Information (CUI) that resides on Defense Industrial Base (DIB) systems and networks.

Read More

The Importance of Cybersecurity for Executives

In today’s technologically-driven business world, it is imperative for executives of all kinds to understand the importance of cybersecurity and how to protect the organization from threats

In today’s technologically-driven business world, it is imperative for executives of all kinds to understand the importance of cybersecurity and how to protect the organization from threats.

Read More

Featured CLIMBER:
Sean Delaney

Featured Climber Sean Delaney

CLIMBERS at A-LIGN take many different paths throughout their journey. Going the extra mile and demonstrating A-LIGN’s core values for our clients and fellow CLIMBERS is celebrated through the annual value awards at CLIMB, A-LIGN’s annual employee team-building event.

Read More

How to Know if an MSP is PCI DSS Compliant

PCI DSS Compliance

Managed service providers (MSPs) provide a valuable service by outsourcing information technology services, but they need to be compliant with the Payment Card Industry Data Security Standard (PCI DSS) – and just because they say they’re PCI DSS compliant doesn’t mean they’re a good fit. Below are our tips to go beyond the PCI DSS […]

Read More

Don’t Get Reeled In: How to Prevent Phishing Scams

Avoid Phishing Scams

Phishing scams are a serious threat to an organization, and they’re increasing in scope, complexity and number – but that doesn’t mean you’re helpless to defend yourself. In fact, it’s easier than ever to proactively protect your organization from threats by following some simple tips.

Read More

Protecting the Nation: How to Achieve Federal Compliance

International

Federal assessments like FedRAMP, FISMA and NIST 800-171 help mitigate the risk of data breaches to important federal government agencies and departments, making them mandatory assessments used for federal security standards.

Read More

Featured CLIMBER:
Nickson Jean Baptiste

Nickson

Employees at A-LIGN take many different paths – that’s why we spent time sitting down with Staff Consultant and IT Auditor, Nickson Jean Baptiste, to discuss his desire to innovate constantly and provide support to his clients at A-LIGN.

Read More

A-LIGN Clients Gift $4,500 to Charity Organizations in Lieu of Client Appreciation Gifts

charity

For the sixth consecutive year, in lieu of client appreciation gifts, A-LIGN offered clients the opportunity to donate to the charity of their choice for our Annual Holiday Charity Donation Program.

Read More

Featured CLIMBER:
Ann Mathew

Featured Climber: Ann Mathew

Employees at A-LIGN take many different paths – that’s why we spent time sitting down with Staff Consultant, Ann Mathew, to talk about her role and why she took the Health Information Trust Alliance (HITRUST) path at A-LIGN.

Read More