Uncategorized

Ace Your SOC Report with a SOC Audit Checklist

For many organizations, obtaining a System and Organization Controls (SOC) attestation report is table stakes for doing business.

Read More

A-LIGN Ranks No. 1761 on 2020 Inc. 5000 List

A-LIGN recognized for the fourth consecutive year on Inc. 5000 list with 243.6 percent growth

Read More

Featured CLIMBER:
Savannah Lazzara

Employees at A-LIGN take many different paths throughout their journey – that’s why we sat down with Savannah Lazzara to talk about her journey from being an intern to a full-time Penetration Testing Staff Consultant at A-LIGN.

Read More

Your Guide to FedRAMP, FISMA and NIST

FedRAMP, FISMA and NIST

The federal government processes large amounts of important data daily, which is why it is vital for government organizations to understand and undergo federal assessments such as FedRAMP, FISMA, NIST and NIST SP 800-171.

Read More

HITRUST Releases Guidance for Reliance on the Work of Others

HITRUST Guidance

On September 11, 2019 HITRUST released updated guidance regarding the reliance of others as part of the HITRUST certification process. This includes a more defined scope for reliance on the results of audits, assessments, and inspections that have been completed in the past.

Read More

What is the Cybersecurity Maturity Model Certification (CMMC)?

What is the Cybersecurity Maturity Model Certification (CMMC)?

The Cybersecurity Maturity Model Certification (CMMC) is the Department of Defense’s (DoD) newest verification mechanism designed to ensure that cybersecurity controls and processes adequately protect Controlled Unclassified Information (CUI) that resides on Defense Industrial Base (DIB) systems and networks.

Read More

Top Tips for Effective Audit Preparation

Top Tips for Effective Audit Preparation

For any organization that stores, interprets and manages sensitive data, complying with cybersecurity requirements is of utmost importance. The most comprehensive way to test the strength and effectiveness of these systems is through a compliance assessment. Beginning this process, however, is no easy feat.

Read More

The Importance of Cybersecurity for Executives

In today’s technologically-driven business world, it is imperative for executives of all kinds to understand the importance of cybersecurity and how to protect the organization from threats

In today’s technologically-driven business world, it is imperative for executives of all kinds to understand the importance of cybersecurity and how to protect the organization from threats.

Read More

Featured CLIMBER:
Sean Delaney

Featured Climber Sean Delaney

CLIMBERS at A-LIGN take many different paths throughout their journey. Going the extra mile and demonstrating A-LIGN’s core values for our clients and fellow CLIMBERS is celebrated through the annual value awards at CLIMB, A-LIGN’s annual employee team-building event.

Read More

How to Know if an MSP is PCI DSS Compliant

PCI DSS Compliance

Managed service providers (MSPs) provide a valuable service by outsourcing information technology services, but they need to be compliant with the Payment Card Industry Data Security Standard (PCI DSS) – and just because they say they’re PCI DSS compliant doesn’t mean they’re a good fit. Below are our tips to go beyond the PCI DSS […]

Read More