4 Miscellaneous HITRUST Regulatory Factors to Consider

Over the last few blogs, we have provided a comprehensive overview of the HITRUST landscape, from the authoritative sources at its core, to the optional regulations, or regulatory factors, that are commonly added on to a HITRUST assessment for industry-specific purposes 
Continue reading “4 Miscellaneous HITRUST Regulatory Factors to Consider”

5 HITRUST Regulatory Factors to Consider for International and State-level Privacy Compliance

There are more than 20 optional regulatory factors that an organization can consider as part of a HITRUST assessment. These are individual options, based on specific industry requirements, and can be quite tricky to parse.  
Continue reading “5 HITRUST Regulatory Factors to Consider for International and State-level Privacy Compliance”

How European Companies Can Accelerate International Expansion with SOC 2 Compliance

The United States represents an attractive market for many European companies, but international expansion can be fraught with risk because of a completely different regulatory landscape. 
Continue reading “How European Companies Can Accelerate International Expansion with SOC 2 Compliance”

7 HITRUST Factors to Consider for Federal Compliance

Our discussion of HITRUST regulatory factors continues with a focus on federal compliance and their influence on HITRUST. Here are 7 HITRUST regulatory factors to consider for federal compliance, and our recommendations on how to address them. 
Continue reading “7 HITRUST Factors to Consider for Federal Compliance”

The Importance of Cybersecurity for Executives

In today’s technologically-driven business world, it is imperative for executives of all kinds to understand the importance of cybersecurity and how to protect the organization from threats. Continue reading “The Importance of Cybersecurity for Executives”

The Top Five Cyber Risks for Children

At A-LIGN we help organizations of all sizes avoid cyber risks, but they’re not the ones who are a target – so are children. We teach children to not accept rides from strangers, but it’s also important to be aware of the cyber risks facing them whenever they’re online.

Continue reading “The Top Five Cyber Risks for Children”

Everything You Need to Know about Password Spraying

While passwords can protect our precious information, their ability to help us is limited by our ability to come up with a strong and memorable variation. Failure to create and use a secure, unique password can open your accounts up to password spraying.

Continue reading “Everything You Need to Know about Password Spraying”

Protect Your Supply Chain From Security Threats

In today’s increasingly connected environment, businesses rely more on third-party vendors than ever before to help them bring their ideas to life. Those vendors include suppliers, affiliates, contractors and service providers.  Continue reading “Protect Your Supply Chain From Security Threats”

A Quick NIST Cybersecurity Framework Summary

Running an organization today means not only performing expected business requirements and generating revenue, but also defending yourself against an endless onslaught of cybersecurity threats. The NIST Cybersecurity Framework is designed to help you grow your organization while defending yourself from cyberattacks. Continue reading “A Quick NIST Cybersecurity Framework Summary”