IT Controls
SOC 2 Controls: Encryption of Data at Rest – An Updated Guide
Learn how the SOC 2 "Encryption of Data at Rest" control helps protect your data and your business, and how to get it right. The post SOC 2 Controls: Encryption of Data ...
SOC 2 Controls: Encryption of Data at Rest
Understanding controls is integral to the completion and success of your SOC 2 audit. This first entry into a series of control blogs dives deep into the Encryption of Data at Rest ...
Understanding the Purpose of Security Controls and the Need for Compliance
What are the brakes on a car designed to do? I have asked this question many times when speaking to customers or organizations who were dipping their toes into the audit space ...
How to Protect the Future of IT
Working remotely, either from home or from elsewhere, isn’t something new. It has been used by many companies worldwide over the past decade. That said, it was typically restricted to only a ...