Colocation & Managed Services

Visa Global Registry of Service Providers: Are you on the list?

Visa has released new tools and changes, which add value to service providers who store, process, or transmit cardholder data on behalf of merchants or other entities. For years, Visa has offered service providers the Visa Global Registry of Service Providers, a prestigious list of entities which meet certain…

Read More

5 Tips to Enhance Your Password Security

A password is designed to protect our personal information and accounts, but how are the passwords that you are using making it easier for hackers to access your accounts? Our experts have analyzed numerous passwords and why they don’t fit the security criteria. Here are some actionable tips for you…

Read More

FedRAMP: Outline of Timeliness and Accuracy of Testing

As FedRAMP continues to emphasize the FedRAMP Accelerated program, which is meant to reduce approval time for the Joint Authorization Board (JAB), they have released additional guidance on the Timeliness and Accuracy of Testing Requirements. FedRAMP Timeliness and Accuracy of Testing There are three categories associated with testing…

Read More

The Trail to Breach Prevention: Infographic

The importance of National Cyber Security Awareness Month cannot be understated. A-LIGN has highlighted statistics from the breaches that occurred in 2015 in order to portray the prevalence and potential cost of data breaches. In order to help your organization refrain from becoming another statistic, A-LIGN has provided actionable steps…

Read More

14 Ways to Prevent Data Breaches in Your Organization

Actionable Tips to Prevent Data Breaches Feeling safe about your organization’s personal data because of encryption standards? Don’t fool yourself into a false sense of security. Managing cyber-risk is a multi-faceted, whole-organization effort that requires implementation at the top levels down. In IBM’s Security Services 2014 Cyber Security Intelligence Index,…

Read More

Preparing for HITRUST CSF v8

HITRUST CSF v8 To ensure the HITRUST CSF stays relevant and current with the needs of today’s healthcare organizations, the HITRUST Alliance continually updates the CSF to incorporate the changing standards and regulations associated with its authoritative sources. The updates within v8, which was release on July 1, 2016, incorporate…

Read More

Back to Basics: What is HITRUST?

A-LIGN’s HITRUST Assessors are often asked: What is HITRUST and why do I need it? As healthcare organizations face stricter regulatory needs in light of an increase in healthcare-related breaches, many organizations are considering HITRUST as an option for risk management and mitigation. What is HITRUST? HITRUST, or the Health…

Read More

Which HITRUST Assessment Scope Is Right for My Organization?

Which HITRUST Assesment Scope is Right for My Organization? There are 14 different control categories, each with their own number of objectives and requirements. These include the following: Information Security Management Program Access Control Human Resources Security Risk Management Security Policy Organization of Information Security Compliance Asset Management Physical…

Read More

SOC 2: 2016 Updates and the Privacy Principle Integration

Overview of Privacy Principle and SOC 2 Updates In order to clarify and eliminate redundancy within the requirements of the trust services criteria for privacy, changes have been made to the SOC 2 privacy principle guidelines. While most of these changes are clarification-based, the addition of privacy to the common…

Read More

Ask A-LIGN’s Experienced Assessors: HITRUST

Because of the unique challenges facing the healthcare industry, companies are considering their options to mitigate and manage their risk. HITRUST offers a framework that allows for consistent implementation of the HIPAA requirements, but generates many questions that need to be answered. Below are a few frequently asked questions that…

Read More