Colocation & Managed Services

An Overview of the HITRUST CSF and Related Frameworks

The HITRUST CSF is a comprehensive, certifiable security framework that pulls from HIPAA/HITECH, ISO 27001, NIST SP 800-53, COBIT, and PCI DSS, combining them to create a powerful framework. The HITRUST CSF provides an integrated, prescriptive framework that works with the needs…

Read More

HITRUST Assessment Types & HITRUST Integration with SOC 2

Don’t make the climb to compliance more difficult than it has to be. With a comprehensive framework for organizations of any size, system or regulatory requirement, the HITRUST CSF allows for organizations to easily assess their current compliance while providing implementation requirements based on an organization’s risk…

Read More

Understanding the HITRUST Specification and Scoring

HITRUST’s Risk Management Framework In order for an organization to better assess potential risks and create safeguards for adequate protection of potentially sensitive information, HITRUST has created a comprehensive risk management framework that supports a basic 4-step process: Identify risks and define the protection requirements Specify controls Implement and manage…

Read More

More Passwords, More Problems: A Look into Biometric Authentication

What’s your password? Studies show that you likely use more than 15 different passwords, but more than half of you admit to using a weak password. So how do companies fare with inconsistent password usage and standardization? Even companies with incredible security practices can become vulnerable due to a forgetful employee who…

Read More

2015 Data Breaches – The Year In Review

Author: Greg Johnson, Vice President of Business Development at A-LIGN. Data breach was alive and well in 2015 with some of the largest breaches in history occurring last year. The Office of Personnel Management (OPM), or in other words our Federal Government, was hacked to the tune of 21.5 million…

Read More

The Challenges Facing Healthcare & How HITRUST Can Help

The Healthcare industry currently faces strict regulatory needs, causing many challenges when considering the options for risk management and mitigation. These challenges include but are not limited to: Inconsistent implementation of acceptable minimum controls. Inefficiencies associated with varying interpretation of control objectives and safeguards. Increasing scrutiny from regulators, auditors, underwriters,…

Read More

The Do’s and Don’ts of Bridge Letters (SSAE 16 Reporting)

You finally received your SOC 1/SSAE 16 report, only to realize that your coverage does not cover the entire year. So what happens in the remaining months of the year beyond the coverage of the report? Is it necessary that you receive another report to cover the remainder of the…

Read More

A Breach in the Hull: HIPAA Breach Notification Requirements

If health information is compromised, do you know your organization’s responsibilities related to breach notification of electronic protected health information (ePHI)?  The responsibilities of your organization for breach notification depends on a few items, including: Whether you are a covered entity or a business associate The timing of when the…

Read More

It’s Time For An Upgrade: Switching from ISO 27001:2005 to 2013

As a reminder a new version of ISO 27001 has been issued and the deadline for updating your company’s ISO 27001 program from 2005 to 2013 is quickly approaching.  There are some significant changes to ISO 27001 in the newest 2013 edition.  Utilizing the guidelines in ISO…

Read More

How SOC Audits Can Help Save on Errors & Omissions Insurance

As many companies look to reduce costs, one cost that continues to rise as the company grows is Errors and Omissions (E/O) insurance premiums. Both company liability and personal liability of the board of directors and owners is a topic that continues to be a focus of litigation. One of the ways a company can demonstrate they have sound controls over their control environment (which includes the tone at the top, board of directors’ participation, management oversight, etc) is to have a SOC audit conducted by a third-party auditing firm such as A-LIGN. 

Read More