Cybersecurity

Board Members and C-Levels: Are You Ready for 2018 Cybersecurity Risks?

Within the last year, multiple laws and regulations have significantly increased cybersecurity risk management responsibility for board of director members and C-level executives. Let’s review four of these developments to ensure you have a plan in place to meet the requirements. CPU Vulnerabilities Change the Economics and Security of Cloud…

Read More

The Uber Security Breach: 3 Takeaways to Secure Your Organization

In October 2016, Uber the global car sharing company, experienced a massive breach whereby hackers stole personal data from approximately 57 million users and drivers. After a year of concealment without regulatory notice and payment to the hackers to destroy the data, Uber finally disclosed the breach. As a result,…

Read More

Ask A Hacker: A-LIGN’s Penetration Testers Conduct a Reddit Q&A

On Thursday, October 26th A-LIGN held an Ask Me Anything (AMA) Q&A forum on Reddit, to conclude National Cyber Security Awareness Month by providing further insight into the data breach landscape. Members of our penetration testing team answered questions regarding penetration testing, hacking, and information security. Below are the top…

Read More

Blockchain: Not Just for Bitcoin

Following the 2017 AICPA Engage Conference in Las Vegas, one topic has been the center of discussion: Blockchain. Previously associated with online currencies such as bitcoins, blockchain has now grown to acquire investments in the billions. According to Google Trends, ‘blockchain’ has reached its peak search interest this past…

Read More

The Expedition to Information Security [Infographic]

As the world continues to advance, organizations are utilizing new technologies for improving their operations. The abundance of these new and emerging tools facilitate the way organizations conduct business through seamless communication and data transmission. The significant threat regarding this movement are the various cyber security risks. Due to the…

Read More

7 Information Security Tips for Your Organization

Do you take the necessary precautions to ensure your information is stored and secured safely online? As the internet plays a larger role in our daily activities, it is important to highlight the type and amount of information we share can be used against us. As a result, we compiled…

Read More

SOC 2 vs SOC for Cybersecurity: 3 Main Differences

Organizations want to ensure that the personal assets of potential and existing clients are protected. To do so, organizations can validate their controls through a variety of assessments, but choosing the right one for your organization’s specific needs can be a difficult process. Through the new SOC for Cybersecurity examination,…

Read More

Choosing the Right Security Applications for Your Organization

There are various methods to protect your computer from malware and other malicious attacks. Identifying the hardware, techniques, and software that work best for your organization is essential to having a system that can manage your entire business environment. Failing to do so can be risky: per a survey done by…

Read More

Types of Malware and How to Prevent Malware Attacks

Malware is ‘malicious software’ intended to damage, disable, or exploit computers or computer systems. It is a term most have become familiar with in the digital age because of its high presence and problematic consequences. Furthermore, the use of malware continues to dramatically increase and evolve each year. G…

Read More

AICPA’s New SOC for Cybersecurity Examination

As the data breach occurrences increase, organizations continue to struggle to demonstrate and maintain security of their data. To ensure that all appropriate measures are being taken, executives and senior management have begun requesting that their organizations demonstrate the effectiveness of their cybersecurity risk management programs through…

Read More