Government & Public Sector

10 Ways to Protect Your Information When Shopping Online

When the holiday season comes around, everyone is in the spirit of giving back and joining in on the festivities. This usually spurs an increase in spending and holiday shopping, most of which happens online. According to comScore and UPS’ online shopping survey, shoppers are now making 51% of…

Read More

5 Tips to Enhance Your Password Security

A password is designed to protect our personal information and accounts, but how are the passwords that you are using making it easier for hackers to access your accounts? Our experts have analyzed numerous passwords and why they don’t fit the security criteria. Here are some actionable tips for you…

Read More

FedRAMP: Outline of Timeliness and Accuracy of Testing

As FedRAMP continues to emphasize the FedRAMP Accelerated program, which is meant to reduce approval time for the Joint Authorization Board (JAB), they have released additional guidance on the Timeliness and Accuracy of Testing Requirements. FedRAMP Timeliness and Accuracy of Testing There are three categories associated with testing…

Read More

Vulnerability Scan vs. Penetration Test: What’s the Difference?

What is the difference between a penetration test and a vulnerability scan? Is a penetration test a vulnerability assessment? Is a vulnerability scan a penetration test? Which one does my organization need? As organizations prepare to meet their security needs, determining which service your organization requires depends on the purpose…

Read More

The Trail to Breach Prevention: Infographic

The importance of National Cyber Security Awareness Month cannot be understated. A-LIGN has highlighted statistics from the breaches that occurred in 2015 in order to portray the prevalence and potential cost of data breaches. In order to help your organization refrain from becoming another statistic, A-LIGN has provided actionable steps…

Read More

14 Ways to Prevent Data Breaches in Your Organization

Actionable Tips to Prevent Data Breaches Feeling safe about your organization’s personal data because of encryption standards? Don’t fool yourself into a false sense of security. Managing cyber-risk is a multi-faceted, whole-organization effort that requires implementation at the top levels down. In IBM’s Security Services 2014 Cyber Security Intelligence Index,…

Read More

Holding Your Security Ransom: Preparing Your Organization for Ransomware Attacks

Today’s ransom trend Today, ransomware virus cases are becoming more frequent than ever as they are raking in, on average, $450 billion dollars into the cybercriminal market annually. These unpleasant viruses leave users desperate, pressuring them into thinking that they have no choice but to pay ridiculous amounts of bitcoins…

Read More

SOC 2: 2016 Updates and the Privacy Principle Integration

Overview of Privacy Principle and SOC 2 Updates In order to clarify and eliminate redundancy within the requirements of the trust services criteria for privacy, changes have been made to the SOC 2 privacy principle guidelines. While most of these changes are clarification-based, the addition of privacy to the common…

Read More

Revision in MasterCard’s Cardholder Obligations: Does It Affect You?

MasterCard has revised its Standards to allow for collection agents to accept signature debit cards in the US. This revision is effective immediately and will be reflected in upcoming versions of MasterCard Rules. This change does not affect MasterCard’s credit transaction rules, and those transactions will remain prohibited as…

Read More

What to Expect from PCI DSS 3.2

Earlier this year, we wrote about how to prepare for PCI DSS 3.2. Now, organizations should begin to implement changes with the PCI DSS 3.2 official release. These standards should be adopted as soon as is possible, as version 3.1 will expire on October 31,…

Read More