Types of Malware and How to Prevent Malware Attacks

Malware is ‘malicious software’ intended to damage, disable, or exploit computers or computer systems. It is a term most have become familiar with in the digital age because of its high presence and problematic consequences. Furthermore, the use of malware continues to dramatically increase and evolve each year. G…

Read More

Preparing for Disaster: Understanding Business Continuity Management and Disaster Recovery

Operating in an environment that continually transforms can be challenging and sometimes system failure is inevitable. Although having proactive prevention programs is necessary, it is equally as important to have reactive disaster strategies. Potential causes of downtime include: Natural risks: Hurricane, fire, earthquake, etc. Human-caused risks: Terrorism, crime, manmade…

Read More

SOC 2 vs. ISO 27001: Which is the Right Assessment for Your Organization?

Companies continue to struggle with the decision between selecting the SOC 2 examination or ISO 27001 certification.  Often customer contracts require either audit or competitors have one or the other.  Although these security standards serve a similar purpose, there are some key decision factors that may help your organization determine…

Read More

AICPA’s New SOC for Cybersecurity Examination

As the data breach occurrences increase, organizations continue to struggle to demonstrate and maintain security of their data. To ensure that all appropriate measures are being taken, executives and senior management have begun requesting that their organizations demonstrate the effectiveness of their cybersecurity risk management programs through…

Read More

2017 Cyber Defense Guide: Part 2 [Free Download]

Malware and Social Engineering As industries see an influx use of technology in day-to-day business operations, the cybersecurity landscape struggles to keep up and stay ahead of attackers. Read more: Cyber Defense Guide: Part 1 Data breaches can happen anywhere at any time. A common misconception is…

Read More

Third-Party Vendor Management Best Practices

The new SOC 1 standard, SSAE 18, was made effective May 1, 2017. This standard requires that service organizations implement and describe their vendor management practices for third-party service organizations. Read more: Making the Switch from SSAE 16 to SSAE 18 In order to help…

Read More

A-LIGN Introduces Privacy Assessment Offerings to Respond to the Growing Concern for Data Privacy

As the data privacy landscape evolves, A-LIGN is committed to providing solutions that assist organizations in safeguarding their client’s data. A-LIGN now offers privacy assessment and compliance services that assist organizations in adhering to the following standards: EU-U.S. Privacy Shield General Data Protection Regulation (GDPR) HIPAA Privacy Rule “Privacy is…

Read More

Becoming Certified to Access the Limited Access Death Master File

What is the Limited Access Death Master File (LADMF)? The LADMF, or Limited Access Death Master File, contains sensitive information that cannot be disclosed during the three-year period following an individual’s death, including: Social Security Number Name Date of Birth Date of Death Read now: [Whitepaper]: Cyber…

Read More

How A-LIGN Gives Back to the Community in More than One Way

At A-LIGN, one of our main core values is to Be All In – whether it is providing quality work for our clients, relentlessly exceeding expectations, or giving back to our community we stay true to our commitments day in and day out. We pride ourselves in making a positive…

Read More

Family Affair: Using ISO 27001 to conform to ISO 27017 and ISO 27018

ISO 27000 Family – Information Security Management Systems The ISO 27000 family of standards is related to an organization’s information security management systems, or ISMS. This international standard helps organizations by providing a clear set of requirements that can be used to manage the security of the business’ assets. An…

Read More