Vulnerability Scan vs. Penetration Test: What’s the Difference?

What is the difference between a penetration test and a vulnerability scan? Is a penetration test a vulnerability assessment? Is a vulnerability scan a penetration test? Which one does my organization need? As organizations prepare to meet their security needs, determining which service your organization requires depends on the purpose…

Read More

The Trail to Breach Prevention: Infographic

The importance of National Cyber Security Awareness Month cannot be understated. A-LIGN has highlighted statistics from the breaches that occurred in 2015 in order to portray the prevalence and potential cost of data breaches. In order to help your organization refrain from becoming another statistic, A-LIGN has provided actionable steps…

Read More

14 Ways to Prevent Data Breaches in Your Organization

Actionable Tips to Prevent Data Breaches Feeling safe about your organization’s personal data because of encryption standards? Don’t fool yourself into a false sense of security. Managing cyber-risk is a multi-faceted, whole-organization effort that requires implementation at the top levels down. In IBM’s Security Services 2014 Cyber Security Intelligence Index,…

Read More

A-LIGN Managing Partner Named to Accounting Today’s 2016 MP Elite

A-LIGN Managing Partner, Scott Price, has been included in Accounting Today’s Class of 2016 Managing Partner Elite list. The Managing Partner Elite program highlights the leaders of accounting firms who stand out from their peers due to their ability to guide their firms through innovation, development of strong culture and…

Read More

Continuing the Climb: A-LIGN Introduces an Updated Website

A-LIGN, a nationwide security and compliance solutions firm, has updated its website to make it easier than ever to connect with an experienced assessor. With more options to connect with a specialist, A-LIGN continues to build a website that better reflects the identity of A-LIGN as a people-focused firm. “The…

Read More

Preparing for HITRUST CSF v8

HITRUST CSF v8 To ensure the HITRUST CSF stays relevant and current with the needs of today’s healthcare organizations, the HITRUST Alliance continually updates the CSF to incorporate the changing standards and regulations associated with its authoritative sources. The updates within v8, which was release on July 1, 2016, incorporate…

Read More

Overview of the EU – U.S. Privacy Shield Framework

Privacy Shield Framework The EU – U.S. Privacy Shield Framework was designed in conjunction with the U.S. Department of Commerce and European Commission to provide European and US companies a mechanism to comply with EU data protection requirements when transferring personal data from the European Union to the U.S. when…

Read More

Back to Basics: What is HITRUST?

A-LIGN’s HITRUST Assessors are often asked: What is HITRUST and why do I need it? As healthcare organizations face stricter regulatory needs in light of an increase in healthcare-related breaches, many organizations are considering HITRUST as an option for risk management and mitigation. What is HITRUST? HITRUST, or the Health…

Read More

Holding Your Security Ransom: Preparing Your Organization for Ransomware Attacks

Today’s ransom trend Today, ransomware virus cases are becoming more frequent than ever as they are raking in, on average, $450 billion dollars into the cybercriminal market annually. These unpleasant viruses leave users desperate, pressuring them into thinking that they have no choice but to pay ridiculous amounts of bitcoins…

Read More

Which HITRUST Assessment Scope Is Right for My Organization?

Which HITRUST Assesment Scope is Right for My Organization? There are 14 different control categories, each with their own number of objectives and requirements. These include the following: Information Security Management Program Access Control Human Resources Security Risk Management Security Policy Organization of Information Security Compliance Asset Management Physical…

Read More