Information Assurance

Costs and Consequences of Healthcare Data Breach

Hackers have proven that there is no boundary they will not cross. They will even hold hostage data that impacts…

Read the story

Not All SOC 2 Reports are Created Equal

Information security in and of itself is incredibly complex. And the framework for SOC 2 examination and reporting is equally…

Read the story

The SOC 2 Provider Checklist

Read the story

Accounting Anomalies – Indicators of a Hacker?

Companies investigating hacks put too much emphasis on technology and too little on business analysis. Organizations should look closely into accounting…

Read the story