Author: Anwita

Anwita is a cybersecurity enthusiast and veteran blogger all rolled into one. Her love for everything cybersecurity started her journey into the world compliance. With multiple certifications on cybersecurity under her belt, she aims to simplify complex security related topics for all audiences. She loves to read nonfiction, listen to progressive rock, and watches sitcoms on the weekends.

Understanding VAPT: Audit Types, Process, and Benefits

In late 2019, US government agencies were grappling with what unfolded to be one of the most sophisticated hacking campaigns – Russian intelligence injected a trojan virus into their network management system provided by a third party. The exploiters briefly managed to gain remote access to sensitive data because the US agencies trusted untested software….
Sep 19, 2024
information security policy

Understanding Information Security Policies: Importance & Key Elements

One of the inevitable outcomes of growth that doesn’t get the attention it deserves is security risk. As the organization grows, technologies and third-party systems become mainstay. This directly increases the probability of risk. Information security policy is the glue that holds everything together in a way that nothing falls apart.  Let us understand what…
Sep 19, 2024
Best incident response software

What is Incident Response Software: How to Choose one?

Oct 2021: a printer in a hospital in Tokushima, Japan, started printing out papers on its own after their systems were compromised by ransomware. Attackers demanded money in exchange for decrypting the encrypted patient data of 85,000 patients. They recovered eventually but could have avoided the situation had they deployed incident response software.  The security…
Sep 19, 2024
HIPAA Business Associate Agreement

HIPAA Business Associate Agreement – Complete Guide

Healthcare businesses often assume that if a vendor is trusted or has experience working with another healthcare service before, they’re automatically covered. But HIPAA doesn’t work on assumptions.  Without a BAA (Business Associate Agreement), even well-intentioned data sharing can turn into a compliance nightmare. This is because businesses need assurance that service providers accessing PHI…
Sep 19, 2024
SOC 2 Type 2

SOC 2 Type ll Compliance (How to Achieve it Faster)

In 2021, security attacks spiked by 31% compared to the previous year. With the number of attacks going higher every year, businesses don’t have the confidence to partner unless you demonstrate that you can protect sensitive data. One way to ensure this is using a SOC 2 Type II report.  Why do you need SOC…
Sep 18, 2024
coso erm

COSO ERM: Key Components Explained

In March 2024, cloud service giant Microsoft had their head hung in shame after the Cyber Safety Review Board (CSRB) provided a 30-page review of its inadequate security culture.  The CSRP report read “..troubling examples of decision-making processes within the company that did not prioritize security risk management at a level commensurate with the threat.”…
Sep 17, 2024