Author: Anwita

Anwita is a cybersecurity enthusiast and veteran blogger all rolled into one. Her love for everything cybersecurity started her journey into the world compliance. With multiple certifications on cybersecurity under her belt, she aims to simplify complex security related topics for all audiences. She loves to read nonfiction, listen to progressive rock, and watches sitcoms on the weekends.
ISO 27001 surveillance audit

How to Prepare Yourself for ISO 27001 Surveillance Audit

If your organization has implemented ISO 27001, it must be audited by an accredited auditor to be certified. An ISO 27001 audit reviews your organization’s information security management system (ISMS) against a set of defined standards.  Once you are certified, it does not stop there. Maintaining it involves more work, both for you and the…
Nov 15, 2024
FISMA Certification: A Complete Step-By-Step Guide

FISMA Certification: A Complete Step-By-Step Guide

In 2022, the U.S government introduced FISMA as a part of the E-Government Act. Aimed at protecting information security in the interest of national and economic growth, it explicitly focuses on “risk-based policy for cost-effective security”. If this act applies to your business, understanding the intricacies of the compliance process is essential.  In this article,…
Nov 13, 2024
cyber security architecture

Multi Cloud Security Architecture: The Secret to Safekeeping Data

Businesses depend on multiple cloud based platforms to function seamlessly. While these significantly reduce IT complexity, maintaining a huge infrastructure of multiple endpoints opens a pandora’s box of complications – non-compliance, and security threats, vulnerabilities. As more companies adopt BYOD policy, the number of cloud components deployed outside the organization’s firewall are now higher than…
Nov 13, 2024
SOC 2 Password Requirements

SOC 2 Password Requirements: AICPA Guidelines & Best Practices

As the cost of credential theft increased by 65% in 2020 alone, passwords are like a virtual fortress that protects sensitive data. The SOC 2 framework establishes a number of guidelines that help service orgs bolster their security posture. One of these guidelines include abiding by the SOC 2 password requirements. This article covers the…
Nov 10, 2024
HITRUST Audit

HITRUST Audit [Easy Step by Step Guide]

A research by Ponemon Institute reveals that the healthcare industry has faced the most expensive breaches for 12 years in a row. This highlights the need to address the security gaps in an effective way. The HITRUST framework aims to address the challenges of managing healthcare services in a secure way. But how can you…
Nov 07, 2024
Governance vs Compliance: Key Differences and Similarities

Governance vs Compliance: Key Differences and Similarities

In the world of corporate regulations, laws, and policies, two terms are used commonly and often interchangeably – compliance and governance. While these components of GRC have some overlapping objectives, their applicability is far from the same.  In this article, we discuss what governance and compliance means and the differences between the two. What is…
Nov 06, 2024