Preparing your organization for an external audit can be a difficult and time-consuming process. One of the hardest parts: collecting audit evidence. External audits are examinations performed by an independent... Read More
Blog
How to Create an Information Security Questionnaire for Vendors
In this article we’ll review how to create an information security questionnaire as a means to assess vendor risk, and to protect your organization from potential cyber-threats that might use... Read More
Why Segregation of Duties is Important for Information Security
Segregation of duties can be a tricky concept for many business owners. For example, if Adam knows how to do systems administration and handles corporate finance too, then why would a... Read More
Bring Your Own Device Policy Best Practices
Building an effective Bring Your Own Device policy can be one of the keys to security success in an increasingly mobile world.
Read More