Penetration Tests Help Avoid a Data Breach

Penetration tests and vulnerability scans, if performed regularly, will help your organization avoid a costly data breach.  Did you know that? So why don’t more companies get on the ball and do this? Nearly every week, we read about a malicious hacker who has penetrated a security gap in an organization’s infrastructure to gain access to loads of … Read more

Cost of Downtime

Cost of Downtime

Cost of Downtime Ever calculate the cost of downtime? A major new survey by Veeam Software did, and the results reveal that there’s far more to system downtime than the bracing hard costs. In its fifth annual “Availability Report,” Veeam interviewed 1,140 senior IT staff in 24 countries, including 150 U.S. folks.  All of the … Read more

Creating a Compliance Culture

Wondering how to create a positive compliance culture within your company?  We’re here to help companies make managing compliance, well, manageable. We’ve defined the role and responsibilities of the Chief Compliance Officer. We’ve helped delineate what a Compliance Management System (CMS) is all about. We are now here to share the next best kept industry … Read more

Security Awareness Training

Security Awareness Training

Security awareness training for employees is a critical component of compliance and security in your organization. The risk of an employee not understanding the potential security threats facing them as a frontline target could be just the opening that an attacker needs to create a security breach. You are only as strong as your weakest … Read more

Cloud Contract Review Questions

It’s cloud contract review time. You should know the right cloud contract review questions to ask, right? Well, first, take a good look at the provider’s cloud service-level agreement (SLA). What is an SLA? An SLA defines what the customer will receive. It’s a contract between you, the customer, and a service provider (either internal or … Read more

Call Monitoring Compliance

Call Monitoring Compliance

It’s important to analyze and fully understand the areas of risk as the CFPB continues to closely supervise the collections environment and call monitoring compliance. One of the biggest risks to a collection agency is communication with consumers, making the monitoring of calls a very telling practice.  An effective call monitoring program is a critical … Read more

Avoid Becoming the Next Anthem Breach: 3 Tips

The recent Anthem breach is potentially the largest data breach to date in the healthcare space. When your CEO or your largest clients ask you what your plan is to prevent the same from happening to you, what are you going to tell them? Safeguarding Personally Identifiable Information (PII) is essential for avoiding a data … Read more

Guaranteeing Hosting Compliance

Guaranteeing hosting compliance.  It’s pretty much something that AIS Network has always done, and it’s a clear service benefit.  Our compliance with multiple security and regulatory standards such as HIPAA/HITECH, FISMA, FERPA, PCI DSS, GLBA, SOX and others repeatedly saves our clients time and money and helps them to avoid costly litigation over compliance errors. Up until … Read more

SSAE 16 Type II Compliance: The New High Bar for Hosting

By Jay Atkinson AIS Network CEO Goodbye, SAS 70. Hello, SSAE 16. SSAE 16? That’s somewhat new terminology among hosting providers and their customers and investors. SSAE 16 certification has officially replaced the SAS 70 certification process. This week, AIS Network announces its favorable completion of the SSAE 16 Type II audit, which was conducted … Read more