Steps to Avoid a Pricey Data Breach

Steps to Avoid a Pricey Data Breach

Are you swimming in information security concerns? Avoid a pricey data breach by reading further. Recent and startling new malicious attacks are causing organizations to re-think everything we know about our security posture – from breach prevention to response. Organizations are beginning to shift their focus on security when they have realized that sometimes, compliance … Read more

WannaCrypt Ransomware Defense

WannaCrypt Ransomware Defense

Looking for WannaCrypt ransomware defense? On Friday, May 12th, a large ransomware attack was launched, known as WannaCrypt (a.k.a. WannaCry). It infected more than 230,000 computers across 150 countries. This unprecedented cyberattack left organizations struggling in the aftermath as they try to recover. WannaCrypt demands payment of ransom in bitcoin and has spread in several … Read more

Penetration Tests and Their Benefits

Penetration tests and their benefits on the brain? If performed regularly, penetration tests are key to your overall security posture. It’s an important practice that gives organizations visibility into real-world threats to your security. As part of a routine security check, penetration tests allow you to find the gaps in your security before a hacker … Read more

Phase 2 HIPAA Audits Prep

Phase 2 HIPAA Audits Prep

Phase 2 HIPAA Audits Prep Phase 2 HIPAA Audits have officially begun. You may know that the OCR is gathering information to determine which covered entities and business associates will be included in the auditee pool. If you haven’t already prepared for Phase 2 HIPAA Compliance, knowing where to begin may seem a bit overwhelming. … Read more

Secure Web App Best Practices

Maintaining a secure web environment is extremely important in today’s technological climate. So, let’s look at secure web app best practices. Performing regular scans and tests of your security posture is best practice and one that is rapidly becoming an essential piece to maintaining security at your organization. Web applications have become a common target … Read more

PCI DSS Requirements 3 and 4

Questions about PCI DSS Requirements 3 and 4? You’ve come to the right place. As you may know, AISN is a PCI compliant cloud hosting provider. Previously, we addressed questions about PCI DSS Requirements 1 and 2. Today, we’re reprinting highlights from an exclusive online interview sponsored by our valued partner, KirkpatrickPrice. In this interview, … Read more

Call Monitoring Compliance

Call Monitoring Compliance

It’s important to analyze and fully understand the areas of risk as the CFPB continues to closely supervise the collections environment and call monitoring compliance. One of the biggest risks to a collection agency is communication with consumers, making the monitoring of calls a very telling practice.  An effective call monitoring program is a critical … Read more

PCI DSS Requirements 1 and 2

PCI DSS Requirements 1 and 2

Questions about PCI DSS Requirements 1 and 2? You’ve come to the right place. As you may know, AISN is a PCI compliant cloud hosting provider. Today. we’re fortunate to reprint highlights from an exclusive online interview sponsored by our valued partner, KirkpatrickPrice. In this interview, KirkpatrickPrice Information Security Auditor Barry Williams responded to some … Read more

Compliance Mistakes: 5 Killer Errors

Compliance Mistakes

Compliance mistakes can be costly. Very costly. The fines associated with non-compliance and/or data breaches are stiff and punishing in multiple ways. Sarah Morris of KirkpatrickPrice, our auditor, kindly put together this list of five key compliance mistakes. At AISN, we urge you to be proactive about compliance and security and understand how to avoid … Read more