Steps to Avoid a Pricey Data Breach

Steps to Avoid a Pricey Data Breach

Are you swimming in information security concerns? Avoid a pricey data breach by reading further. Recent and startling new malicious attacks are causing organizations to re-think everything we know about our security posture – from breach prevention to response. Organizations are beginning to shift their focus on security when they have realized that sometimes, compliance … Read more

WannaCrypt Ransomware Defense

WannaCrypt Ransomware Defense

Looking for WannaCrypt ransomware defense? On Friday, May 12th, a large ransomware attack was launched, known as WannaCrypt (a.k.a. WannaCry). It infected more than 230,000 computers across 150 countries. This unprecedented cyberattack left organizations struggling in the aftermath as they try to recover. WannaCrypt demands payment of ransom in bitcoin and has spread in several … Read more

PCI DSS 3.2 Requirements and What’s New

PCI DSS 3.2 Requirements and What’s New PCI DSS 3.2 includes some changes about which you should know. Many thanks to our auditor, KirkpatrickPrice, for explaining the details to folks via a new webinar. In this special session, Shannon Lane – a QSA, CISSP, and auditor with KirkpatrickPrice – discusses what’s new in PCI DSS … Read more

Penetration Tests and Their Benefits

Penetration tests and their benefits on the brain? If performed regularly, penetration tests are key to your overall security posture. It’s an important practice that gives organizations visibility into real-world threats to your security. As part of a routine security check, penetration tests allow you to find the gaps in your security before a hacker … Read more

Penetration Tests Help Avoid a Data Breach

Penetration tests and vulnerability scans, if performed regularly, will help your organization avoid a costly data breach.  Did you know that? So why don’t more companies get on the ball and do this? Nearly every week, we read about a malicious hacker who has penetrated a security gap in an organization’s infrastructure to gain access to loads of … Read more

Phase 2 HIPAA Audits Prep

Phase 2 HIPAA Audits Prep

Phase 2 HIPAA Audits Prep Phase 2 HIPAA Audits have officially begun. You may know that the OCR is gathering information to determine which covered entities and business associates will be included in the auditee pool. If you haven’t already prepared for Phase 2 HIPAA Compliance, knowing where to begin may seem a bit overwhelming. … Read more

Creating a Compliance Culture

Wondering how to create a positive compliance culture within your company?  We’re here to help companies make managing compliance, well, manageable. We’ve defined the role and responsibilities of the Chief Compliance Officer. We’ve helped delineate what a Compliance Management System (CMS) is all about. We are now here to share the next best kept industry … Read more

Secure Web App Best Practices

Maintaining a secure web environment is extremely important in today’s technological climate. So, let’s look at secure web app best practices. Performing regular scans and tests of your security posture is best practice and one that is rapidly becoming an essential piece to maintaining security at your organization. Web applications have become a common target … Read more

PCI DSS Requirements 3 and 4

Questions about PCI DSS Requirements 3 and 4? You’ve come to the right place. As you may know, AISN is a PCI compliant cloud hosting provider. Previously, we addressed questions about PCI DSS Requirements 1 and 2. Today, we’re reprinting highlights from an exclusive online interview sponsored by our valued partner, KirkpatrickPrice. In this interview, … Read more