Understanding SOC 2 Audit Opinions: An Auditor’s Perspective
by Jerry Hughes on August 8, 2024 at 12:45 PM
Service Organization Control 2 (SOC 2) reports are relevant for service organizations to demonstrate their commitment to data security and the effectiveness of their internal controls. SOC 2 reports come with audit opinions provided by independent auditors, which offer insights into h …
CDK Global Hit by Cyberattacks: The Impact on Auto Dealerships
by Jerry Hughes on June 27, 2024 at 2:45 PM
CDK Global, a major software-as-a-service (SaaS) provider for car dealerships, recently faced consecutive cyberattacks, severely disrupting the automotive sales and service industry. These breaches highlight the increasing sophistication of cyber threats and the widespread implication …
Your Guide to Drafting a Data Retention Policy
by Jerry Hughes on August 9, 2023 at 1:00 PM
Each day, organizations across the globe handle massive amounts of information, and ensuring it's managed securely, compliantly, and efficiently is no walk in the park. The nitty-gritty of data retention, from knowing how long to keep specific files to wading through a maze of regulat …
Addressing the Risks of Artificial Intelligence (AI)
by Jerry Hughes on May 4, 2023 at 1:00 PM
Artificial intelligence (AI) is a tool with transformative potential across various domains. It can enhance medical diagnoses and bolster cybersecurity, improving decision-making and efficiency. Nevertheless, like any emerging technology, AI carries certain risks.
COVID-19: Is Management Asking the Right Questions?
by Jerry Hughes on April 24, 2020 at 4:00 PM
What if you are the owner or manager of a business in today’s world? A few weeks ago, our world was turned upside down – to say the least. Management’s focus shifted from business as usual to figuring out how to keep employees safe and company doors open for business (in-person or vir …
Stop Running from Privacy! Use the NIST Privacy Framework
by Jerry Hughes on February 19, 2020 at 1:00 PM
Take a look at your recent SOC 2 Type ll Service Organization Audit, where there are five Trust Service Criteria (Security, Confidentiality, Processing Integrity, Availability, and Privacy). How about your last Health Insurance Portability and Accountability Act (HIPPA) Audit, where t …