Johanson Group Blog
Choosing the Right Compliance Framework for Your Business: NIST vs ISO
When it comes to data security and compliance, businesses need to follow guidelines and standards to ensure they are protecting their sensitive information and customer data. However, choosing the right compliance framework can be overwhelming, with many options available. NIST and ISO are two of the most popular and respected frameworks.
Why You Need a Cybersecurity Risk Management Policy, How to Write One—and Who Can Help
With new technologies emerging every day to make transactions and processes smoother and faster, comes an increased risk of cyber attacks. Cybercriminals adapt quickly to changes in technology and exploit all new platforms.
Why SOC 2 Auditing Is Essential for SaaS Businesses
SaaS companies are becoming more and more popular, but not all of them are able to stay compliant. The truth is that if you run a SaaS business, there's no way around it: you have to be SOC 2 certified.
7 Things To Look For In A SOC 2 Auditor
When trying to determine whether they need a compliance audit, many service organizations face obstacles. However, choosing the right SOC 2 auditor for your organization—although difficult—is an important step in addressing these hurdles.
SOC 2 vs. ISO 27001: Which to Choose
It's safe to say that you're probably familiar with ISO 27001 and SOC 2.
You may have also heard that they are similar in nature, but there are a few key differences between the two standards. In this post, we'll examine these differences and help you decide which standard is right for your organization.
An Overview of a HIPAA Attestation of Compliance
If you’re in an organization that handles protected health information (PHI), you might be asked to complete a HIPAA attestation.
IT Audit Checks: What You Need To Know
An IT audit is an assessment of your company's current IT infrastructure. It provides a clear picture of your company's IT system and where its potential risks lie.
Conducting an audit allows you to identify any gaps that exist as well as identify areas for improvement.
The History of SOC 2 Compliance
The focus on data protection and security has led organizations operating under SOC 2 compliance requirements to implement new technologies that help them protect sensitive data while meeting regulatory standards such as HIPAA, PCI-DSS, and GDPR.
Determining the Scope Statement
The scope statement is defined in the ISO/IEC 27001:2013 under section 4. It shortly describes the purpose or context of your organization and what processes are relevant to run your business. In other words, it defines the boundaries, subject, and objectives of your ISMS.