Author: Justin Gratto

Total posts: 18

The HIPAA BAA: 4 Tips Tech Vendors Need to Know

The HIPAA BAA: 4 Tips Tech Vendors Need to Know

Posted on October 19, 2021 - by Justin Gratto

In the United States, as more SaaS companies look to expand their services to the healthcare industry they will need to become compliant with HIPAA. This means there will be ...

Read More
What You Need to Know About ITAR Compliance

What You Need to Know About ITAR Compliance

Posted on January 22, 2021 - by Justin Gratto

If you're exporting certain technologies, materials, or data from the United States, you may be required to be in compliance with ITAR. While ITAR regulations are best known for applying ...

Read More
A Guide to Implementing ISO 27001 in Your Business

A Guide to Implementing ISO 27001 in Your Business

Posted on December 7, 2020 - by Justin Gratto

If you're selling to global companies, you're likely getting questions about whether you adhere to ISO 27001. This information security framework was designed to be an international standard for businesses to ...

Read More
What is PCI DSS? Managing Compliance for Your Business

What is PCI DSS? Managing Compliance for Your Business

Posted on May 26, 2021 - by Justin Gratto

If you're a service provider or retailer who accepts credit and debit card payments online, it's likely you'll need to adhere to PCI DSS compliance in your operations. Credit card ...

Read More
OWASP Top 10: How to Address These Common Application Vulnerabilities in Your Business

OWASP Top 10: How to Address These Common Application Vulnerabilities in Your Business

Posted on November 19, 2020 - by Justin Gratto

Application vulnerabilities aren't always novel. In cybersecurity, there are a few vulnerabilities that professionals encounter often. In fact, a handful of them are so prominent that Open Web Application Security ...

Read More
How to Manage CMMC Compliance for Your Business

How to Manage CMMC Compliance for Your Business

Posted on January 11, 2021 - by Justin Gratto

If your company wants to compete for contracts from the U.S. Department of Defense, you’ll need to achieve compliance and meet all the requirements for the Cybersecurity Maturity ...

Read More
Our Guide to Using the NIST Cybersecurity Framework for Your Business

Our Guide to Using the NIST Cybersecurity Framework for Your Business

Posted on November 27, 2020 - by Justin Gratto

The NIST Cybersecurity Framework is a comprehensive approach to security designed to help businesses better understand and manage their risk. If you’re looking for an approachable cybersecurity model that ...

Read More
Your Essential Guide to HIPAA Compliance: A Checklist for Vendors

Your Essential Guide to HIPAA Compliance: A Checklist for Vendors

Posted on April 14, 2021 - by Justin Gratto

If your business is looking to expand into the healthcare sector (or has customers who are doing so), you know how quickly questions about HIPAA compliance start to come up. ...

Read More
What Businesses Can Do About Increasing Cybersecurity Risks Due to COVID-19

What Businesses Can Do About Increasing Cybersecurity Risks Due to COVID-19

Posted on April 2, 2020 - by Justin Gratto

I write this as I sit in self-isolation, as our company has issued a strict policy of work from home. Many other people now find themselves in the same position, ...

Read More
6 Best Practices for Phishing Prevention

6 Best Practices for Phishing Prevention

Posted on August 18, 2020 - by Justin Gratto

Your email accounts are where you are most vulnerable to being a victim of a cybercrime. Yet email security is often forgotten, even though a surprising number of attacks use ...

Read More
The Cybersecurity Product Roadmap: 14 Application Security Features To Help Your Customers Be More Secure

The Cybersecurity Product Roadmap: 14 Application Security Features To Help Your Customers Be More Secure

Posted on January 22, 2020 - by Justin Gratto

Application security features sound like obvious items to put on your product roadmap. But since applications today are constantly changing and evolving, it becomes a never-ending marathon consisting of sprints ...

Read More
How to Use the CIS Controls Framework for Your Business

How to Use the CIS Controls Framework for Your Business

Posted on January 15, 2020 - by Justin Gratto

For businesses, leveraging a framework like CIS Controls makes sure your company and customer data stay safe. You want to use trusted security and privacy frameworks for your business and ...

Read More
Why Your Business Needs a Penetration Test

Why Your Business Needs a Penetration Test

Posted on December 28, 2019 - by Justin Gratto

When it comes to developing cybersecurity strategies, planning and assessing existing infrastructure only goes so far. To create an airtight security plan, you also need to view your company from ...

Read More
Top 5 Security Trends in 2020

Top 5 Security Trends in 2020

Posted on December 12, 2019 - by Justin Gratto

Security trends in 2020 will be driven by how innovative and lucrative the cybercrime industry is becoming. This is especially critical if you’re a founder or senior executive of a ...

Read More
How to Create an Incident Response Plan

How to Create an Incident Response Plan

Posted on July 16, 2020 - by Justin Gratto

Things happen – it’s an unfortunate reality when it comes to doing so much business with digital technology. And incidents can take many forms. From compromised passwords to phishing attacks ...

Read More
How Hackers Target Printers: Best Practices for Office or Home Printer Security

How Hackers Target Printers: Best Practices for Office or Home Printer Security

Posted on August 13, 2020 - by Justin Gratto

There’s one overlooked device that can result in a security or privacy breach: the printer.  Printers aren't always considered in a company’s cybersecurity strategy, despite their presence ...

Read More
5 Ways To Secure Local Data Backups for Your Company

5 Ways To Secure Local Data Backups for Your Company

Posted on August 20, 2020 - by Justin Gratto

Are you keeping local data backups? It might seem like everything is moving to the cloud these days, but maintaining local backups are a security best practice. Data backups that ...

Read More
Cheatsheet: Everything You Need to Know About Information Security Policies

Cheatsheet: Everything You Need to Know About Information Security Policies

Posted on August 10, 2020 - by Justin Gratto

Do you have formal information security policies written down in your company? At this point, they’re necessary for every business. However, developing security policies is a daunting task, especially ...

Read More