Not all hackers are cybercriminals

Not all hackers are cybercriminals

Newspaper headlines and Hollywood movies have shaped our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making massive contributions to the field of cybersecurity, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black, and gray hat hackers. […]

Start using these six Gmail tips now

Start using these six Gmail tips now

Twenty-four hours seem to pass by in the blink of an eye, especially if you’re a small business owner. In order to stand a chance against the competition, the last thing you should do is bury yourself in a pile of endless emails. With the following Gmail tips and tricks, you’ll spend less time with […]

Reasons to back up your mobile devices

Reasons to back up your mobile devices

Companies such as Apple, Samsung, and others have turned mobile phones into mini-computers that can serve as a substitute for your laptop, or as a storage device. If you’re using a smartphone as a communications and storage device, backing up now would be a wise move. Malware on mobile More than two-thirds of the world’s […]

The lowdown on cloud security

The lowdown on cloud security

If you’re thinking of transitioning your business to the cloud, consider the security of the platform. While providers would like us to believe that the friendly, fluffy cloud image used to market the service means it is automatically secure, the reality is far different. Just ask one of the nearly seven million Dropbox users who […]

3 ways to browse the net safely at work

3 ways to browse the net safely at work

Amidst the current climate of malware, hacks, and phishing scams, the internet really isn’t safe for any company that doesn’t take precautions. Without safeguards, browsers that you or your employees use are vulnerable to cyber attacks that may cripple productivity and profit. There are wise steps that every company should take to browse the net […]

The benefits of technology business reviews

The benefits of technology business reviews

Small- and medium-sized businesses don’t have the time to maintain IT infrastructure, let alone assess whether it’s still driving value for the company. However, if you want to ensure everything runs smoothly, it’s important to be proactive and conduct technology business reviews when you can. What is a technology business review? A technology business review […]

The impact of blockchain to healthcare

The impact of blockchain to healthcare

Healthcare organizations need advanced technologies to manage medical records and improve patient care. But even the most advanced technologies come with challenges. One disruptive problem in healthcare of interest to experts is blockchain, and here’s why. What is blockchain? Although the technology is known for enabling cryptocurrencies like Bitcoin, blockchain was immediately recognized as having […]

Burgess Completes SOC 2 Type 2 Data Security Exam Demonstrating Dedication to Privacy and Security for Client Data

Burgess Completes SOC 2 Type 2 Data Security Exam Demonstrating Dedication to Privacy and Security for Client Data

Burgess, an innovator in healthcare payment operations for over 20 years, today announced completion of a third-party audit proving its achievement in meeting the demanding requirements of the SOC 2 Type 2 data security standards.

The professional IT compliance and audit staff at 360 Advanced, a national HITRUST CSF, Qualified Security Assessor, and Certified Public Accountant firm based in St. Petersburg, Fla.

360 Advanced Advises Clients on AICPA Updates on Cybersecurity for SOC Reporting

360 Advanced Advises Clients on AICPA Updates on Cybersecurity for SOC Reporting

Organizations are under constant pressure to manage cybersecurity threats and to prove that they have effective processes and controls in place to detect, mitigate and recover from breaches.

Research by IT security and compliance specialists at 360 Advanced shows that The American Institute of CPAs (AICPA) has developed a cybersecurity risk management reporting framework to address these needs.