Our Blog

Mobile Application Security - Why You Should Focus On IT

Mobile Application Security – Why You Should Focus On IT

Mobile applications ease every day and workday tasks. Yet, they pose vulnerabilities and threats that must be addressed. This article provides guidance on how penetration testing and other best practices
How Hackers Crack Passwords and What You Can Do About It

How Hackers Crack Passwords and What You Can Do About It

When a password is the only thing standing between hackers and data, you can count of them to capitalize on weak passwords. Here's how you can strengthen your passwords to
Understanding the Key Components of a SOC2 Report

Understanding the Key Components of a SOC2 Report

SOC 2 audit reports follow a basic outline. In each report, you will find the vendor’s management assertion, the independent auditor’s report, the vendor’s description of its system, and a
How Can Hospitality Companies Secure Credit Card Information?

How Can Hospitality Companies Secure Credit Card Information?

Hotels and hospitality industry partners collect and store payment card data in a multiple places to improve the guest experience. PCI DSS compliance is critically important to prevent breaches.
CISA Releases Ransomware Readiness Assessment for Businesses

CISA Releases Ransomware Readiness Assessment for Businesses

The Cybersecurity and Infrastructure Security Agency (CISA) recently released a Ransomware Readiness Assessment (RRA) to help businesses evaluate their IT Security environment. This article explains the CISA-recommended controls to prevent
How a SOC2 Audit Report Enhances IT Security

How a SOC2 Audit Report Enhances IT Security

By ERMProtect Staff Organizations that outsource data functions to vendors  - such as data processing, data storage, or data management - remain responsible for protecting their regulated data. That is