The Latest Posts

The HIPAA Security Rule

The HIPAA Security Rule outlines technical requirements needed in order to meet HIPAA compliance. Learn about your organization’s responsibilities and see the HIPAA Security Rule checklist.

Read more

HIPAA Compliance Checklist

HIPAA compliance checklist for building compliant applications and cloud solutions. Learn about HIPAA compliance standards and see steps and safeguards required to become compliant.

Read more

Top 5 Options for HIPAA Compliant Cloud Storage 2020

Organizations can use cloud storage solutions for file storage, sharing, and collaboration. Learn about which cloud storage solutions can be configured in a HIPAA compliant manner

Read more

10 Common Questions Around SOC 2 Compliance

SOC 2 can be a complicated security standard to understand. Learn more about the basics of SOC 2 compliance and how teams become SOC 2 compliant. Read a general overview of SOC 2 assessment framework and frequently asked questions.

Read more

Dash Integrates SOC 2 Standards: Provides Path to SOC 2 Readiness

Dash has integrated the latest SOC 2 standards, including the latest AICPA 2017 Trust Services (TSC) into the Dash ComplyOps platform, enabling teams in AWS and Azure to quickly achieve SOC 2 Type II.

Read more

How To Select a SOC 2 Auditor

SOC 2 audits can only performed by an AICPA affiliated firm. Learn about requirements and best practices for selecting a SOC 2 Auditor, performing assessment, and receiving SOC 2 reports.

Read more

SOC 2 and The Trust Services Criteria (TSC)

SOC 2 evaluates teams based on set of controls defined in the Trust Services Criteria (TSC). Learn about the 5 categories of security controls and requirements for SOC 2 compliance.

Read more

Overview of SOC 2 Reports

Learn about SOC 2 reports and how organizations achieve SOC 2 Type 1 and SOC 2 Type 2 reports. See the steps to achieving SOC 2 compliance and getting a SOC 2 report.

Read more

Preparing For A SOC 2 Audit

Learn how to prepare for a SOC 2 Audit. See best practices for setting security controls, gathering evidence, and engaging a SOC 2 auditor. Plan for SOC 2 assessment and certification.

Read more

Building a HIPAA Compliant Application on AWS

Managing PHI in the cloud? Learn about developing a secure cloud architecture and building a HIPAA compliant applications in Amazon Web Services (AWS).

Read more