IT Audit & Compliance Blog

The Linford & Company Blog is written by our very own auditors, who are experts in IT audits, information security, and compliance topics. Their auditing experience encompasses a broad spectrum of industries and organizations, and their specialized expertise can help your company or organization make the right decision for your auditing needs. Our specific areas of focus in our IT Audit & Compliance Blog include SOC 1 Audits, SOC 2 Audits, HIPAA Audits, HITRUST Certification, and FedRAMP Assessments, NIST & CMMC, and Penetration Testing.

Types of penetration testing

Types of Penetration Tests: A Look at Different Pentest Techniques & Tools

We have a few blogs written on penetration testing. These blogs include information on the steps or phases to properly conduct a penetration test, how penetration tests relate to satisfying SOC 2 requirements, information on how penetration testing compares to vulnerability assessments, and more. Feel free to check out these related blogs: External Penetration Testing […]

Hospitality IT & Cybersecurity Compliance Guide

IT Security Compliance in Hospitality: A Friendly Field Guide from the Lobby to the Server Room

I spent many years in the hospitality industry, helping guide hospitality companies through their compliance journeys, working with ownership groups to meet their compliance needs and goals, and reviewing technology vendors and their solutions to ensure we were not putting our properties at unnecessary risk. Today, I lead audit engagements at a CPA firm that […]

Risk Governance 101

Risk Governance – What Is It & Where Do I Start?

Risk governance, as defined by NIST, is the “process by which risk management evaluation, decisions, and actions are connected to enterprise strategy and objectives. It provides the transparency, responsibility, and accountability that enables managers to acceptably manage risk.” While this concept is seemingly straightforward, a robust risk governance program has a lot of varied components! […]

Guide to the HITRUST certification process

Expert Guide to the HITRUST Certification Process & Assessment Types

Founded in 2007, HITRUST® issues certifications to businesses and organizations that are independently assessed for compliance with its Common Security Framework (CSF®). This guide will walk you through the HITRUST certification process, explain all available assessment types (e1, i1, r2), introduce newer offerings tailored to AI systems, and provide guidance on maintaining certification over time. […]

IT governance (GEIT) and SOC 2

IT Governance (GEIT) & SOC 2: Navigating Today’s Complex Risk Landscape

In a world where digital risk, regulatory expectations, and emerging technologies are accelerating, strong IT Governance remains foundational. SOC 2 compliance continues to be a key mechanism for service organizations to show they have strong controls. Understanding how IT governance and SOC 2 align, and where recent changes affect that alignment, is more critical than […]

Audit risk assessment guide

Navigating Audit Risk Assessment: Your Path to Compliance

Audit risk assessments are an integral part of any company’s internal control structure and are relevant to compliance frameworks, including SOC 2, HIPAA, and ISO 27001. Risk assessments can be daunting as they encapsulate risks across an entire company, and it can be difficult to understand what considerations should be taken and even where to […]

Are you FedRAMP ready?

Are You Really FedRAMP Ready? What It Actually Takes

Many cloud services and SaaS providers are eager to enter the federal market, but many underestimate what it really takes to achieve a FedRAMP authorization. FedRAMP is not just a checklist or an exercise in paperwork; it’s a high stakes, high complexity, and high-cost project that demands the right people, the right systems, the right […]

guide-to-iso-iec-27018-cloud-privacy

ISO/IEC 27018: A Practical Guide to Cloud Privacy and Certification

In an era where organizations increasingly rely on the cloud to manage sensitive information, protecting personal data is no longer just a best practice—it’s a business imperative. ISO/IEC 27018 steps in as a purpose-built privacy standard designed to help public cloud service providers handle personally identifiable information (PII) responsibly and transparently. Focused on real-world challenges […]

Guidance for compliance training

Compliance Training – Insights & Guidance For Your Organization

With the frequent personnel changes that many companies are experiencing right now, it’s important to consider how turnover affects companies’ compliance efforts. Almost every company is required to comply with some type of law, rule, regulation, or reporting standard.  This blog post will provide some ideas for helping to provide sufficient compliance training as part […]