IT Audit & Compliance Blog

The Linford & Company Blog is written by our very own auditors, who are experts in IT audits, information security, and compliance topics. Their auditing experience encompasses a broad spectrum of industries and organizations, and their specialized expertise can help your company or organization make the right decision for your auditing needs. Our specific areas of focus in our IT Audit & Compliance Blog include SOC 1 Audits, SOC 2 Audits, HIPAA Audits, HITRUST Certification, and FedRAMP Assessments, NIST & CMMC, and Penetration Testing.

Definitive guide to the HITRUST certification process

The Definitive Guide to HITRUST Certification: Process, Costs, & Timeline

What is HITRUST Certification? Founded in 2007, HITRUST issues certifications to businesses and organizations that are independently assessed for compliance with its Common Security Framework (CSF). An organization can obtain HITRUST certification when all the required controls are fully implemented within the scoped environment. The HITRUST CSF is designed for use by a variety of […]

What is ISO?

What is ISO? A Guide to Security Standards & Compliance

Across the globe, International Standards Organization (ISO) standards have been accepted by experts as a standard that can be relied upon for just about any process. They guide requirements to manufacture a good, provide a service, set up a management system, and comply with safety requirements. The list goes on and on. Since we are […]

SOC 2 controls

SOC 2 Controls: Developing a SOC 2 Control List

One of the most common requests I get from organizations preparing for a SOC 2 audit is for the SOC 2 control list that specifies the required controls. However, unlike other security frameworks, SOC 2 does not come with a set list of controls. Rather, the amount and type of SOC 2 controls an organization […]

Security of containers

What is Containerization? A Security Implementation Guide

Containers, and the concept of containerization, have been continuing to grow. Many organizations are struggling to keep up with the new technology and keep their systems secure. If you and your organization are considering trying to use or moving to containers, many of your current security processes and procedures will no longer work with containerization […]

Compliance automation tools

Compliance Automation Tools: Can You Automate Regulatory Compliance?

Who likes dealing with regulatory compliance? It’s not the most fun or popular task for organizations to deal with. Yet we live in a world with increasing risks related to information security, increasing regulation, and less time to commit to dealing with these factors. With the proliferation of artificial intelligence (AI) and compliance automation tools […]

CMMC final rule

Stop Procrastinating: Your Guide to the CMMC Final Rule

People often make New Year’s resolutions to reflect on the past year and set goals for personal growth, improvement, or change in the year ahead. One of the funniest I’ve heard is, “My New Year’s resolution is to stop procrastinating… starting tomorrow.” If you’ve been procrastinating on learning about CMMC, now is the time to […]

Emergency change process for compliance

Emergency Changes: Mastering SOC 2 Compliance

It’s 2 a.m., and the team is on a call. A security vulnerability has just been flagged in the production system. Hackers are actively exploiting this flaw worldwide. The pressure is on: the system needs an emergency patch—now. Testing? There’s no time. Waiting for standard approvals? Not an option. But as the team scrambles, the […]