With cyber threats evolving at an unprecedented rate, everyone must adopt robust security frameworks to protect sensitive information. One of the most widely recognized and implemented information security standards is ISO/IEC 27001:2022 (commonly referenced as “ISO 27001”). This internationally accepted standard provides a systematic approach to managing sensitive company and customer data, ensuring confidentiality, integrity, […]
IT Audit & Compliance Blog
The Linford & Company Blog is written by our very own auditors, who are experts in IT audits, information security, and compliance topics. Their auditing experience encompasses a broad spectrum of industries and organizations, and their specialized expertise can help your company or organization make the right decision for your auditing needs. Our specific areas of focus in our IT Audit & Compliance Blog include SOC 1 Audits, SOC 2 Audits, HIPAA Audits, HITRUST Certification, and FedRAMP Assessments, NIST & CMMC, and Penetration Testing.
The Future of Personal Computing – Why PCs Will Be Obsolete by 2040
For decades, personal computers have been the backbone of work, creativity, and communication. From the early desktops of the 1980s to the sleek ultrabooks and gaming rigs of today, PCs have played an essential role in modern life. However, we are now on the cusp of a major technological shift that will render traditional personal […]
The Rise of AI Agents: Transforming Business & Auditing in the Digital Age
AI agents are no longer a futuristic concept—they are actively reshaping business operations and revolutionizing auditing processes. Companies are leveraging these autonomous AI systems to automate workflows, enhance decision-making, and optimize security practices. But with rapid adoption comes significant challenges: compliance risks, ethical considerations, and security vulnerabilities that auditors must address. From customer service chatbots […]
What is SOC 2? Compliance, Certification & Reports – Guidance from an Auditor
In this article, we will cover some common questions that come up related to SOC 2 reports. SOC 2 does not have to be difficult although, with some of the terminology, it can initially be confusing. So what are SOC 2 reports? Let’s dive in! With today’s prevalence of cloud computing, information security and the […]
The Death of RPA: How Artificial Intelligence Has Taken the Lead
In today’s evolving technological landscape, businesses are increasingly turning to automation to enhance efficiency and reduce operational costs. Two prominent technologies in this domain are Robotic Process Automation (RPA) and Artificial Intelligence (AI). While both aim to streamline business processes, they differ significantly in their capabilities and applications. This article explores the distinctions between RPA […]
The Definitive Guide to HITRUST Certification: Process, Costs, & Timeline
What is HITRUST Certification? Founded in 2007, HITRUST issues certifications to businesses and organizations that are independently assessed for compliance with its Common Security Framework (CSF). An organization can obtain HITRUST certification when all the required controls are fully implemented within the scoped environment. The HITRUST CSF is designed for use by a variety of […]
What is ISO? A Guide to Security Standards & Compliance
Across the globe, International Standards Organization (ISO) standards have been accepted by experts as a standard that can be relied upon for just about any process. They guide requirements to manufacture a good, provide a service, set up a management system, and comply with safety requirements. The list goes on and on. Since we are […]
SOC 2 Controls: Developing a SOC 2 Control List
One of the most common requests I get from organizations preparing for a SOC 2 audit is for the SOC 2 control list that specifies the required controls. However, unlike other security frameworks, SOC 2 does not come with a set list of controls. Rather, the amount and type of SOC 2 controls an organization […]
What is Containerization? A Security Implementation Guide
Containers, and the concept of containerization, have been continuing to grow. Many organizations are struggling to keep up with the new technology and keep their systems secure. If you and your organization are considering trying to use or moving to containers, many of your current security processes and procedures will no longer work with containerization […]
Compliance Automation Tools: Can You Automate Regulatory Compliance?
Who likes dealing with regulatory compliance? It’s not the most fun or popular task for organizations to deal with. Yet we live in a world with increasing risks related to information security, increasing regulation, and less time to commit to dealing with these factors. With the proliferation of artificial intelligence (AI) and compliance automation tools […]