May 10, 2022

7 reasons a traditional GRC tool is not enough

[5 min read] To the busy CISO, it might seem like implementing a GRC (Governance, Risk and Compliance) tool will be an easy way to create and manage...
Read more
May 9, 2022

The Rise and Fall of SOC 2 audits

[5 min read] Is the AICPA asleep at the wheel? More and more tech companies are seeking to demonstrate their security posture by undertaking a SOC 2...
Read more
April 25, 2022

3 Vendor Risk Management challenges and how to solve them

[5 min read] Vendor Risk management is a hot topic especially when you realize that many of the most high-profile data breaches are due to vendors or...
Read more
April 5, 2022

3 Steps to Establishing a Vendor Risk Management Program

[4 min read] Why vendors may be the biggest security risk to your organization Of the companies that experienced a data breach in 2021, over 90% of...
Read more
July 29, 2021

3 Steps to Improve Your Company's Security Posture

[4 min read] Late last year we wrote a blog that looked at Risk Management and Data Security and suggested what you might do differently as we headed...
Read more
July 16, 2021

How to avoid a Kaseya-type attack

[4 min read] There’s one thing that you can count on in the news right now and that’s another report of a data breach or ransomware attack. They seem...
Read more
July 13, 2021

Why preparing for a SOC audit takes more than 2 weeks

[4 min read] Have you ever wished you could run a marathon?  I have run a few and I can tell you it is hard work and takes a lot of training just to...
Read more
June 23, 2021


[3 min read] Many organizations know that they need to operate in line with HIPAA to protect sensitive data but they have also heard about HITRUST...
Read more
June 22, 2021

What is the difference between risk management and risk assessment?

[4 min read] I have learned over my time working in the cybersecurity space that for many people and business leaders there is a lot of confusion...
Read more
June 16, 2021

Security Audit: An Auditor's View

[4 min read] Security Audits can improve your organizational efficiency and data security When it comes to conducting audits there are multiple...
Read more
May 26, 2021

Easing the top 3 pain points of security audits

[4 min read] Daunting. That’s the word we hear the most from customers when it comes to thinking about completing a security audit. Time, money and...
Read more
May 24, 2021

What is regulatory compliance?

[5 min read] Customers see a lot of confusing terms when they are looking at building a security program.  Terms such as “regulatory compliance”,...
Read more
May 5, 2021

3 trends for safely managing security and risk in 2021

[4 min read] We talked previously about the type of cybersecurity and risk management challenges to expect in 2021, but the trends driving these...
Read more
April 15, 2021

What is a SOC report?

[4 min read] SOC reports simplified with our top 10 questions and answers One of the most popular frameworks we get questions about is the SOC 2...
Read more
March 31, 2021

Are you dissatisfied with your GRC platform?

[4 min read] 5 Key features you need that a traditional GRC provider doesn’t offer When we talk to customers, prospects and even audit partners, they...
Read more
March 25, 2021

Hint Health Benefits from Multiple Security Standards

[4 min read] Hint Health is a technology enabled Direct Primary Care (DPC) solutions company that partners with visionary provider organizations to...
Read more
March 11, 2021

Why is Vendor Risk Management a 'tick the box' process for most companies?

[5 min read] There is much confusion around Vendor Risk Management (VRM), what it is and how to handle it properly for all sizes of business. Too...
Read more
February 4, 2021

Arklign builds an always-on approach to security

[4 min read] If you come from the tech-centric world of Tesla and Apple and enter the world of dental labs where orders are sent by paper, phone or...
Read more
January 21, 2021

How will the healthcare industry deal with data in 2021?

[4 min read] The role of information technology has infiltrated the day to day mechanics of all industries, especially healthcare. Information...
Read more
January 8, 2021

Cybersecurity challenges for 2021 - moving beyond the audit

[4 min read] A recent article in SecureWorld “Lessons from 2020, and what to expect in 2021: An evolutionary time in cyber and privacy” looks back at...
Read more
December 22, 2020

The most important lessons to take away from the SolarWinds hack

[5 min read] The data breach involving FireEye and SolarWinds was shocking. As the leader of a cybersecurity platform company, a significant breach...
Read more
December 16, 2020

Risk Management and Data Security: Do these things differently in 2021

[5 min read] 2020 was undoubtedly a shock to the system, shaking up everyone’s personal and business life. At Ostendio we transitioned quickly to a...
Read more
November 19, 2020

Making SOC 2 audits simple

Are you feeling a little overwhelmed at the thought of a security audit? Have you heard the SOC 2 name mentioned in meetings but don’t understand...
Read more
October 29, 2020

Cybersecurity and the 2020 Election

The election news cycle is in full swing as we near the big day on November 3rd. Regardless of how you vote, at Ostendio we encourage all employees...
Read more
October 15, 2020

A guide to optimizing your existing security program

Many larger companies, and some medium sized companies, have a focused CISO with a great IT team who have all worked hard to establish a data...
Read more
October 1, 2020

Cybersecurity Awareness Month 2020

Thinking about cybersecurity is a full time, 365 day-a-year job at Ostendio but for many it comes to mind most during October when the National...
Read more
September 17, 2020

You passed your security audit...what’s next?

If you’ve recently built a data security and risk management program and passed a security audit, you’ve accomplished more than many organizations. ...
Read more
September 11, 2020

Worried your business is too small for an effective cybersecurity program?

The first step in any process is often the hardest. Realizing that you need to take action is just the beginning, deciding what action to take is...
Read more
September 3, 2020

How great Customer Service can benefit your business

As a CISO, you’ve spent time deciding on the best platform to suit your data security and risk management needs and you are ready for the...
Read more
August 27, 2020

The value of bringing in experts during an audit

When it is time to prepare for your first audit you might be filled with dread.  How are you going to get through the audit? Will your employees or...
Read more
August 20, 2020

How to run a successful data security program

It feels great to get to the point where you have built a cybersecurity program for your business. As a CISO you got the executive buy-in, everyone...
Read more
August 14, 2020

Building a Comprehensive Cybersecurity Program in the age of COVID-19

Even before the COVID-19 pandemic took hold, too many organizations were not looking at a broad enough approach to cybersecurity as they evaluated...
Read more
August 6, 2020

Twitter breach highlights why IT-centric security programs are insufficient

We might not be surprised when we read about another data breach but it does turn heads when it is a well-known brand like Twitter.  Recent reports...
Read more
July 30, 2020

How Data Sets You Free (and Keeps You Safe)

The typical company significantly under invests in cyber security, a situation that is likely to be exacerbated as companies look to cut expenses...
Read more
July 23, 2020

The Future Of Operational Risk Management

Security and Risk Management can be complicated. Predicting what might happen to your business and preparing to protect and mitigate against those...
Read more
July 14, 2020

MyVCM CrossWalk Assessment shows increase in drive for multiple security standards

We have learnt a lot in the last year since we launched the successful MyVCM CrossWalk Assessment feature, an addition to the industry leading ...
Read more
July 2, 2020

Are you ready for CCPA enforcement? Six steps to take right now

The California Consumer Privacy Act (CCPA) went into effect on January 1st 2020 but there are stages to its enforcement and we are about to hit...
Read more
June 25, 2020

One year in: MyVCM CrossWalk Assessments has changed the way we approach security audits

It is hard to believe it has been a year since we launched MyVCM CrossWalk Assessments. This new feature radically changed the way companies...
Read more
June 11, 2020

Renewing your SOC 2 could be easier than you think!

Security certifications are a must for vendors and technology firms. Many organizations choose SOC 2 as a way of demonstrating effective risk...
Read more
May 28, 2020

5 ways to save money by rethinking your Data Security approach

CIOs have mostly ridden out the remote work surge caused by COVID-19.  The employees who can work remotely are now safely settled in their home...
Read more
May 21, 2020

GDPR 2 years on- what happened to all the hype?

May 2020 marks the second year that GDPR has been in effect and we have already seen some significant fines totalling over $126 million.  Google has...
Read more
May 13, 2020

How SOC audits help businesses during uncertain times

How is your business showing compliance to operational and business risks during these uncertain times? Many companies turn to the popular SOC report...
Read more
May 7, 2020

Business Efficiency: the hidden benefit of an information security program

During these difficult times it is understandable that organizations may be looking for creative ways to cut costs or gain efficiency.  While...
Read more
April 29, 2020

How can a Risk Management platform support your business during a crisis?

We are all getting used to our new “normal” but many businesses, both big and small, have been caught off-guard by the COVID-19 crisis. Having to...
Read more
April 17, 2020

Using Risk Management strategies to help us effectively Socially Distance

As we start to adapt to our new quarantined life, one of the things that has struck me is how different people have benchmarked what they constitute...
Read more
April 10, 2020

Is Zoom just the tip of the iceberg?

From the recently announced privacy issues being investigated by the New York Attorney General at Zoom, all the way back to the Zenefits scandal in...
Read more
March 26, 2020

7 Tips to Reduce Risk Stemming from Remote Work

If you have a team working remotely due to the COVID-19 virus you are obviously not alone as we adjust to this new normal way of work.  At present, 1...
Read more
March 19, 2020

5 Biggest Mistakes Companies Make in Vendor Risk Management -- and how to avoid them

Vendor Risk Management is a hot topic at the moment and for good reason.  A recent study by the Ponemon Institute showed 59% of companies have...
Read more
March 3, 2020

Top 5 Questions (and answers) about Vendor Risk Management

If you missed our recent webinar “Re-thinking Vendor Risk Management” you can listen to it free and on-demand here.  In the webinar we talked about...
Read more
February 25, 2020

Checking in on HIPAA in 2020

What do you need to know about HIPAA in 2020? This year, the changes are not so much about HIPAA itself, but about things that directly affect how...
Read more
January 28, 2020

Top 10 Considerations for GRC Software Tools

When we talk to customers, prospects and even audit partners, they are often overwhelmed with the choices they have for GRC tools.  There is a lot of...
Read more
January 27, 2020

Super Bowl Fever at Ostendio - Football and Security have more in common than you might think!

We are huge football fans at Ostendio!  Even though we spend our days helping customers with their cybersecurity challenges, many of us also...
Read more
January 15, 2020

Why Integrated Risk Management is Becoming the Preferred Approach to Data Security

There’s an inherent risk to doing business, particularly business that touches personal data. For years now, the business community – from healthcare...
Read more
August 29, 2019

Unpacking the SCF Capability Maturity Model

If you aren’t familiar with the Secure Controls Framework (SCF), you should be. It’s a non-profit organization dedicated to providing content that...
Read more
August 20, 2019

Cybersecurity Dictionary for 2019

In case you are new to the world of cybersecurity and are struggling to learn or understand some of the new terms you are hearing, don’t worry, we’re...
Read more
August 15, 2019

5 Trust Service Criteria of a SOC 2 Report

A SOC 2 report has 5 Trust Services Criteria, which have previously been commonly called Trust Services Principles. These Trust Service Criteria are...
Read more
August 5, 2019

SOC 2 vs. SOC 1 or SOC 3: Which SOC Report Do I Need?

A Systems and Organizational Controls (SOC) report provides guidance on standards that should be used for operational and technological business...
Read more
July 22, 2019

Preparing for the CCPA? 6 Steps to Get You Started

We hear about personal data breaches and cybersecurity attacks daily in the news. The California Consumer Privacy Act (CCPA) is one state’s answer to...
Read more
July 11, 2019

New Document Management Capabilities in Ostendio MyVCM

Sometimes what seems like a low-level feature can actually be a very big deal in the world of cybersecurity and compliance. That’s why I’m really...
Read more
May 21, 2019

7 Reasons Companies Can’t Avoid a Security Risk Assessment

If you’re a company with the view that cybersecurity is largely an IT issue, you may take the attitude of “We’ve got this.” Hold that thought. When...
Read more
February 6, 2019

Risk Management: What does it Mean to your 2019 Security Strategy?

For CISOs, data risk is like a fire underfoot. Data’s very fluidity and its constant generation makes a complete lockdown impossible - no matter...
Read more
January 24, 2019

5 Things to Know Before Buying Compliance Management Software

How do you choose the right compliance management software ? Technology can seriously streamline compliance management efforts and help you ...
Read more
August 15, 2018

Why the California Consumer Privacy Act is Important to all Online Users

No matter the criticism of the “rush job” regarding the newly passed AB375, the California Consumer Privacy Act, its underlying purpose makes it the...
Read more
July 20, 2018

Are you Managing your Vendor Risk?

It’s not uncommon today for businesses to outsource certain services to third-parties. However, with outsourcing, the risks of the service...
Read more
July 10, 2018

Can a Compliance Audit be Pain-Free?

No one ever looks forward to a compliance audit. However, there are steps you can take to alleviate some of the pains felt before an audit, and it...
Read more
June 22, 2018

How to Help Employees Rethink Compliance and Security

What’s your current approach to compliance? Policies and procedures in place, a security risk analysis every eighteen months, and an annual slide...
Read more
June 13, 2018

What the HITRUST & NIST Alignment Brings to Healthcare Organizations

HITRUST (Health Information Trust Alliance) and NIST (National Institute of Standards and Technology) recently announced that they have teamed up and...
Read more
May 1, 2018

Big Cyber Growth in the Greater Washington Area

On Tuesday April 22nd, myself and Ostendio’s CEO, Grant Elliott, attend DCA LIVE’s 2018 BIG Cyber Growth Summit. As a cybersecurity product company...
Read more
April 23, 2018

Curiosity Killed the Healthcare Organization

Study Shows that Healthcare's Internal Security Breaches Exceed External Ones Was that Lady Gaga in the emergency room? What kind of procedure is my...
Read more
April 18, 2018

Security Awareness Training vs Human Error: Can it Make the Difference?

Phishing is quickly evolving to take advantage of that most difficult-to-prevent vulnerability: human error. A lack of security awareness can lead to...
Read more
April 5, 2018

'We’re a US Company, the EU’s GDPR doesn’t apply!' Think again.

If you collect any EU resident’s identifying data as broadly defined under the EU’s General Data Protection Regulation, aka GDPR, you now have...
Read more
March 26, 2018

Should you Integrate your GRC Platform with your Back-End Systems?

One of the key objectives when developing an effective security and compliance management program is to remain interdependent of core systems.  While...
Read more
March 19, 2018

How to Prepare for a SOC 2 Audit

Security certifications are fast becoming need-to-haves for vendors and technology firms. Certifications, such as SOC 2, can offer a cost-efficient...
Read more
January 8, 2018

How about a Cybersecurity Resolution for 2018?

It’s a new year with a new budget, and a new year’s resolution for laser-focus on cybersecurity. That should be easier to keep than the ones for no...
Read more
January 4, 2018

Compliance and Security: Why One Does NOT Equal The Other

It’s an all-too- common misunderstanding, but a robust information security program doesn’t mean you’re in compliance with whatever regulations...
Read more
May 30, 2017

Understanding ISO-27001 Requirements

What is ISO-27001? ISO-27001 is a globally recognized security framework.  It aims to “provide a model for establishing, implementing, operating,...
Read more
December 20, 2016

Top 5 Predictions for Healthcare Cybersecurity in 2017

As 2016 draws to a close, it was a busy year for both companies defending themselves, and cyber criminals creating new forms of attack. As CEO of...
Read more
December 15, 2016

End-of-Year Round Up: 3 Must Read Ostendio Blog Posts

The Ostendio blog covered a lot of ground this year – from a 3-part series about Cybercrime in Healthcare – to the worst passwords your organization...
Read more
December 7, 2016

Compliance & Risk: Has the Zenefits Lesson Changed the Game?

After a lengthy process of “putting things to rights” in 17 states, Zenefits is paying up to US$7 million in penalties. As with other digital health...
Read more
July 13, 2016

FDA Guidance : “Go Ahead & Share”

FDA Guidance : “Go Ahead & Share” FDA encourages Medical Device Manufacturers to share Patient Data In the digital age of healthcare, consumers are...
Read more
April 18, 2016

The Brave (not so new) World of Compliance & Cybersecurity

GUEST BLOG: Our guest blog post  this week is written by Chris Apgar, CEO of Apgar and Associates, LLC. Chris is a recognized expert in Information...
Read more
April 5, 2016

Whipped Into Shape: 5 Compliance Questions To Ask Your Digital Health Partners

We are excited to have a guest blog post from Irina Ridley, Privacy and Compliance Officer for Omada Health.  Irina offers practical guidance  for...
Read more
February 10, 2016

Zenefits is Just the tip of the Iceberg – 4 Reasons Why

The digital health market was rocked by the recent announcement that HR services darling Zenefits has gone from ‘rock star’ to a symbol of Silicon...
Read more
January 14, 2016

You Took an Online Risk Assessment!

THINK YOU ARE COMPLIANT? THINK AGAIN! A key first step in being compliant with most security regulations, including HIPAA, is the completion of an...
Read more
May 23, 2014

Achieving compliance in the cloud

With the advent of cloud-based services and the ability of mHealth to move data outside the healthcare setting through these portals, the cost of...
Read more
January 8, 2014

Concerned about HIPAA Compliance? If You’re a Health Startup, Yes

This article first appeared on on January 7th, 2014.  (Photo courtesy of Flickr / USDA) I typically can tell if a health-tech startup...
Read more
October 4, 2013

Why mere compliance increases risk

  In some cases, poor training is as bad as–if not worse than–no training it all, say John Schroeter and Tom Pendergast By John Schroeter and Tom...
Read more