Laika’s Blog
-
What is penetration testing?
Penetration testing, also known as pen testing, is a form of "ethical hacking." It is a process where testers attempt to access or exploit vulnerabilities in...Learn moreCompliance 101 -
What is HIPAA compliance?
HIPAA, or the Health Insurance Portability and Accountability Act, is focused on protecting patient privacy and keeping patient data safe and sound.Learn moreCompliance 101 -
What is PCI DSS?
Payment Card Industry Data Security Standards (PCI DSS) are non-regulatory information security standards designed to counter the largest threats to your...Learn moreCompliance 101 -
Newly Released 2022 Updates to ISO 27001
ISO 27001 is the framework companies are certified against, while ISO 27002 is a reference standard to guide control selection, implementation, and management....Learn moreCompliance 101 -
What You Need to Know about CMMC 2.0
CyberSecurity Maturity Model Certification (CMMC) is an IT Compliance Program created by the U.S. Department of Defense (DoD). This certification requires DoD...Learn moreCompliance 101 -
What is SOC 1 compliance?
Defined by the AICPA as the first part of the Service Organization Control series, SOC 1 addresses internal controls around financial reporting. SOC 1, 2, and 3...Learn moreCompliance 101 -
How much does ISO 27001 certification cost?
While it can be difficult to pin down a definitive cost for any compliance certification, ISO 27001 is particularly variable. Our experts recommend starting...Learn moreCompliance 101 -
How ISO 27001 Certification Works: Audit and Certification
It’s time to get ISO 27001 certified! You’ve spent time carefully designing your ISMS, defined the scope of your program, and implemented controls to...Learn moreCompliance 101