Back to top

Top 20 Blogs of 2020: How to Stay Compliant 101

Emily Rayers

Every industry and organization is faced with unique IT, security and compliance challenges. In addition, the need to protect data is now a critical regulatory requirement in many industries. When an organization needs to comply with government and industry regulations such as HIPAA, Sarbanes-Oxley, CCPA, GDPR and others, the IT complexities and security challenges deepen.

These requirements require best-practice security controls to protect personally identifiable information (PII) and control access to that information. Let’s take a closer look at some of these industry regulations:

  • HIPAA: The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The law has emerged into greater prominence in recent years with the proliferation of health data breaches caused by cyberattacks and ransomware attacks on health insurers and providers.
  • Sarbanes-Oxley (SOX 404): The Sarbanes-Oxley Act of 2002 represents a huge change to federal securities law. It was created as a result of the corporate financial scandals involving Enron, WorldCom and Global Crossing. Effective in 2006, all publicly traded companies are required to implement and report internal accounting controls to the SEC for compliance.
  • GDPR: The General Data Protection Regulation (GDPR) applies to any company that does business with Europe, whether they are based in the EU or not. The new regulation will give users ultimate control over their data in where it resides, the ability to export, withdraw consent, and request access to it.
  • CCPA: CCPA stands for the California Consumer Privacy Act, which is a set of privacy and personal data protection laws implemented by the State of California. The CCPA focuses primarily on the privacy and data collection aspect. The act is similar to GDPR and other implemented privacy laws.
  • PCI-DDS: PCI-DDS stands for Payment Card Industry Data Security Standard, which is the standard that all organizations, including those online, must follow when storing, processing, and transmitting a customer’s credit or debit card information. The standards were created and are maintained by the Payment Card Industry Security Standards Council.

Security Audit and Compliance: What Every Organization Needs to Know eBook

Since every business is a target for a cyberattack these days, it’s important to have to follow best practices to keep your environment and network secure. Those elements include:

  1. Implementing written policies, procedures, and standards of conduct: Organizations must develop internal policies and procedures to ensure compliance with industry regulations. These policies must be documented and regularly updated. This information will be beneficial during investigations or audits.
  2. Designating a compliance officer/committee: Compliance is complicated, and the stakes are high. It helps to have at least one person overseeing the process, with the support of an interdisciplinary compliance committee or IT ally that can provide the information and resources needed to meet compliance requirements.
  3. Conducting effective training and education: Security training is designed to increase security awareness among staff and to ensure businesses meet compliance regulations. Employees are the first and primary line of defense against security breaches. Any employee with access to a work-related computer or mobile device should undergo thorough cyber security awareness training.
  4. Developing effective lines of communication: Compliance is a group effort and must be a priority for everyone in an organization — from administrative leadership to IT departments. Annual training is not enough to ensure it’s top of mind for staff. It must be part of the culture, supported by technology.
  5. Conducting internal monitoring and auditing: Organizations should conduct self-audits to assess how well they’re meeting compliance standards and identify gaps in their Administrative, Technical, and Physical safeguards. Following the assessment, businesses should implement a risk-prioritized, comprehensive management plan with a number of security protocols.
  6. Responding promptly to detected offenses and taking corrective action: Organizations must have a documented breach notification process that explains how data breaches will be reported to the necessary parties, and what needs to be done to quickly enact a business continuity or disaster recovery plan.

The best security procedures don’t help if they aren’t properly followed. A Security Risk Assessment identifies the key security controls in your network. The SRA is the critical first step in determining what security investments will yield the most cost effective return.

Logically can survey your environment for compliance with common protocols, offering solutions as needed to meet required standards. Logically has a full-time team of Security, Audit, and Compliance experts that conduct security audits, penetration tests, and social engineering experiments. The security landscape is always changing, and our defense strategies should change with it.

For more information on our security solutions, contact us today.