blog /
Best Practices when Creating a Business Continuity Policy

Best Practices when Creating a Business Continuity Policy

A Business Continuity Policy is critical to your information security program & defines the critical steps your employees need to take after a disaster.
Information Security Policy | Best Practices

Information Security Policy | Best Practices

It’s important to keep your Information Security Policy high level. Here are some key points your information security policy should include.
4 Important Considerations When Writing Your Cyber Risk Management Policy

4 Important Considerations When Writing Your Cyber Risk Management Policy

The cyber risk management policy answers this question: “What is our risk management philosophy and methodology based on our landscape?”
Data Classification Policy | Best Practices

Data Classification Policy | Best Practices

A data classification policy provides a way to ensure sensitive information is handled according to the risk it poses to the organization.
SOC 2 Confidentiality Policy Best Practices

SOC 2 Confidentiality Policy Best Practices

Your SOC 2 confidentiality policy defines procedures to handle confidential information about clients, partners, and the company. Clients and partners expect you to keep their data secure and a confidentiality policy will demand this same expectation of your employees.Here are best practices to consider when writing your confidentiality policy
How To Stay SOC 2 Compliant | Advice For This Year's Audit

How To Stay SOC 2 Compliant | Advice For This Year's Audit

It’s safe to say that not many service providers look forward to soc 2 compliance. I'd guess not many of you have the AICPA on speed dial. Whether you're preparing for a Type 1 or Type 2, audits may be perceived as events that you prepare for and complete, but then eventually they go away - at least for a while.
SOC 2 Type 2 Guide | Everything You Need To Know

SOC 2 Type 2 Guide | Everything You Need To Know

There are several different levels of SOC (Service Organization Control) reports and types, so it is easy to get them confused. This post will focus on outlining the path to SOC 2 Type 2.
How To Speed Up A SOC 2 Audit by Narrowing Your SOC 2 Scope

How To Speed Up A SOC 2 Audit by Narrowing Your SOC 2 Scope

Ways to narrow your SOC 2 audit scope to save your company time and money so you receive your SOC 2 report with fewer migraines.
SOC 2 Team | Learn To Define Roles & Responsibilities

SOC 2 Team | Learn To Define Roles & Responsibilities

Understand who is on your core SOC 2 team, what are the roles, and how to build it.
Risky Business Podcast - Soap Box | Justin McCarthy

Risky Business Podcast - Soap Box | Justin McCarthy

Listen to this episode here! About This Episode‍ strongDM Co-Founder and CTO Justin McCarthy sits down with Risky Business podcast host Patrick to discuss the strongDM technology, working from home in the current conditions, and making sure that companies have access controls in place while ...
SOC 2 Certification Cost | A Guide Budgeting For SOC 2

SOC 2 Certification Cost | A Guide Budgeting For SOC 2

Our SOC 2 cost estimate is $147,000 all-in but let's dig into each cost center to understand where the unexpected costs are.
SOC 2 Type 1 Guide | Everything You Need To Know

SOC 2 Type 1 Guide | Everything You Need To Know

SOC 2 Type 1 report assesses the design of security processes at a specific point in time, while a Type 2 report assesses how effective those controls are over time by observing operations for six months.
Why We Built Comply | Free SOC 2 Policy Templates

Why We Built Comply | Free SOC 2 Policy Templates

We've open sourced all our SOC 2 policy templates so fellow startups can easily adopt for free.
Infrastructure access app UI
Connect your first server or database in 5 minutes. No kidding.