Knowledge

Articles by tag "soc"

8/8/2024 Compliance

Digital Edge Has Achieved The Prestigious SOC 2 Certification

Exciting News!

We are thrilled to announce that Digital Edge has achieved the prestigious SOC 2 certification! This milestone underscores our unwavering commitment to the highest standards of cybersecurity, IT compliance, and service excellence.

Why SOC 2 Matters: SOC 2 (Service Organization Control 2) certification is a rigorous standard that evaluates the effectiveness of an organization's controls related to security, availability, processing integrity, confidentiality, and privacy of customer data. Achieving this certification demonstrates our dedication to maintaining robust data security and providing our clients with the utmost confidence in our services.

What This Means for Our Clients: With our SOC 2 certification, clients can rest assured that Digital Edge operates with the highest level of integrity and security. Our comprehensive NOC/SOC services are now backed by this significant endorsement, ensuring that we meet and exceed industry standards for protecting sensitive information and delivering reliable IT compliance solutions.

Thank You! This accomplishment would not have been possible without the hard work and dedication of our incredible team. Your relentless pursuit of excellence and commitment to best practices have made this achievement a reality.

Join Us on Our Journey: Stay tuned as we continue to innovate and elevate our services, always with the goal of providing top-tier cybersecurity and IT compliance solutions. Thank you to our clients, partners, and supporters for your trust and confidence in Digital Edge.

 
 

2/14/2024 Presentations

Digital Edge SOC Overview

5/28/2017 Newsletters

Unintentional Damage - Warning About Possible Information Disclosure

Traffic analytical tools can cause unintentional sensitive information disclosure.  

Most of precisely targeted attacks on IT infrastructures are originated from outside of security perimeters of the victimized organizations. However, the security openings allowing cyber attackers to breach security mechanisms overwhelmingly originated either with unintentional help of insiders or disclosure of sensitive information. 

Read more on this subject and how the Digital Edge Security Team helps clients mitigate or prevent these risks.

12/20/2016 Newsletters

Yahoo Account Data Breach

Following a 500 million user account data breach in September, Yahoo has just announced that they have once again suffered another breach of an estimated one billion accounts. Yahoo disclosed in November, that the company was provided with data files from law enforcement claiming to be Yahoo user data. Outside forensic experts, in conjunction with Yahoo, have determined that it is in fact Yahoo user data, that was obtained by an unauthorized third party in August of 2013. The party responsible for the intrusion has not yet been able to be identified. This incident has been diagnosed to be separate from the incident in September 2016. 

Yahoo believes that the information that was stolen consists of full names, email addresses, dates of birth, phone numbers, hashed passwords, and possibly security questions and answers as well. Luckily, Yahoo does not store credit card or any other payment information in the system that was affected.

Currently, Yahoo is identifying and notifying potentially affected users and instructing them to change passwords immediately. Additionally, Yahoo is removing all unencrypted security questions and answers from affected users so that hackers cannot use those answers to break into users accounts. 

As 2016 comes to a close, it seems to appear to be the “Year of the Breach” with reports of eight major breaches involving well-known companies. Obtaining large amounts of data is key for these hackers, so companies most vulnerable are those which hold a large amount of personal data on their customers, including Social Security numbers, birthdates, home addresses and even medical records. 

Digital Edge’s Security Operation Center (SOC) protects your organization’s intellectual property and sensitive data. Digital security threats are real and it is better to be able to detect and respond to them as quickly as possible. It is difficult for organizations without a comprehensive incident-handling capability to create a proactive SOC team. These capabilities have to include tools and processes that enable centralized security threat visibility, instant alerting, and efficient troubleshooting. Digital Edge’s SOC is ready to deliver those capabilities and provide security coverage for your organization today. 

For more information on this new Yahoo hack, and tips to help keep your password safe and secure, please click here.