FILTER
InfoSec Best Practices
IT Employee Offboarding Checklist
Employee offboarding is difficulty time. Along with the implications to emotions and morale, you’ll...
READ MORE
How to Conduct User Access Review
User Access Review This week’s control is on user access review. Jose Costa (CISO at Tugboat Logic) and...
READ MORE
4 Reasons Why You Should Get SOC 2 Now
These 4 reasons sum up why you should get your SOC 2 now: 1) customers will ask for it, 2) it's a competitive...
READ MORE
Security Controls Explained: Access Control
Tugboat Logic's explainer on access control for SOC 2 audits gives you three easy-to-remember pointers and...
READ MORE
The Top 3 Things That Will Delay Your SOC 2
These 3 things will delay your SOC 2: risk assessments, penetration tests, and internal security audits....
READ MORE
SOC 2 and ISO 27001 Risk Assessment
Tugboat Logic's explainer on risk assessments for SOC 2 and ISO 27001 teaches you how to conduct risk...
READ MORE
The 3 Security and Compliance Trends for 2020
Here are the top three security and compliance trends for 2020 Tugboat Logic has gathered from their...
READ MORE
How to Extend Your Security to Customers
The fourth (and final) part of Tugboat Logic's security best practices guide provides recommendations on...
READ MORE
Secure Coding Best Practices
Part 3 of the security best practices guide teaches you how to conduct internal security tests using three...
READ MORE
Operational Security Best Practices for Startups: People, Process and Technology
Part 1 of the security best practices guide teaches you how to foster a blameless security culture, extend...
READ MORE
Application and Infrastructure Security Best Practices
Part 2 of the security best practices guide gives you a basics checklist (e.g. set up HTTPs, keep backups of...
READ MORE
Security Controls, Explained: Third-Party Risk Management for SOC 2 and ISO 27001
Tugboat Logic's explainer on third-party risk management shows why the vendor management security control for...
READ MORE