4 cloud security myths | Project Hosts

In 2022, it’s rare for an organization not to leverage cloud computing in some capacity.  However, there are still trepidations when it comes to security, and not without good reason. Although eager to reap the benefits of cloud technology, healthcare providers and government agencies need to consider how a cloud migration might affect the sensitive…

Read more

What is Compliance Inheritance?

  Achieving and maintaining compliance is a difficult undertaking for any organization, especially when you’re talking about cloud security. In the aftermath of landmark data breaches like the SolarWinds hack, businesses, regulators and consumers alike are holding information security systems to a higher standard. The only problem? Compliance is a daunting task. Fortunately, compliance inheritance…

Read more

Project Hosts has been Awarded Status StateRAMP Authorized

The StateRAMP Project Management Office (PMO) and the StateRAMP Approvals Committee (SAC) have completed the 2022 assessment of the Project Hosts Federal Private Cloud security authorization package. Based on the security categorization of Moderate and the security package documentation in the StateRAMP Documentation Repository, the StateRAMP PMO and the SAC have determined that Project Hosts…

Read more

Compliance is Evidence of IT Security

  As a company that is not currently mandated to be compliant with designated cybersecurity frameworks, it may seem superfluous to invest time and money into gaining compliance with the regulations of your field. With standards at varying levels of security, from FedRAMP to StateRAMP, HITRUST, and more, compliance is looked at by many security…

Read more

StateRAMP Announces its First Authorized Vendor List (AVL)

Founded at the beginning of 2020, StateRAMP was born from the clear need for a standardized approach to the cybersecurity standards required from service providers offering solutions to state and local governments. StateRAMP is a membership organization comprised of service providers offering IaaS, PaaS, and/or SaaS solutions, third-party assessment organizations, and government officials. Our members…

Read more

The Importance of Compliance to Cybersecurity

Incidents of cloud systems having their data stolen, held hostage, leaked, or destroyed are accelerating.  2019 data breaches include: Quest Diagnostics: medical, financial, and personal information for 11.9 million subscribers Capital One: credit card information for 100 million subscribers Zynga: Personal information and Facebook IDs for 218 million subscribers In addition to these large incidents,…

Read more

Outsource Your Security Compliance Needs to Grow Your Business

How your Organization can benefit from outsourcing your Security Compliance needs Today there are countless standards, mandates, laws and regulations that organizations are required to adhere to depending on what industry you are selling your application to. With all of the compliance requirements and the ever shifting IT landscape, it is certainly challenging – if…

Read more