Security Posture Best Practices
-
SOC 2: Year Two Security Tasks
You can set the frequency of these reviews, but we recommend conducting them at least quart...
-
Device Monitoring in Vanta
What is device monitoring? To build a strong security and compliance foundation, organizati...
-
Background Checks in Vanta
What are background checks? A background check is a process through which employers leverag...
-
Frequently Asked Questions: Audits
What is the difference between a Type 1 vs a Type 2 audit? A SOC 2 Type I report evaluates...
-
Missing information on Access Page for HubSpot
Administrators may notice that the Role, MFA, Created, and Deactivated columns have a '-' r...
-
Vanta Guide to SOC 2: Type I & Type II
My company is getting a SOC 2. But how do we decide between a SOC 2 Type I or Type II? Con...
-
Using Groups
With Vanta, the default security requirements can be changed for all users or a subset of e...
-
Getting Started with ISMS 11: Statement of Applicability
The statement of applicability (SoA) connects risk assessment and risk treatment in an orga...
-
Turning on Microsoft Defender Antivirus
Type Windows Security in the taskbar search window Click on Virus & Threat protect...
-
Encrypting Your Computer Hard Drives
Encryption helps protect data on a device, ensuring that it can only be accessed by authori...
-
Understanding Policies
Policy generation involves formulating and implementing organizational rules, particularly ...
-
Security Awareness Trainings
Regular security and privacy awareness training helps employees stay informed about their c...
-
Configure Screen Lock on MacOS Devices
When passing screen-lock tests, the Vanta agent looks at a device's user profile settings t...
-
Configure Screen Lock on Windows Devices
When passing screen-lock tests, the Vanta agent looks at a device's user profile settin...