Hosting, a pioneer in cloud computing and database services since 1997, has achieved an extraordinary status in its industry by completing a series of five data security examinations, including the Service Organisation Controls (SOC) 1 and 2, HITRUST for healthcare, Payment Card Industry (PCI) standard of compliance, and penetration testing.

The rigorous third-party examinations that led to compliance with the demanding series of data security standards were administered by the professional IT compliance and audit staff at 360 Advanced, a national HITRUST CSF, Qualified Security Assessor, and Certified Public Accountant firm based in St. Petersburg, FL.

Data security standards

HOSTING is working toward achieving the new GDPR requirements, in addition to ISO 27001 and ISO 27018It is essential that HOSTING exceed the data security standards required by our clients, regulatory bodies, and the industry itself,” said Chris Riley, Chief Information security Officer at HOSTING. “Acting as an extension of our client's business, it is absolutely imperative that we align those three critical elements to do what it takes to achieve and maintain unconditional, impenetrable data security.”

Riley explained that because HOSTING offers data security as a service for its clients, the firm must understand implementation on a variety of frameworks, and be aware of the levels of effort required to build an IT/data security model that is sustainable. “We take steps to make certain that data security is carried through the entire life cycle of the business,” Riley said.

Michael Lerro, Compliance Manager at HOSTING, said the security compliance achievements are industry standards today and are not optional. In fact, HOSTING is working toward achieving the tough new General Data Protection Regulation (GDPR) requirements, in addition to driving toward ISO 27001 and ISO 27018.

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?