HETHERINGTON GROUP EARNS SYSTEM AND ORGANIZATION CONTROLS (SOC) 2 TYPE 1 ATTESTATION

Audit Signifies Hg’s Commitment to Securely Handle Clients’ Data

Hg’s Policies, Procedures, & Systems Meet Global Security Standards & AICPA Best Practices to Mitigate Information-Related Risk

 

 

Hetherington Group (Hg)—a leader in investigative due diligence, corporate intelligence, and cyber investigations—has successfully undergone an audit process and earned its System and Organization Controls (SOC) 2 Type 1 Attestation.

“Hg’s vision is to create a smarter and safer world from online predators, fraud, and exploitation,” stated Hg President Cynthia Hetherington. “Earning the SOC 2 attestation reflects our commitment to that vision. We are proud to have received this attestation signifying that we have implemented global security standards and AICPA best practices to ensure that our clients’ privacy, confidentiality, and data integrity are secure.”

A-Lign Assurance conducted the audit in accordance with the requirements of the American Institute of Certified Public Accountants (AICPA). The SOC 2 audit process is the gold standard for cybersecurity companies. The audit process assessed Hg’s policies, procedures, and systems to protect data in five Trust Services Criteria areas: Security, Availability, Processing Integrity, Confidentiality, and Privacy.

The audit included review and testing of Hg’s software (e.g., encrypted email and network access), employee knowledge and training (e.g., phishing), company procedures (e.g., passwords, off-site data protection and security), physical security (e.g., biometric locks and cameras), and security monitoring (e.g., log files, recorded data encryptions).

 

Are you an analyst or investigator looking for advanced OSINT training on risk assessment and risk monitoring? If so, check out Hg’s webinar series, where you can attend live sessions and receive CEUs or watch previously recorded sessions to beef up your investigative skills.

 

 

Are you concerned about your company’s or employees’ points of vulnerability through online and open sources? Our skilled analysts are experts at removing personal information that puts you, your business partners, and your family at risk. Learn how our team can assist you in assessing and monitoring your risks.