Services
Services
SOC & Attestations
SOC & Attestations
Payment Card Assessments
Payment Card Assessments
ISO Certifications
ISO Certifications
Privacy Assessments
Privacy Assessments
Federal Assessments
Federal Assessments
Healthcare Assessments
Healthcare Assessments
Penetration Testing
Penetration Testing
Targeted Security Assessments
Targeted Security Assessments
Crypto and Digital Trust
Crypto and Digital Trust
Schellman Training
Schellman Training
Industry Solutions
Industry Solutions
Cloud Computing & Data Centers
Cloud Computing & Data Centers
Financial Services & Fintech
Financial Services & Fintech
Healthcare
Healthcare
Payment Card Processing
Payment Card Processing
US Government
US Government
Learning Center
Learning Center
Articles
Articles
Whitepapers
Whitepapers
Case Studies
Case Studies
Events & Live Webinars
Events & Live Webinars
On-Demand Webinars
On-Demand Webinars
About Us
About Us
Leadership Team
Leadership Team
Careers
Careers
Corporate Social Responsibility
Corporate Social Responsibility

Blog

The Schellman Blog

Stay up to date with the latest compliance news from the Schellman blog.

Blog Feature

Compliance and Certification | Assurance / Service Audits | information security

By: RYAN BUCKNER
September 8th, 2022

Whether it’s shoes, real estate, or the latest smartphone, everyone’s always looking for a bargain. A central component of any decision you make to purchase or not purchase a good or service is the cost. It’s a little easier to determine that number when you’re buying (or not buying) a good because it’s generally the sticker price and, barring any lemony outliers, the thing does what you need it to.

Blog Feature

Compliance and Certification | Assurance / Service Audits

By: Todd Busswitz
May 5th, 2022

The famous French fashionista Coco Chanel once said, “don’t spend time beating on a wall, hoping to transform it into a door.”

Blog Feature

Compliance and Certification | ISO 27001 / 27002 | information security

By: RYAN MACKIE
February 17th, 2022

In the context of the U.K. education system, “revision” is sometimes defined as the act of reviewing material to ensure retention and updating with new information where necessary.

Blog Feature

Security | Compliance and Certification | ISO 27001

By: JORDAN HICKS
January 20th, 2022

For the hiking enthusiast, Colorado has a lot to offer–lots of peaks to climb of varying heights to suit athletes with different skill sets.

Blog Feature

Compliance and Certification | Federal | CMMC

By: Douglas Barbin
January 13th, 2022

The Belgian writer and painter Erik Pevernagie once said that “without a clear-cut vision and a proper reading of the roadmap we may not reach the buoyant shores of the horizon.”

Blog Feature

Compliance and Certification | Education

By: DEBBIE ZALLER
October 25th, 2016

Your customers and potential customers share data with you every day. Whether it’s an email address or more in-depth information like a shipping address or credit card information, they expect you to protect what they share.

Blog Feature

Security | Compliance and Certification

By: SARA VAN SPRONSON
August 30th, 2016

Originally published at www.iapp.org In the wake of several major data security breaches and increasing regulatory pressure on companies to protect confidential information, building an effective privacy program is crucial. Privacy practices are rapidly developing in all sectors and industries, and while non-compliance with the numerous industry, state, federal, and international regulations can cut heavily into profit margins, the effects of a data security breach can kill relationships with customers, vendors, and even stakeholders. According to the Federal Trade Commission, an effective privacy program “addresses the privacy risks related to the development and management of new and existing products and services for consumers; and protects the privacy and confidentiality of personal information.”

Blog Feature

Compliance and Certification | Education

By: DEBBIE ZALLER
August 4th, 2016

Identifying changes that must be made is the easy part. Managing those changes successfully—not so simple! Organizations today need to be extraordinary at adapting to or influencing changes in technology, policy, and procedure. Those who adjust well aren’t phased by the fast pace of the market or the constant evolutions in technology and security standards. Those who struggle with change constantly operate in a reactive state, and fail to properly strategize their business moves.