Skip to main content

Comprehensive review by third-party CPA assures Cross Media’s clients that it meets one of the mortgage industry’s strictest standards for protecting data


ROSEVILLE, MN, October 26, 2017 – Cross Media, which offers a complete mortgage CRM solution, Unify®, announced it has successfully completed a Service Organization Control (SOC) 2 Type I examination, providing Unify clients with confidence that their data is protected by one of the toughest standards that exist in the financial services industry.


In September, the accounting firm of Lurie LLP examined Cross Media’s description of its Unify CRM platform, which allows mortgage professionals to increase sales opportunities and improve efficiency by integrating multiple systems into one easy-to-use platform. On October 12, Lurie, LLP issued a report confirming Cross Media’s controls, policies and procedures meet the SOC 2 criteria for system security and confidentiality in accordance with standards set by the American Institute of Certified Public Accountants (AICPA).


“At Cross Media, nothing is more important than protecting our clients and helping them stay compliant,” said Cross Media President Scott Lidberg. “We are committed to taking every precaution to safeguard our clients’ data, including the sensitive financial information of their borrowers. The successful completion of the SOC 2 examination shows we take this issue very seriously.”


In the auditor’s opinion, the description of its Unify CRM Services System was “fairly presented, and the controls stated in the description were suitably designed to provide reasonable assurance that the criteria associated with the security principles were met.”


With so many high-profile data breaches occurring in the financial services industry, today’s lenders need confidence that their vendors are doing everything possible to protect their information, Lidberg added. “By demonstrating compliance with SOC 2 standards, companies like Cross Media can provide their clients with the confidence that key business processes are protected by the highest possible controls,” he said.