Our Thoughts On

Sort by

Categories
Authors

Bill Deller

Articles 1 - 10 of 13

SOC 2 - What is ACTUALLY required?

Learn about some of the most common misconceptions about SOC 2 reports.

A First of Its Kind: The $25 Million Deepfake Scam

Learn how scammers used a deepfake attack to steal more than $25 million from a multinational firm.

Prevention and Detection – Key Methods to Protect Against Identity Fraud

Learn the key methods to prevent and detect identity fraud before it happens to you.

Top 5 Identity Fraud Schemes of 2023

Learn about the top identity fraud schemes of 2023 and how to detect fraud before it happens to you.
Register to receive our weekly newsletter with our most recent columns and insights.

Identity Theft vs. Identity Fraud – What’s the Difference?

Learn about the distinction between identity theft and identity fraud and why it matters.

20 Pre-Contract Questions To Ask Your Next SOC 2 Audit Firm

Review some of the top questions to ask prospective audit firms before signing for a SOC 2 audit.

The Top Ten Most Common SOC 2 Exceptions

Learn about the most common SOC 2 exceptions the Schneider Downs team have encountered.

Proposed Interagency Guidance on Third-Party Risk Management

Learn about the new jointly proposed guidance on Third Party Risk Management from the OCC, FDIC and Board of Governors of the Federal Reserve System.
Register to receive our weekly newsletter with our most recent columns and insights.

Secrets Revealed: What Your Third Party Auditors Don’t Want You to Know

Learn about the most important considerations to make when working with third-party IT auditors for IT security.

Blackbaud Breach Alert!

Learn more about the Blackbaud ransomware attack that occurred in May 2020 and what measures can be taken to keep data safe.
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×