Our Thoughts On

Sort by

Categories
Authors

Cybersecurity

Articles 21 - 30 of 83

Don't Acquire the Data Breach - The Importance of Cybersecurity and Information Technology Due Diligence

Co-Authored by: Eric Fair As businesses evolve through mergers and acquisitions (M&A), the ever-changing technology landscape continues to provide

SOC 2 Examinations - What Are the Trust Services Criteria and Categories?

The 2017 Trust Services Criteria (TSC), which superseded the 2016 Trust Services Principles and Criteria (TSPC), serves as the control criteria for attestation

Amazon Money Laundering Scam

An apparent fraud scheme has been uncovered that involves scammers’ use of CreateSpace, Amazon’s self-publishing service, to sell fake books

FDIC Information Technology Risk Examination (InTREx) Program Overview

The FDIC’s Information Technology Risk Examination (InTREx) Program is its current information technology and IT operations examination procedures.

Register to receive our weekly newsletter with our most recent columns and insights.

Is Your Organization Failing Password Security Management?

Security management may be implementing high-cost sophisticated measures in your organization, but it’s often the first factor of enterprise authentication

Mitigating the Risk of Cyber Attacks to Your Employee Benefit Plan

From Target to Equifax to the federal government, it seems that a new cybersecurity breach makes headlines on an almost daily basis. With all these breeches,

SOC Report Refresher: What Are the Different Types of SOC Reports?

The rise of cloud computing has played a key role with businesses that outsource certain functions to service organizations. Since such organizations are

It's time to talk about your CYBER audit policy

Imagine for a moment that your organization is hit with a malicious Trojan that your office’s Information Technology (IT) staff hasn’t noticed

Register to receive our weekly newsletter with our most recent columns and insights.

Cyber Monday Growth Brings Evolving Risks for Retailers

The trees outside are turning vibrant shades of red, orange and yellow, which has retailers seeing green. As Black Friday and Cyber Monday quickly approach,

Password Spraying: Turning Brute Force Inside-Out to Crack Your Organization's Security

We have all heard of the term “brute force attack,” which refers to an attack technique in which many passwords are attempted against a single

Register to receive our weekly newsletter with our most recent columns and insights.