Our Thoughts On

Sort by

Categories
Authors

Cybersecurity

Articles 41 - 50 of 106

Better Understanding PCI Penetration Testing Requirements

If your company takes credit cards, you may be wondering if you are required to have a penetration test. In the past, it had been voluntary, but with PCI

What is the SEC Looking For in Your Internal Control Environment?

This Article was co-written by Nicole Saldamarco At the recent AICPA year-end conference, SEC staff members indicated that they will be looking more closely

Understanding Cyberthreats in our Energy Infrastructure

Cybercrime Motive Most cyberattacks are simply motivated by money – revenue from cybercrime has reached nearly $1.5 trillion per year. The majority

Addressing Technology Risks within the Financial Services Industry

As rapidly as technology evolves, so does the inherent risk surrounding that technology. It has now become ever so critical to ensure appropriate mitigation

Register to receive our weekly newsletter with our most recent columns and insights.

Don't Acquire the Data Breach - The Importance of Cybersecurity and Information Technology Due Diligence

Co-Authored by: Eric Fair As businesses evolve through mergers and acquisitions (M&A), the ever-changing technology landscape continues to provide
Cybersecurity, SOC
Mark Riley | 12.10.2018

SOC 2 Examinations - What Are the Trust Services Criteria and Categories?

The 2017 Trust Services Criteria (TSC), which superseded the 2016 Trust Services Principles and Criteria (TSPC), serves as the control criteria for attestation

Amazon Money Laundering Scam

An apparent fraud scheme has been uncovered that involves scammers’ use of CreateSpace, Amazon’s self-publishing service, to sell fake books

FDIC Information Technology Risk Examination (InTREx) Program Overview

The FDIC’s Information Technology Risk Examination (InTREx) Program is its current information technology and IT operations examination procedures.

Register to receive our weekly newsletter with our most recent columns and insights.

Is Your Organization Failing Password Security Management?

Security management may be implementing high-cost sophisticated measures in your organization, but it’s often the first factor of enterprise authentication

Mitigating the Risk of Cyber Attacks to Your Employee Benefit Plan

From Target to Equifax to the federal government, it seems that a new cybersecurity breach makes headlines on an almost daily basis. With all these breeches,

Register to receive our weekly newsletter with our most recent columns and insights.