Our Thoughts On

Sort by

Categories
Authors

Risk Advisory/Internal Audit

Articles 101 - 110 of 154

Don't Be Lulled Into a False Sense of Security

In my journey as a cybersecurity professional, I provide a wide variety of services to an even wider variety of clients. Within those services, there is

SECURITY NOTICE: MAJOR ONLINE BANKING PLATFORM VULNERABILITY - FISERV

Businesses that utilize Fiserv eBanking platforms should take note of an online banking information disclosure vulnerability that was made public. Fiserv

Strategies for Service Organizations to Prepare for the New SOC 2 Reporting Requirements

Service Organizations that undergo a SOC 2 examination or are currently preparing to have one performed, should be aware of the recently updated requirements

SOC 2 Reporting Standards Updated: Effective 12/15/2018

The AICPA recently updated the SOC 2 reporting standards to align with the COSO 2013 Internal Control Framework. The specific updates pertain to the updated
Register to receive our weekly newsletter with our most recent columns and insights.

What Are Complementary Subservice Organization Controls And How Do They Impact SOC Reports?

Service organizations typically outsource functions such as data center hosting or transaction processing, to outside vendors, referred to as subservice

The IT Security Superhero's Guide to Good Cyber Hygiene

“Move along folks, nothing to see here!” is what I imagine stressed-out IT security crusaders worldwide murmur every night in their sleep.

Inclusive or Carve-Out: How Subservice Organizations Are Presented in SOC Reports

Service organizations typically use subservice organizations (i.e. third parties) to perform key controls that are necessary, in combination with the controls

SOC Reporting: Vendor or Subservice Organization?

Many service organizations outsource functions of their business to third-party organizations (vendors). The functions performed by vendors may impact
Register to receive our weekly newsletter with our most recent columns and insights.

The Rise of Business Email Compromise Scams

The Rise of Business Email Compromise Scams Business Email Compromise – or BEC – is an increasingly common scam targeting U.S. and European

How to Address a Modified Opinion in your SOC Report

In the event that a user obtains a System and Organization Controls (SOC) Report and sees that the service auditor has modified their opinion in some way,
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×