Our Thoughts On

Sort by

Categories
Authors

Risk Advisory/Internal Audit

Articles 31 - 40 of 95

Part One in a Series: Managing Risks of Technologies Emerging as Business Opportunities - Websites and Mobile Applications

Websites and mobile applications are an important medium for businesses to interact with customers, obtain information, and conduct business transactions.
Many have heard about the French data regulator CNIL imposing a $57 million (€50 million) fine on Google for violating the General Data Protection

SOC 2 Reports: Common Control Exceptions and How to Avoid Them

In performing SOC 2 examinations, we often come across the same types of control exceptions. To assist organizations with avoiding these exceptions, we’ve

SAP S/4HANA Security and Project Challenges

Organizations need to be aware of the SAP S/4HANA security challenges as they prepare for the year 2025 SAP deadline for converting SAP ECC and other older

Register to receive our weekly newsletter with our most recent columns and insights.

Addressing Technology Risks within the Financial Services Industry

As rapidly as technology evolves, so does the inherent risk surrounding that technology. It has now become ever so critical to ensure appropriate mitigation

FDIC Information Technology Risk Examination (InTREx) Program Overview

The FDIC’s Information Technology Risk Examination (InTREx) Program is its current information technology and IT operations examination procedures.

What You Need to Know About the Ohio Data Protection Act

What Is the Ohio Data Protection Act? On August 3, 2018, Ohio Governor John Kasich signed the Ohio Data Protection Act (“the Act”) into law.

Is Your Organization Failing Password Security Management?

Security management may be implementing high-cost sophisticated measures in your organization, but it’s often the first factor of enterprise authentication

Register to receive our weekly newsletter with our most recent columns and insights.

Cyber Monday Growth Brings Evolving Risks for Retailers

The trees outside are turning vibrant shades of red, orange and yellow, which has retailers seeing green. As Black Friday and Cyber Monday quickly approach,

Phishing, Don't Take the Bait!

We’ve all heard about phishing by now. It’s the attack vector of choice for many hackers – in which the weapon used is a simple email.

Register to receive our weekly newsletter with our most recent columns and insights.