Our Thoughts On

Sort by

Categories
Authors

Risk Advisory/Internal Audit

Articles 41 - 50 of 95

Will Cloud Service Providers' SOC 2 Reports Satisfy SaaS Companies' Customer Assurance Needs?

Software-as-a-Service (SaaS) companies tend to provide services that require their customers to entrust them with their sensitive data. Therefore, customers

Don't Be Lulled Into a False Sense of Security

In my journey as a cybersecurity professional, I provide a wide variety of services to an even wider variety of clients. Within those services, there is

SECURITY NOTICE: MAJOR ONLINE BANKING PLATFORM VULNERABILITY - FISERV

Businesses that utilize Fiserv eBanking platforms should take note of an online banking information disclosure vulnerability that was made public. Fiserv

Strategies for Service Organizations to Prepare for the New SOC 2 Reporting Requirements

Service Organizations that undergo a SOC 2 examination or are currently preparing to have one performed, should be aware of the recently updated requirements

Register to receive our weekly newsletter with our most recent columns and insights.

SOC 2 Reporting Standards Updated: Effective 12/15/2018

The AICPA recently updated the SOC 2 reporting standards to align with the COSO 2013 Internal Control Framework. The specific updates pertain to the updated

What Are Complementary Subservice Organization Controls And How Do They Impact SOC Reports?

Service organizations typically outsource functions such as data center hosting or transaction processing, to outside vendors, referred to as subservice

The IT Security Superhero's Guide to Good Cyber Hygiene

“Move along folks, nothing to see here!” is what I imagine stressed-out IT security crusaders worldwide murmur every night in their sleep.

Inclusive or Carve-Out: How Subservice Organizations Are Presented in SOC Reports

Service organizations typically use subservice organizations (i.e. third parties) to perform key controls that are necessary, in combination with the controls

Register to receive our weekly newsletter with our most recent columns and insights.

SOC Reporting: Vendor or Subservice Organization?

Many service organizations outsource functions of their business to third-party organizations (vendors). The functions performed by vendors may impact

The Rise of Business Email Compromise Scams

The Rise of Business Email Compromise Scams Business Email Compromise – or BEC – is an increasingly common scam targeting U.S. and European

Register to receive our weekly newsletter with our most recent columns and insights.