Blog
Page 86 of 152
PCAOB Alert on Audits, External Data
This article first appeared on radicalcompliance.com October 11th, 2021 The PCAOB published fresh guidance last week about how auditors should handle evidence supplied by others to help the auditor assess financial statements, important performance or valuation metrics, and, well, all the other stuff that can go into an audit report these days. The guidance is […]
October 25, 2021
Steps to Performing Your SOX Risk Assessment
Companies around the world have experienced tremendous changes. For publicly traded companies, those changes can bring new considerations into the frame for your Sarbanes-Oxley risk assessment. Shifts in strategy plans and a new remote, paperless way of operations could require major updates in your SOX compliance program. In this post we’ll discuss Sarbanes-Oxley in detail […]
What is Network Security?
Organizations rely on an internal network infrastructure to optimize processes and scale up operations in today’s globalized world. Still, networks can pose many risks for businesses, which face proliferating cybersecurity threats and new vulnerabilities that threaten the security of their systems. Network security is the set of tools and technologies that protect the company’s network’s […]
What is Cloud Cryptography & How Does it Work?
Cloud computing allows an organization to use IT services delivered via the internet instead of maintaining your own physical servers. Popular cloud computing services include Amazon Web Services (AWS) Microsoft Azure and Google Cloud. As with any IT service, however, you’ll need to assure the best data security protocols. Cloud computing services are subject to […]
October 21, 2021
How do I select a GRC solution for my business?
Excerpt from article originally posted on HelpNetSecurity by Michael Maggio, EVP of Product The pandemic accelerated the need for risk management strategies, as it exposed gaps in many GRC programs. Today’s GRC solutions provide content and tools to assess, manage and monitor compliance and risk. Here are 3 key considerations when selecting a GRC solution: […]
How to Create a Data-Centric Security Model
Information security used to revolve around securing the locations where sensitive data was stored. Now, with the rise of cloud computing, data can be stored and transferred in an infinite number of ways — making it nearly impossible to protect against data breaches for every single device. The best solution for modern times, then, is […]
October 20, 2021
How to Upgrade Your Cyber Risk Management Program With NIST
USE THIS CHECKLIST TO GET PREPARED There are many aspects to consider when looking to elevate your cybersecurity program. One consideration is which compliance framework to use. Some, like SOC 2, provide a great starting point, but don’t have the granularity or stringency for organizations looking for a more mature, robust cybersecurity program. NIST provides […]
October 18, 2021
Public vs. Private Cloud Security: What’s the Difference?
Security in cloud computing is often a major concern among cloud customers, mainly because of the risk of losing sensitive data and the difficulties of enforcing the organization’s security policies. Despite cloud computing’s potential efficiency for storing and exchanging files, cloud security remains questionable. According to one report from Statista, 81 percent of respondents found […]
October 15, 2021
How to Manage Risk With Internal Control Monitoring
How to Manage Risk With Internal Control Monitoring Key Takeaway: Internal control monitoring involves ongoing evaluations to determine whether controls operate as intended. The five COSO components—control environment, risk assessment, control activities, information and communication, and monitoring—are used to achieve strategic, operating, compliance, and reporting objectives. Quick Navigation Key Terms Internal Control Monitoring: Ongoing evaluations […]
October 14, 2021
Security vs. Compliance: Understanding the Differences
As cyberattacks continue to proliferate, it’s clear that organizations must be prepared from both cybersecurity and compliance standpoints. It’s critical, however, to understand that while data security and compliance are both important for risk management and the prevention and mitigation of cyber attacks, the two concepts are definitely not the same. Data security, or IT […]
Page 86 of 152