Our Thoughts On

Sort by

Categories
Authors

IT Risk Advisory

Articles 1 - 10 of 54

8 Key Considerations When Reviewing User Access

Learn about key considerations when reviewing user access.

SOC 2 Terminology: Vendor vs Subservice Organization vs Subcontractor vs Third Party vs Nth Party

Learn the difference between vendors, subservice organizations, subcontractors, third parties and nth parties in SOC reports.

Did Poor Change Management Contribute to the AT&T Wireless and McDonald’s Outages?

Learn how poor change management may have played a role in the recent AT&T Wireless and McDonald outages.

Allegheny County Marriage License Data Leak May Affect Recent Newlyweds

Learn more about the website glitch that may have exposed thousands of Allegheny County married couples’ data.
Register to receive our weekly newsletter with our most recent columns and insights.

Subservice Organizations: Their Role and Impact on Your SOC Report

Learn about the importance of understanding the role of subservice organizations in SOC reports.

PCI DSS v4.0 is Here…Are You Ready?

Learn more about the key changes, requirements and timeline for PCI DSS v4.0.

IPE 101 – Assessing Management IPE Controls and Report Risks

Learn more about assessing management's IPE controls and report risks.

IPE 101 – Differentiating Populations and Key Reports

Learn more about the two primary categories of information produced by entity in SOX testing.
Register to receive our weekly newsletter with our most recent columns and insights.

IPE 101 – Defining and Understanding Information Produced by Entity

Learn more about the importance of IPE completeness and accuracy in SOX testing.

Get the Low Down Before You Download: Exploring the Temu App’s Security Risks

Learn more about the privacy risks associated with the Temu mobile app.
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×