Our Thoughts On

Sort by

Categories
Authors

Technology

Articles 1 - 10 of 92

Data and Technology Research Project Spotlight

In light of the ever-increasing use of technology-based tools by auditors and preparers, the Public Company Accounting Oversight Board (PCAOB) on May 12
Audit, SOC, Technology
Troy Fine | 4.17.2020

Amazon Web Services (AWS) Best Practices For a Successful SOC 2 Examination

For Software as a Service (SaaS) companies operating in Amazon Web Services’ (AWS) cloud environment, there are a number of AWS best practices that

Zoom ... Goes the Dynamite!

With the world muddled in lockdowns and relying more and more on remote workspaces, workplace communication tools have become all the rage. Segment leaders

Virtual NFL Draft is Raising Teleconferencing Security Concerns

NFL commissioner Roger Goodell notified every team that the 2020 NFL Draft will be held virtually due to continued concerns over the COVID-19 pandemic.

Register to receive our weekly newsletter with our most recent columns and insights.

SOC 2 + HITRUST vs. HITRUST Certified CSF reports - the Fundamentals

The System and Organization Control (SOC) 2 Type II report is performed for service companies by CPA firms to attest to the design and operating effectiveness

Technology Amid COVID-19

Data analytics is being used in a big way to track and monitor COVID-19. It’s being used to assist businesses worldwide as they face decisions regarding

TaxCaddy and Emerging Mobile Tax App Competition

It’s nearly impossible to watch a live sporting event on TV this time of year and not see an ad for a tax preparation tool like TurboTax or the offering

Brian Krebs Sheds Light on Cybercrime at Pittsburgh’s Premiere Cybersecurity Event

On December 9, 2019, I was honored to represent the Pittsburgh Chapter of ISACA and Schneider Downs as the leader of Pittsburgh’s Information Security

Register to receive our weekly newsletter with our most recent columns and insights.

Seeing is Believing. The Benefits of Data Visualization.

Every day, companies collect massive amounts of data, including information regarding website traffic, customer inquiries, or sales data. With all this

Teach a Man to Phish: Six Common Elements of Phishing Scam and How to Spot Them

Sensationalist headlines about cybersecurity incidents have become the norm. Sadly, so too have clever email phishing scams. A recent notice issued by

Register to receive our weekly newsletter with our most recent columns and insights.