Our Thoughts On Archive

Sort by

Categories
Authors

Risk Advisory/Internal Audit

Articles 91 - 100 of 147

Cyber Monday Growth Brings Evolving Risks for Retailers

The trees outside are turning vibrant shades of red, orange and yellow, which has retailers seeing green. As Black Friday and Cyber Monday quickly approach,

Phishing, Don't Take the Bait!

We’ve all heard about phishing by now. It’s the attack vector of choice for many hackers – in which the weapon used is a simple email.

Will Cloud Service Providers' SOC 2 Reports Satisfy SaaS Companies' Customer Assurance Needs?

Software-as-a-Service (SaaS) companies tend to provide services that require their customers to entrust them with their sensitive data. Therefore, customers

Don't Be Lulled Into a False Sense of Security

In my journey as a cybersecurity professional, I provide a wide variety of services to an even wider variety of clients. Within those services, there is
Register to receive our weekly newsletter with our most recent columns and insights.

SECURITY NOTICE: MAJOR ONLINE BANKING PLATFORM VULNERABILITY - FISERV

Businesses that utilize Fiserv eBanking platforms should take note of an online banking information disclosure vulnerability that was made public. Fiserv

Strategies for Service Organizations to Prepare for the New SOC 2 Reporting Requirements

Service Organizations that undergo a SOC 2 examination or are currently preparing to have one performed, should be aware of the recently updated requirements

SOC 2 Reporting Standards Updated: Effective 12/15/2018

The AICPA recently updated the SOC 2 reporting standards to align with the COSO 2013 Internal Control Framework. The specific updates pertain to the updated

What Are Complementary Subservice Organization Controls And How Do They Impact SOC Reports?

Service organizations typically outsource functions such as data center hosting or transaction processing, to outside vendors, referred to as subservice
Register to receive our weekly newsletter with our most recent columns and insights.

The IT Security Superhero's Guide to Good Cyber Hygiene

“Move along folks, nothing to see here!” is what I imagine stressed-out IT security crusaders worldwide murmur every night in their sleep.

Inclusive or Carve-Out: How Subservice Organizations Are Presented in SOC Reports

Service organizations typically use subservice organizations (i.e. third parties) to perform key controls that are necessary, in combination with the controls
Register to receive our weekly newsletter with our most recent columns and insights.

contact us

Pittsburgh