Our Thoughts On

Sort by

Categories
Authors

Cybersecurity

Articles 101 - 110 of 273

Microsoft Officially Introduces Windows 11

Learn about Windows 11, the first Windows update from Microsoft to their flagship operating system since 2015.

What Evidence Is Requested During SOC 2 Audits?

What kind of evidence is requested during SOC 2 audits? Find out in our latest article from Schneider Downs' Troy Fine.

What is a SOC 3 Report?

Schneider Downs' Troy Fine explains what a SOC 3 report is and how to know if your organization needs one.

US Lawmakers Look to Set Federal Cyber Breach Alert Standard

Learn about the proposed federal legislation requiring companies to notify the U.S. Government within 24 hours of a cybersecurity breach.
Register to receive our weekly newsletter with our most recent columns and insights.

How to Incorporate Cybersecurity in a SOX Framework

Learn more about better protecting your financial applications by incorporating cybersecurity into a Sarbanes-Oxley security framework for prevention, detection, and corrective controls.

How To Scope a SOC 2 Audit

How do you properly scope your SOC 2 audit? Find out in Troy Fine's latest article.

Do I Need a SOC 2 Type 1 Before a SOC 2 Type 2?

Schneider Downs' Troy Fine discusses if you need to perform a SOC 2 Type 1 audit before a SOC 2 Type 2 audit.

Why Do CPA Firms Perform SOC 2 Audits?

Learn why CPA firms perform SOC 2 audits and factors to consider when searching for a SOC 2 partner.
Register to receive our weekly newsletter with our most recent columns and insights.

What Financial Institutions Need to Know About R-SAT

Learn about how the R-SAT can help financial institutions measure their ability to mitigate the possibility of a ransomware attack.
Schneider Downs' Troy Fine breaks down some of the common misconceptions about SOC 2 audits.
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×