Our Thoughts On Archive

Sort by

Categories
Authors

Cybersecurity

Articles 101 - 110 of 273

Microsoft Officially Introduces Windows 11

Learn about Windows 11, the first Windows update from Microsoft to their flagship operating system since 2015.

What Evidence Is Requested During SOC 2 Audits?

What kind of evidence is requested during SOC 2 audits? Find out in our latest article from Schneider Downs' Troy Fine.

What is a SOC 3 Report?

Schneider Downs' Troy Fine explains what a SOC 3 report is and how to know if your organization needs one.

How to Incorporate Cybersecurity in a SOX Framework

Learn more about better protecting your financial applications by incorporating cybersecurity into a Sarbanes-Oxley security framework for prevention, detection, and corrective controls.
Register to receive our weekly newsletter with our most recent columns and insights.

US Lawmakers Look to Set Federal Cyber Breach Alert Standard

Learn about the proposed federal legislation requiring companies to notify the U.S. Government within 24 hours of a cybersecurity breach.

How To Scope a SOC 2 Audit

How do you properly scope your SOC 2 audit? Find out in Troy Fine's latest article.

Do I Need a SOC 2 Type 1 Before a SOC 2 Type 2?

Schneider Downs' Troy Fine discusses if you need to perform a SOC 2 Type 1 audit before a SOC 2 Type 2 audit.

What Financial Institutions Need to Know About R-SAT

Learn about how the R-SAT can help financial institutions measure their ability to mitigate the possibility of a ransomware attack.
Register to receive our weekly newsletter with our most recent columns and insights.

Why Do CPA Firms Perform SOC 2 Audits?

Learn why CPA firms perform SOC 2 audits and factors to consider when searching for a SOC 2 partner.
Schneider Downs' Troy Fine breaks down some of the common misconceptions about SOC 2 audits.
Register to receive our weekly newsletter with our most recent columns and insights.

contact us

Pittsburgh