Our Thoughts On Archive

Sort by

Categories
Authors

Risk Advisory/Internal Audit

Articles 111 - 120 of 147

NIST Releases Final Draft Publication to Assist in Assessing Compliance with NIST SP 800-171

Background As of December 31, 2017, all Department of Defense (DoD) contractors that process, store or transmit Controlled Unclassified Information (CUI)

GDPR: Common Myths and Truths Revealed

The General Data Protection Regulation (GDPR) has been a hot topic of conversation since being adopted in April 2016. The new regulation changes how companies

Passphrases and Other Password Protection Strategies

Building a reputation for sound data privacy and robust security is challenging for many organizations in this digital age, especially those in the financial

Late To Comply with GDPR? Here Are Three Steps to Take Right Now.

Background The European Union’s (EU) General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. The regulation is specific to the
Register to receive our weekly newsletter with our most recent columns and insights.

Proposed Revision of Criteria for a Description of a Service Organization's System in a SOC 2 Report

The system description of an SOC 2 report is the area in which the service organization details the system that is being assessed and the risks that are

Equifax Data Breach - How to Protect Your Organization and its Sensitive Data

Last week, credit reporting bureau Equifax reported that personal data belonging to approximately 143 million U.S. consumers was compromised in a massive

AICPA releases SOC for Cybersecurity Examination Guidelines

The AICPA has recently published a reporting framework for CPA firms to perform an assessment of an organization’s cybersecurity risk management

Preparing for the General Data Protection Regulation (GDPR)

History and Overview The European Union (EU) introduced its data protection standard 20 years ago through the Data Protection Directive 95/46/EC. Since
Register to receive our weekly newsletter with our most recent columns and insights.

Petya or NotPetya, That Isn't the Question

A slightly new strain of malware, dubbed “Petya”, has been making its rounds on the internet recently and it has even hit close to home here

Root Cause Analysis and the 5 Whys to Eradicate Issues

What happens in your organization when an error is identified or a process produced unexpected results? How do you go about correcting the issue? If your
Register to receive our weekly newsletter with our most recent columns and insights.

contact us

Pittsburgh