Our Thoughts On

Sort by

Categories
Authors

Technology

Articles 121 - 130 of 151
Technology
Dave Snyder | 1.19.2017

Items to Consider When Implementing Audit Reviews of SAP S/4HANA and SuccessFactors

Many of these items are not new to system development projects, but this article provides project points directly related to SAP S/4HANA and SuccessFactors.

The Sharing Economy: It's Mine But You Can Have Some

Have you ever caught an Uber or Lyft to a business meeting? Or, maybe you booked your last vacation through Airbnb? How about renting an outfit from Rent
Geek warning: some tech knowledge required for this article – or at least willingness to look stuff up. This article was repurposed from Matt Dunn’s

Yahoo Data Breach - What Happened, What To Do Next and How To Protect Yourself

Yahoo reported last Thursday at least 500 million user accounts were affected by a massive data breach. The hack happened in 2014, when hackers stole account
Register to receive our weekly newsletter with our most recent columns and insights.

October is Cyber Security Awareness Month

Free Daily Cyber Security Tips to Recognize Cyber Security Awareness Month (October) Every working day, businesses and organizations are threatened by

Rethinking Your Financial and Operational Statement Reporting Process

Have you recently analyzed the amount of time your organization spends producing financial and operational statements for management and board meetings?

Air Gapped SCADA & ICS Networks Now Threatened From Ransomware

In my role as IT Audit Security Manager, I drafted this brief review of a new cybersecurity threat involving the use of SCADA & ICS systems. This new

IT Security Tip Sheet: Using a Wireless Keyboard? What You Should Know

In my role as IT Audit Security Manager, I drafted this brief review of a new cybersecurity threat involving the use of wireless keyboards. Many businesses
Register to receive our weekly newsletter with our most recent columns and insights.

IT Security Tip Sheet: From Pokémon to the Microsoft Print Spooler Bug

Cybersecurity and IT issues have been hot topics in the news lately, and it’s never been more important to stay informed. In my role as IT Audit

CISO On-Demand: A New Option

Chief Information Security Officer (CISO), or the equivalent function, has become a standard in business, government and the non-profit sector throughout
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×