Our Thoughts On Archive

Sort by

Categories
Authors

Risk Advisory/Internal Audit

Articles 141 - 147 of 147

Efficiency in Reporting: SOC2 Plus HITRUST

HIPAA, ISO, and COBIT, oh my! Companies that create, access, store or exchange personal health and financial information are beginning to feel a never-ending
Vendors are a common element in today’s business environment. Outsourcing services and processes to vendors provides flexibility, convenience and

Understanding Procurement Cards Benefits and Pitfalls

As organizations look to gain a better handle on their procurement process, provide an additional level of control and help to either control or reduce

Middle States Commission on Higher Education Revised Compliance Verification Requirements - What's New?

In August 2014, we wrote an article regarding the Middle States Commission on Higher Education published guidelines participating in an accreditation-related
Register to receive our weekly newsletter with our most recent columns and insights.

Preventing Cyberattacks and Data Breaches via Employee Awareness Training and Phishing Simulations

One of the findings in Verizon’s most recent Data Breach Report is that stolen credentials are the root cause of data breaches 80% of the time. The

Do Companies that Handle Personal Health Information Require a Service Organization Control (SOC) Report?

The superficial answer is no. Companies that store, process or collect protected health information (PHI) electronically or in paper form are not required

New Year, New COSO

If you haven't already transitioned to the new COSO 2013 Framework, now is the time! Previously, guidance was somewhat vague, stating that the transition
Register to receive our weekly newsletter with our most recent columns and insights.

contact us

Pittsburgh