Our Thoughts On

Sort by

Categories
Authors

Technology

Articles 141 - 150 of 151

From the Classroom to the Recording Studio: How Universities May Use the Flipped Classroom Concept

For many of us, the thought of college classes conjures up images of lecture halls, professors speaking from podiums, and chalkboards full of definitions
Technology
Karen Frank | 9.29.2015

Streamlining Your Purchase Order Process: From Requisitions to Accounts Payable

It is more important than ever to control job costs. Mismanagement can jeopardize both cash flow and profits. To avoid these risks, many companies use

Quantifying the Impact and Risk of a Cyber-Attack

The thought of cyber-attacks has made some organizations increase their spending on resources to focus on improving awareness and the overall posture of

Consider a Business Intelligence (BI) Solution as Part of Your ERP Implementation

When organizations implement their ERP system, they are faced with a number of challenges. For example, the areas of data conversion and report conversion
Register to receive our weekly newsletter with our most recent columns and insights.

FFIEC Cybersecurity Assessment Tools Released - Are You Prepared?

Remember the FFIEC Pilot Program? The assessment is here! On June 30, 2015, the Federal Financial Institutions Examination Council (FFIEC) released its

FFIEC Announces Results of New Cybersecurity Assessment

The Federal Financial Institutions Examination Council (FFIEC) has established its priorities for the remainder of 2015 as a result of the recent FFIEC

Windows 10 is the New Windows 7

Slated for release this summer, Microsoft’s latest operating system is packed with new features but also heralds a much-anticipated return to certain

Cybercriminals Download 104,000 Taxpayers' Files from the IRS

IRS Commissioner John Koskinen announced on May 26 that nearly 104,000 taxpayers have become victims of a sophisticated identity theft scheme involving
Register to receive our weekly newsletter with our most recent columns and insights.

Preventing Cyberattacks and Data Breaches via Employee Awareness Training and Phishing Simulations

One of the findings in Verizon’s most recent Data Breach Report is that stolen credentials are the root cause of data breaches 80% of the time. The

Sunset of the SysTrust for Service Organization Controls (SOC) Seal Program

The AICPA and CPA Canada announced that the SysTrust and SOC 3 SysTrust for Service Organizations seal programs are being discontinued. The discontinuation
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×