IT Audits and Assurance Articles
Posted by Jill Johnson on July 13, 2017
Threats to your business operations are out there. Is your company prepared for a disaster?
Posted by Jill Johnson on March 22, 2017
A chain is only as strong as its weakest link. When it comes to cybersecurity, the weakest link could be any one of your employees — which is why establishing cybersecurity policies and staff training are critical.
Posted by Jill Johnson on February 06, 2017
New technology breeds new ways for hackers to commit fraud. As businesses increasingly use quick response (QR) codes to connect with customers using smart devices, opportunistic cybercriminals may use them to steal personal information and incur unauthorized charges. Find out ways to protect your smart devices from QR code “clickjacking” scams.
Posted by Jill Johnson on January 02, 2017
It is sometimes said there are two kinds of companies — those that have been hacked and know it, and those that have been hacked but don’t know it. Perhaps it’s an exaggeration, but the truth is your employees may inadvertently invite cyber criminals into your company’s computer systems. Here are some steps to mitigate that risk.