Results for

Sort by:
  • Blog
    April 2, 2020
    Today, we continue this detailed look at what corporate IT security teams should be doing to prevent cyberattacks when a majority of the workforce is temporarily working remotely. Part I posted yesterday. Create Two-Step User Access for Administrators Remote administration on systems is a particular area of concern, as these tasks tend to require privileged accounts. When it comes to these types…
  • Blog
    December 4, 2019
    This blog post is also featured on The Protiviti View. Compared to the 2015 version, the updated business continuity management booklet released in November 2019 by the Federal Financial Institutions Examination Council (FFIEC) offers increased clarity, with detailed examples designed to make it easier for financial institutions to comply with its guidance and to help examiners determine whether…
  • Blog
    December 9, 2019
    There are many key steps in completing a successful SAP S/4HANA® journey, including what many call Phase 4: Prepare and Modernize the environment in preparation for the S/4HANA implementation. There are several aspects that need to be considered, including the SAP ECC system or legacy systems, other third-party applications, governance processes and the various strategies to be put in place to…
  • Blog
    December 10, 2019
    Any SAP S/4HANA program that doesn’t prioritize security, controls and compliance into the overall design is never going to yield the return the investment deserves. In today’s digital age, it’s simply not enough to effectively implement enterprise applications to support business operations. Companies are also expected to address cybersecurity, application security, financial and data privacy…
  • Blog
    December 11, 2019
    No, we’re not talking about politics or the dance that’s been done at every wedding reception in the last decade. In a traditional software development model, requirements are kept on the left side of the plan while delivery into production and operations are on the right. Shift Left security is simply building security into an organization’s DevOps process or designing security controls earlier…
  • Blog
    December 17, 2019
    The concept of achieving effective data-driven risk management may sound intimidating, but ultimately, it’s about organizations trying to make well-informed business decisions using their available data and subject matter expertise. Unfortunately, many of the ways that organizations measure and execute against risk fail to quantify and frame the risk challenges in a way that decision makers can…
  • Blog
    January 7, 2020
    The following is excerpted from a Protiviti Flash Report issued on January 7, 2020 and is also posted on The Protiviti View. On January 4, 2020, the Department of Homeland Security (DHS) issued a National Terrorism Advisory System (NTAS) bulletin describing current developments and general trends regarding the terrorist threat posed by nation-state cyber warfare programs. According to…
  • Blog
    November 20, 2019
    There is one certainty about the 2018 California Consumer Privacy Act of 2018 (CCPA): Today’s CCPA is not going to be next year’s CCPA. The volume and velocity of changes to the CCPA and the lack of substantial guidance regarding it promise to make for an interesting 2020 as companies begin their implementation of privacy compliance for this new regulation. First, introduced recently into the…
  • Blog
    November 21, 2019
    The California Consumer Privacy Act (CCPA) goes into effect on January 1, 2020. That’s just 40 days from the date we published this blog. Yet we continue to see a considerable number of organizations that are likely to be impacted by this new legislation failing to put together personal data privacy protection programs. That could be a costly mistake. In a recent webinar we held on this topic, a…
  • Blog
    December 2, 2019
    Microsoft Dynamics Finance and Operations (D365F&O) is a powerful cloud-based Enterprise Resource Planning (ERP) system that provides organizations the ability to centralize master data and provide real-time transaction processing and reporting. As organizations begin to transition ERP to the cloud, it requires them to rethink business processes and how they are managing their company. Many…
Loading...