KnowledgeLeader Blog

External Access Risk: Key Factors You Need to Know

Posted by Protiviti KnowledgeLeader on Wed, Feb 19, 2020 @ 08:00 AM

Many businesses today exchange goods, services, information and knowledge using network-enabled technologies. Within such business, the proper protection of confidential information is essential to achieve the desired benefits and mitigate the associated risks. Failure to adequately restrict access to critical business information from outsiders (intruders) may result in unauthorized knowledge and use of confidential information by inappropriate parties.

Read More

Topics: IT Audit, Governance, Risk & Compliance, IT Infrastructure, IT Security, IT Risk, Performance Management/Measurement

How to Identify Gaps in Your IT Strategy Process

Posted by Protiviti KnowledgeLeader on Wed, Feb 19, 2020 @ 07:00 AM

Everybody is talking about IT Strategy these days. As IT managers, you’re faced with considerable pressure to communicate a comprehensive strategy, and show a clear road to improving the business value of your activities. IT strategy management is often met with yawns by CEOs and other executives, yet it can advance or undermine every move that a company makes. In one-sided communication models like this, it’s often the case that only problems are properly recognized or attributed to your team.

Read More

Topics: IT Audit, IT Strategy

What Are the Benefits and Risks Associated With Data Integrity?

Posted by Protiviti KnowledgeLeader on Tue, Jan 14, 2020 @ 12:00 PM

Data integrity is the assurance that information can only be accessed or modified by those authorized to access the system. Measures taken to ensure integrity include controlling the physical environment of networked terminals and servers, restricting access to data, and maintaining rigorous authentication practices. Data integrity can also be threatened by environmental hazards, such as heat, dust and electrical surges.

Read More

Topics: IT Audit, IT Infrastructure, Cloud Computing, IT Risk, IT Controls, Data Security, Data Analytics, Performance Management/Measurement, Customer Satisfaction

What is IT Audit?

Posted by Protiviti KnowledgeLeader on Tue, Nov 20, 2018 @ 12:04 PM

It is a common occurrence today to find many organizations investing more and more resources – money, time, staff, etc. – into technology. Consider a relatively small retail company, for example, that’s focusing on expanding its website and online ordering capabilities while also building web-based platforms that can function seamlessly on a variety of popular mobile devices. At the same time, this company also must manage a broad and growing range of risks related to security and privacy; regulatory compliance; federal, state and local laws; use of social media by employees; and information technology (IT) infrastructure stability, among many other areas.

Read More

Topics: IT Audit

What is Internal Auditing?

Posted by Protiviti KnowledgeLeader on Thu, Oct 25, 2018 @ 12:27 PM

What is internal auditing?

Read More

Topics: Internal Audit, IT Audit, Audit Committee & Board, Audit Planning, Audit Testing

What is IT Performance Risk?

Posted by Protiviti KnowledgeLeader on Thu, Jun 21, 2018 @ 01:49 PM

Performance is defined as the throughput of business transactions compared to user needs, expectations or requirements. IT performance risk is the risk that a company’s IT infrastructure will be unable to perform at required levels due to inferior internal operating practices, technology and/or external relationships that threaten the demand for the organization's products or services.

Read More

Topics: IT Audit, IT Infrastructure, IT Risk, Change Management, Performance Management/Measurement

The 3 Components of a Successful Systems Design

Posted by Protiviti KnowledgeLeader on Thu, Jun 07, 2018 @ 09:19 AM

What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term design as used here refers to the entire scope of a project. A business system design is a collection of design documents and supporting materials which define the system functionality that supports one or more business processes and in the process, creates, retrieves, updates and deletes data.

Read More

Topics: IT Audit, IT Governance, IT Infrastructure, IT Strategy, IT Risk, IT Controls, Performance Management/Measurement

What is Transaction Authenticity?

Posted by Protiviti KnowledgeLeader on Thu, Feb 15, 2018 @ 03:57 PM

What is Transaction Authenticity?

Transaction authenticity can be defined as the authentication of a party’s (individual, organization) identity, to ensure that pending transactions and contractual agreements are legal and enforceable.

Read More

Topics: IT Audit, IT Infrastructure, Cloud Computing, IT Risk, IT Controls, Performance Management/Measurement

Guide to the State of Data Analytics

Posted by Protiviti KnowledgeLeader on Fri, Oct 06, 2017 @ 08:58 AM

What is Data Analytics?

Data analytics is the practice of embedding insight into operations to drive business strategy and performance.

Read More

Topics: IT Audit, Data Analytics

Electronic Discovery Risks, Challenges and Procedures

Posted by Protiviti KnowledgeLeader on Mon, Jul 17, 2017 @ 09:10 AM

Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data for the purpose of using it as evidence in a legal case.

Read More

Topics: Laws & Regulations, IT Audit, IT Security, IT Controls, Investigations/Forensics

Add a Comment:

Subscribe to Our Blog

About KnowledgeLeader

KnowledgeLeader, provided by Protiviti, is the premier resource for internal audit and risk management professionals.

With over 1,400 customizable tools and 1,300 articles by industry experts, we offer the most comprehensive service on the market.

For more information:

 Tour the Site

Recent Posts

Posts by Topic

see all