KnowledgeLeader Blog

Guide to Records Management

Posted by Protiviti KnowledgeLeader on Thu, Jun 28, 2018 @ 01:24 PM

Technology has greatly expanded the methods of creating, editing, maintaining, transmitting and retrieving records. From creation to disposition, records in electronic recordkeeping systems may now utilize a variety of media. An example of an electronic recordkeeping system is one in which a personal computer generates the original records, which are subsequently stored on a secondary electronic resource. While paper copies of the electronic records may be printed for distribution, the original records are transferred electronically.

Read More

Topics: IT risk, strategic risk, risk assessment, document retention, electronic discovery, fraud, performance management/measurement

What is IT Performance Risk?

Posted by Protiviti KnowledgeLeader on Thu, Jun 21, 2018 @ 01:49 PM

Performance is defined as the throughput of business transactions compared to user needs, expectations or requirements. IT performance risk is the risk that a company’s IT infrastructure will be unable to perform at required levels due to inferior internal operating practices, technology and/or external relationships that threaten the demand for the organization's products or services.

Read More

Topics: IT risk, IT audit, IT infrastructure, performance management/measurement, change management, KL Tools

The 3 Components of a Successful Systems Design

Posted by Protiviti KnowledgeLeader on Thu, Jun 07, 2018 @ 09:19 AM

What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term design as used here refers to the entire scope of a project. A business system design is a collection of design documents and supporting materials which define the system functionality that supports one or more business processes and in the process, creates, retrieves, updates and deletes data.

Read More

Topics: IT risk, IT audit, IT controls, IT governance, IT infrastructure, IT strategy, performance management/measurement, KL Tools

What is Transaction Authenticity?

Posted by Protiviti KnowledgeLeader on Thu, Feb 15, 2018 @ 03:57 PM

What is Transaction Authenticity?

Transaction authenticity can be defined as the authentication of a party’s (individual, organization) identity, to ensure that pending transactions and contractual agreements are legal and enforceable.

Read More

Topics: KL Tools, cloud computing, IT risk, IT infrastructure, IT audit, IT controls, performance management/measurement

Two New IT RCMs Available on KnowledgeLeader

Posted by Lark Scheierman on Fri, Aug 19, 2016 @ 08:19 AM

The KnowledgeLeader team recently added two risk and control matrices (RCMs) to its tool repository. These RCMs focus on IT-oriented risks and controls. 

Read More

Topics: internal audit, risk assessment, KnowledgeLeader tools, RCM, IT risk, IT audit

Is Your Organization Managing IT Strategy Risk?

Posted by Lark Scheierman on Fri, Apr 01, 2016 @ 07:40 AM

icon image of three turning mechanical gearsIt is in this dynamic environment that IT audit leaders and functions must operate to help their organizations identify, mitigate and monitor an escalating volume of IT risks. Working in collaboration with executive management, the board of directors, IT, legal, human resources and numerous other departments, IT auditors face the daunting task of helping their organizations manage potential IT risks that could cripple the enterprise. Properly and proactively managing the organization’s IT strategy has never been more important.

Read More

Topics: IT strategy, IT risk, RCM, KnowledgeLeader tools

Data Security Resources to Help You Take Action

Posted by Sharise Cruz on Thu, Oct 29, 2015 @ 02:50 PM

Read More

Topics: IT audit, cybersecurity, IT risk, data security,

INFOGRAPHIC: Bridging the Data Security Chasm

Posted by Sharise Cruz on Wed, Sep 24, 2014 @ 08:02 AM

Read More

Topics: survey reports, infographics, audit committee & board, IT security, IT risk, privacy, benchmarking, data security,

Thinking About Your 2014 Audit Plan? Here's How It Should Look (Infographic)

Posted by Sharise Cruz on Tue, Nov 26, 2013 @ 02:56 PM

Do you think your IT security is ready to meet the challenges that your organization will face in 2014? If your answer is no, you're not alone - the results of Protiviti's latest IT Audit Benchmarking Survey indicate that when it comes to IT and cybersecurity, many organizations need to make improvements to their IT audit coverage.

Read More

Topics: Protiviti, social media risk, cloud computing, IT governance, infographics, cybersecurity, IT security, IT risk, ERP

What is Data Integrity Risk? - Updated!

Posted by Protiviti KnowledgeLeader on Fri, Oct 19, 2012 @ 07:00 AM

 What is Data Integrity?

 Data integrity is the assurance that information can only be accessed or modified by those authorized to access the system. Measures taken to ensure integrity include controlling the physical environment of networked terminals and servers, restricting access to data, and maintaining rigorous authentication practices. Data integrity can also be threatened by environmental hazards, such as heat, dust, and electrical surges.

Read More

Topics: Data Integrity Risk, cloud computing, IT risk, IT audit, customer satisfaction, IT controls, IT infrastructure, data analytics, data security,, performance management/measurement, KL Tools

Add a Comment:

Subscribe to Our Blog

About KnowledgeLeader

KnowledgeLeader, provided by Protiviti, is the premier resource for internal audit and risk management professionals.

With over 1,400 customizable tools and 1,300 articles by industry experts, we offer the most comprehensive service on the market.

For more information:

 Tour the Site

Recent Posts

Posts by Topic

see all