KnowledgeLeader Blog

External Access Risk: Key Factors You Need to Know

Posted by Protiviti KnowledgeLeader on Wed, Feb 19, 2020 @ 08:00 AM

Many businesses today exchange goods, services, information and knowledge using network-enabled technologies. Within such business, the proper protection of confidential information is essential to achieve the desired benefits and mitigate the associated risks. Failure to adequately restrict access to critical business information from outsiders (intruders) may result in unauthorized knowledge and use of confidential information by inappropriate parties.

Read More

Topics: IT Audit, Governance, Risk & Compliance, IT Infrastructure, IT Security, IT Risk, Performance Management/Measurement

How to Effectively Conduct Self-Assessment Meetings

Posted by Protiviti KnowledgeLeader on Thu, Feb 13, 2020 @ 02:49 PM

Why are we meeting? What are the objectives of the self-assessment meeting?

Defining the meeting objectives is the most important aspect of planning a self-assessment meeting. This requires members of the audit team to meet with the auditee in advance to determine their needs and wants. For example, the auditee may ask the auditor to facilitate a self-assessment meeting at the organizational level designed to:

Read More

Topics: Audit Planning, Self-Assessment, Performance Management/Measurement

How to Determine the Most Effective Budgeting Process

Posted by Protiviti KnowledgeLeader on Thu, Feb 06, 2020 @ 04:15 PM

A budget is a systematic method of allocating financial, physical and human resources to achieve strategic goals. Companies develop budgets in order to monitor progress toward their goals, help control spending, and predict cash flow and profit.

 

 

 

Read More

Topics: Accounting/Finance, Cash & Treasury, Performance Management/Measurement, Budgeting

What Are the Benefits and Risks Associated With Data Integrity?

Posted by Protiviti KnowledgeLeader on Tue, Jan 14, 2020 @ 12:00 PM

Data integrity is the assurance that information can only be accessed or modified by those authorized to access the system. Measures taken to ensure integrity include controlling the physical environment of networked terminals and servers, restricting access to data, and maintaining rigorous authentication practices. Data integrity can also be threatened by environmental hazards, such as heat, dust and electrical surges.

Read More

Topics: IT Audit, IT Infrastructure, Cloud Computing, IT Risk, IT Controls, Data Security, Data Analytics, Performance Management/Measurement, Customer Satisfaction

How Are You Monitoring Your Project Management Risk?

Posted by Protiviti KnowledgeLeader on Fri, Dec 13, 2019 @ 08:55 AM

Project management risk is significant because of its lasting implications. By definition, a project is a “temporary endeavor undertaken to create a unique product or service and involves doing something that has not been done before.” Thus, it is reasonable to expect projects to involve a high degree of risk, and statistics support that expectation.

Read More

Topics: Project Management, IT Strategy, Performance Management/Measurement

What You Need to Know About Robotic Process Automation

Posted by Protiviti KnowledgeLeader on Thu, Jun 20, 2019 @ 04:30 PM

Are You Familiar With Robotic Process Automation?

Robotic process automation (RPA) has been gaining traction as an efficient way to automate labor-intensive and repetitive tasks across a variety of business functions, including finance, accounting, technology, legal, HR, and, increasingly, audit and compliance.

Read More

Topics: IT Governance, IT Infrastructure, IT Strategy, IT Risk, Energy & Utilities Industry, Performance Management/Measurement, Robotic Process Automation

Exploring the Big Picture of IT Risk Assessment

Posted by Protiviti KnowledgeLeader on Thu, Mar 28, 2019 @ 05:26 PM

Most, if not all, business transactions executed today touch the information technology (IT) environment at some point in their lifecycle. As organizations plan for the next calendar year, it’s logical to regard the IT risk assessment as a critical component that should be reviewed through the internal audit function.

Read More

Topics: Laws & Regulations, Compliance, Risk Assessment, Performance Management/Measurement

How to Use the 5 Best Practices of Inventory Management

Posted by Protiviti KnowledgeLeader on Fri, Mar 15, 2019 @ 02:20 PM

Inventory planners and managers today find themselves engaged in a delicate balancing act. On one hand, they strive at all costs to stay competitive in a marketplace that continues to demand more customized products and faster delivery services. On the other hand, they are still obliged to keep the actual cost of maintaining such complex inventory down to a minimum. Despite the dilemma, however, companies that apply best practices know firsthand how an efficient inventory management system can transform a business. Some have even reported improvements of up to 90 percent in throughput times and defect levels.

Read More

Topics: Supply Chain, Vendor Management, Accounting/Finance, Performance Management/Measurement, Inventory & Materials Management, Accounts Payable & Purchasing

Improving the Close-the-Books Process

Posted by Protiviti KnowledgeLeader on Fri, Mar 01, 2019 @ 10:14 AM

An effective business process is built on a set of well-defined and clearly stated business objectives. These key objectives articulate the ideal performance results that a company expects from that process. To monitor a business process so it stays focused on reaching the key objectives, a company chooses appropriate performance measures. Careful selection of the performance measures takes a company a long way toward improving a business process. Thus, to build and then continually improve an effective business process, a company establishes:

Read More

Topics: Accounting/Finance, Financial Reporting, Close the Books, Performance Management/Measurement

Intellectual Property: Risks You Need to Know

Posted by Protiviti KnowledgeLeader on Thu, Feb 21, 2019 @ 05:15 PM

Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to businesses, given their increased aggressiveness towards intellectual property (IP) theft. These, and any other original creative works that have economic value and are protected by law, can be categorized as IP.


Read More

Topics: Enterprise Risk Management, Risk Assessment, Strategic Risk, Data Security, Performance Management/Measurement, Intellectual Property

Add a Comment:

Subscribe to Our Blog

About KnowledgeLeader

KnowledgeLeader, provided by Protiviti, is the premier resource for internal audit and risk management professionals.

With over 1,400 customizable tools and 1,300 articles by industry experts, we offer the most comprehensive service on the market.

For more information:

 Tour the Site

Recent Posts

Posts by Topic

see all