Insight Search

Sort by:
  • Client Story

    April 22, 2020
    Globalization and the internet in recent history have generated any number of benefits for corporations, professionals and job seekers by allowing them to seek collaboration and expansion opportunities in new markets. But this virtual free flow of commerce and cooperation can abruptly hit a dead end at the door of regulators with purview over certain countries or jurisdictions, halting businesses…
  • Client Story

    January 2, 2020
    According to the 2018 Census Bureau, 12.8% of the U.S. population has some type of disability. Included in that statistic are those who have impairments that impact accessibility of online websites, applications and documents. These impairments include: Difficulty lifting or grasping, which can impact use of a mouse or keyboard Cognitive, mental or emotional impairment Vision…
  • Flash Report

    June 2, 2022
    A major cybersecurity event can dissolve millions of dollars in assets and tarnish even the strongest company's reputation. As cybersecurity concerns grow and evolve, companies need to be prepared for the inevitable cyber attacks with strong defenses to identify breaches and minimize damage. But how does leadership know where to invest in cybersecurity? How much is at risk? What should be…
  • Podcast

    October 9, 2023
    The results from this year's Global Technology Audit Risks Survey, conducted by Protiviti and The Institute of Internal Auditors, reveal a complex and multifaceted landscape of technology risks. Cybersecurity is the top priority and by a wide margin. AI is an emerging risk with gaps in organizational preparedness and audit proficiency. The talent gap in IT is a growing concern and data privacy is…
  • Podcast Transcript

    October 9, 2023
    The results from this year's Global Technology Audit Risks Survey, conducted by Protiviti and The Institute of Internal Auditors, reveal a complex and multifaceted landscape of technology risks. Cybersecurity is the top priority and by a wide margin. AI is an emerging risk with gaps in organizational preparedness and audit proficiency. The talent gap in IT is a growing concern and data privacy is…
  • Whitepaper

    September 19, 2022
    Survey Shows Elevated Concerns Around Cybersecurity, Privacy and Compliance for the Technology, Media and Telecom Industry For the technology, media and telecommunications (TMT) industry, the greatest IT audit concerns in 2022 lie with cybersecurity-related breaches, privacy and regulatory compliance. More than 1,000 IT audit leaders and professionals from the TMT industry provided this…
  • Survey

    June 28, 2022
    Results of ISACA/Protiviti global survey reveal cybersecurity, privacy, data and regulatory compliance are top-of-mind concerns An uncertain global economy, volatile geopolitical developments, a persistent pandemic and an evolving catalog of technology risks have created mounting challenges for IT audit leaders and their functions. The results of the latest IT Audit Technology Risks Survey from…
  • Whitepaper

    July 22, 2021
    The future of organizations will be built on the ability to work securely from anywhere, using any device at any time. This was made clear during the COVID-19 pandemic, which forced millions of workers to work from home using company-owned or personal devices. As the velocity and persistence of cybersecurity attacks increase daily and digital transformation continues to be a priority for…
  • Flash Report

    March 4, 2021
    On-Premises Exchange Servers and All Hybrid Systems Impacted On Tuesday, March 2, 2021, Microsoft released four out-of-cycle security updates for on-premises Microsoft Exchange Servers to address vulnerabilities that have been exploited in limited and targeted attacks by a previously unknown Chinese espionage group. Upon validating the attacks, Microsoft immediately shared patches of…
  • Flash Report

    July 12, 2021
    Cybersecurity threats are growing exponentially as companies introduce an increasing number of Internet of Things (IoT) devices into operations and collect and store an ever- escalating amount of data. This technology and data sprawl is providing bad actors with more entry points into networks and systems. Too often, organizations have failed to make commensurate investments in data protection,…
Loading...