First Reference company logo

Inside Internal Controls

News and discussion on implementing risk management

machine cogs image

applications

Why should I monitor IT effectiveness and how do I do it?

The two definitive studies by COSO identify monitoring as a critical component of internal control and risk management. Monitoring refers to both ongoing monitoring processes to ensure that a system functions as it is supposed to (including management and review aspects), as well as ad hoc special studies and audits to review the system…

 

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

BYOD: Bring your own device is a growing business trend

iphone-ipad-bring-your-own-device

Since well before Information Technology PolicyPro was first published and for good reasons considering the technologies available at the time, it made sense to restrict devices connected to the corporate network to those owned and controlled by the enterprise and configured by IT. This is no longer the case.

 

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,