First Reference company logo

Inside Internal Controls

News and discussion on implementing risk management

machine cogs image

information technology

Do you have or need cyber risks insurance in case of a cyber attack?

A growing number of companies are investing in cyber risks insurance, which offers a degree of protection against the consequences of cyberattacks such as hacking, business disruptions and digital data breaches. Organizations are increasingly buying insurance to protect against losses from computer breaches.

 

, , , , , , , , , , , , , ,

Service management scope definition

So, here it is, September, already! Ideally you’re rested from a great summer vacation and ready to dive back into providing or improving your services, or perhaps at least to revisiting how you define the scope of them. With that in mind, let’s take a look at a new publication that may be of some help to you, ISO/IEC 20000-3:2012, which as of August 14, 2012 is now at stage 60.60 (Publication Stage, International Standard published).

 

, , , , , ,

Information security guidance

According to Deloitte, IT now plays many fundamental and highly beneficial roles in businesses, including:

 

, , , , , , , , , , , , , , , ,

COBIT 5: a look at the update

Let’s spend a few minutes on the revised ISACA business framework for the governance and management of enterprise information technology known as COBIT 5.

 

, , , , , , , , , ,

BYOD trend poses immense challenges for organizations

No, employees aren’t bringing their own alcoholic drinks to work, but they are bringing in their own mobile devices and expecting to use them with their employers’ networks. What does that mean? Well, chances are several (if not many) of a given organization’s employees have personal smartphones or tablet computers, and they probably want to use them to perform work tasks.

 

, , , , , , , , , , , ,

Is it time for directors to take responsibility for IT governance and strategy?

The International Organization for Standardization (ISO) thinks so. It has developed ISO 38500 to complement COBIT and ITIL, comparing the standards to the roof, walls and foundation of a house…

 

, , , , , , , , , , ,

The mobile workforce – it’s not coming; it’s here

Mobility is not just about technology anymore. However, chances are high that IT, specifically the CIO, will be responsible for any mobile initiatives within the company. So, CIOs need to take a broad view of mobility and understand the effect this technology will have on departments such as HR, sales, marketing, legal, security and facilities, as well as IT.

 

, , , , , , , , , , , , , ,

Securing your web

How often do you think about malware? Do you consider it a threat to your operations? Do you have a strategy to prevent malware attacks and deal with them if they do occur? Is your strategy up to date?

 

, , , , , , , , , ,

IT strategy – avoiding problems, getting the most from your investments

Information technology has infiltrated just about every aspect of business, to the point where it’s nearly impossible to avoid developing a dedicated IT strategy in order to support your main business goals. A new book describes how even minor software troubles can lead to big headaches for organizations, especially if they rely on the software to carry out their business.

 

, , , , , , , , , , , , , , , , ,

Another take on IT strategy

In a recent issue of Inside Internal Control, I discussed a report on why small and medium-sized businesses should take information technology strategy and planning seriously. Essentially, according to the Canadian Institute of Chartered Accountants, if you don’t strategize your IT, you’re probably wasting time and money just keeping up, when you could be using your resources to support your strategic business plan.

Well, I hope you didn’t rush away after reading that piece and create and implement an IT strategy…

 

, , , , , , , , , , , , , , ,

Do you need an IT business and implementation strategy?

You already know how important information technology is to your business. You’ve got a website that pushes your brand and maybe even sells your products; you’ve got an internal network that connects all of your employees to each other and the documents they need; you’ve got company email to manage, and maybe a bunch of cellphones and BlackBerrys to keep track of; you’ve got security cameras, passwords, log-ins and keycards; and you’ve got employee management systems covering attendance, payroll, benefits and more. If any of these fails, you’ve also got a big problem.

 

, , , , , , , , , , , , ,

Are all those log-in passwords worth your time?

I’m sure this news will come as a relief to many computer and Internet users out there: a recent study by a researcher at Microsoft has found that many IT security measures—those things we love to hate like having to change passwords every three months or having individual passwords for a dozen different work accounts—simply don’t provide good value for the time and effort they involve, not to mention the bad habits they often cause!

 

, , , , , , , , , ,

Next posts