The following 574 items are listed by Content Data.
Blog
The Best Way to Formulate and Execute Audit Procedures
Once a company forms an internal audit function, completes the risk assessment process and develops an inte...
Blog
The Three Components of a Successful Systems Design
What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term de...
Blog
Topic Spotlight: COSO
Download these COSO tools and keep them handy to assist with your audit projects.1. Monitoring Entity-...
Blog
Topic Spotlight: Entity-Level Control
Download these entity-level control tools and publications and keep them handy to assist with your aud...
Blog
Topic Spotlight: Fixed Assets
Establish consistent operating practices with the fixed asset best practices and resources in this blog pos...
Blog
What Is Internal Audit’s Role in Cybersecurity?
Corporations are always thinking about how to protect assets. A few of the white-collar crimes compani...
Blog
What is IT Audit?
It is common to find organizations investing more and more resources – money, time, staff, etc. – thes...
Blog
What Is IT Risk and How Should You Manage It?
What Is IT Risk?
Information technology (IT) risk is any potential threat to business data, critical syste...
Blog
What is Transaction Authenticity?
What Is Transaction Authenticity?
"Transaction authenticity" can be defined as the authentication of a par...
Blog
What You Need to Build Remarkable Partnerships With the IT Organization
The strength of the partnership between IT audit and the IT organization is a significant differe...