IT Risk

The following 119 items are listed by Content Data.
Blog

Consider Different Approaches When It Comes to Cybersecurity

Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Fri, Jun 28, 2019
Blog

External Access Risk: Key Factors You Need to Know

Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...
Tue, Feb 18, 2020
Blog

Guide to Records Management

Technology has greatly expanded the methods of creating, editing, maintaining, transmitting and retrieving ...
Thu, Jun 28, 2018
Blog

IT Risk Management Best Practices

Investments in IT security and risk management continue to be on the rise. The main reason is that there’s ...
Thu, Mar 28, 2024
Blog

New Content on KnowledgeLeader - 2/26/2024

ToolsThe following tools were published on KnowledgeLeader this week:Investment Income PolicyThis Inve...
Mon, Feb 26, 2024
Blog

New Content on KnowledgeLeader - 5/15/2023

ToolsThe following tools were published on KnowledgeLeader this week:IT Organization Audit Work Progra...
Fri, May 19, 2023
Blog

New Content on KnowledgeLeader - 5/8/2023

ToolsThe following tools were published on KnowledgeLeader this week:​IT and Business Risk Alignment G...
Fri, May 5, 2023
Blog

The Three Components of a Successful Systems Design

What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term de...
Wed, Jun 6, 2018
Blog

What Is IT Risk and How Should You Manage It?

What Is IT Risk?Information technology (IT) risk is any potential threat to business data, critical systems...
Thu, Sep 15, 2022
Blog

What is Transaction Authenticity?

What Is Transaction Authenticity?"Transaction authenticity" can be defined as the authentication of a party...
Thu, Feb 15, 2018
Blog

What You Need to Build Remarkable Partnerships With the IT Organization

The strength of the partnership between IT audit and the IT organization is a significant differe...
Fri, Mar 27, 2020