Focusing on Project Management

The Risk Advisory Services team has been consulting with our financial auditor colleagues in 2016, or what we in the biz call “busy season”, or sometimes “the big show”. As a result, we’ve had the opportunity to discuss the results of regulatory exams for many banks all over the region, allowing us to gauge current… Read more »

Getting Outside of Your Comfort Zone

Call it a rite of passage. Call it the school of hard knocks. Some may call it hazing. But whatever you call it, every brand new auditor experiences it — Their  first interview with a client, asking questions and having no idea what they mean to someone with decades more experience and volumes more knowledge… Read more »

Post Storm Review

Let’s use last week’s snow as the backdrop for this week’s discussion on a post-disaster evaluation. While it was an impact on us, it wasn’t really a disaster but it can show some good points to discuss. I will use my personal preparations and experiences here. Let’s start with preparation. I live outside of Ashland, VA… Read more »

Post Storm Review

Let’s use last week’s snow as the backdrop for this week’s discussion on a post-disaster evaluation. While it was an impact on us, it wasn’t really a disaster but it can show some good points to discuss. I will use my personal preparations and experiences here. Let’s start with preparation. I live outside of Ashland, VA… Read more »

Disaster Strikes!

The forecaster said last night that we will likely see major accumulations on Friday. What should you plan for? From what I can tell, the average American’s disaster plan for snow is to go and buy as much bread and milk the store has in stock. But we need a better plan for work. The… Read more »

Do You Have any IT Resolutions?

It is a new year and a great time to kick bad habits and start anew. Most of us make resolutions with good intent but lose the focus by February to continue. This year, let us think about IT resolutions! Have you made any IT Resolutions? By: R. Curtis Thompson, CPA.CITP, CISA When you hear… Read more »

Cybersecurity and What You Can Do To Prepare, Part Three

To summarize where are, we have talked about identifying your assets and your risks. The next step is to begin using this information in a logical way. The risk assessment component will be used to develop your Risk Management Strategy. Management must establish their risk tolerances in order to evaluate the how they will approach… Read more »

Cybersecurity and What You Can Do To Prepare, Part Two

We have gone through the process of identifying the assets in our network. Now we have to risk rate them. Many of you have plenty of experience in Risk Assessments so this may be a refresher for you. The purpose of a risk assessment is to prioritize the use of limited resources in order to… Read more »

Cybersecurity and What You Can Do To Prepare

Let’s start by asking why someone would want to break into your network. When hacking first started back in the 80’s it was generally done for bragging rights. Hackers have now found that there is money to be made from information. It is easy to understand that stolen credit card information could be used to… Read more »

Who’s Email is it, Anyway?

The mission of deTECH is to break down complicated IT topics into more palatable bites for consumption by both technical and non-technical audiences.  Unless a security or regulatory issue arises that we think is important to you, we avoid topical discussion and keep things fairly vanilla, with a few bad jokes tossed in for good… Read more »