Security Implications and Resources for Enabling Your Remote Team

We are more than two weeks into the “new normal” created by COVID-19. An unprecedented number of employees have been sent home to work and the immediate goal has been enabling the workforce to be productive, responding to Human Resource challenges like paid time off and child care, and protecting revenue streams by adjusting operations…. Read more »

Federal Tax Filing Delayed until July 15

[ Updated March 28, 2020 | 1:00pm ] Federal measures to mitigate the economic effects of the COVID-19 pandemic continue to roll out. On March 20, Treasury Secretary Mnuchin announced that the federal income tax filing deadline has been extended to July 15, 2020.  As of this writing, there are few details concerning the new extension and specific… Read more »

Quick Hits on IT General Controls

If your company has any form of financial reporting requirements, then you likely have been inundated with auditors. While your auditors will ask a number of questions, there is one area of focus that can sometimes surprise management and staff; questions about information technology. In the audit world, this is most accurately described as IT… Read more »

Data Flow Diagrams – Mapping Your Way To Better Security

Today’s business landscape is fast paced, and ever-changing. If you are always reactive instead of proactive, generally, you are losing. Despite this, there is one fact that never changes: threat-actors are always looking for a way in. For hundreds of years protecting your business was about physical security, and while still vital, the evolution of… Read more »

SOC for Cybersecurity Q&A

“You cannot endow even the best machine with initiative; the jolliest steamroller will not plant flowers.” Walter Lippmann In 2017 the AICPA announced a new attestation engagement called SOC for Cybersecurity. DeTech wrote about the technical aspects of the engagement soon after its announcement (see that article here). We have since completed the AICPA’s coursework… Read more »

The Deep vs. The Dark Web

When the topic of the deep or dark web comes up, it is hard not to picture Hollywood’s ‘The Matrix.’  In fact, I specifically picture the scene where Morpheus offers Neo his choice of either the blue pill, giving him a path back to his everyday life, or the red pill, and an opportunity to… Read more »

The Passing of Time: 2018 Recap

“The long unmeasured pulse of time moves everything. There is nothing hidden that it cannot bring to light, nothing once known that may not become unknown. Nothing is impossible.” – Sophocles Here we are at the end of another year… Time to put 2018 to bed and to begin afresh in 2019. Many of us will… Read more »

Why Is Vendor Management Important?

In today’s business environment, most companies use some sort of outsourced service provider. You may only use a company to print statements; you may have your core application outsourced; or you may have all your servers in the cloud. Whether it is small services or big, you probably have data living somewhere outside your buildings…. Read more »

ISACA | State of Cybersecurity Survey

ISACA recently released results from the annual global State of Cybersecurity Survey conducted last October.  A total of 2,366 individuals with a Certified Information Security Manager (CISM) and/or Cybersecurity Nexus Practitioner (CSX Practitioner) participated in the 2017 survey.  The results were not earth shattering but some were of interest. From a threat landscape perspective, the… Read more »

YHB Welcomes Bryan Newlin as Partner

Winchester, VA (June 5, 2018) — The shareholders of Yount, Hyde and Barbour, P.C. (YHB) have voted to admit Bryan Newlin as principal into the Firm effective June 1, 2018. “We are proud to welcome Bryan as a partner of YHB,” said Scott Moulden, Managing Partner. “Bryan has been a key player in growing the… Read more »