Compliance and Risk Management
4
Minutes to read
Name one business process that is not supported by technology. We have entered an era where the systems support almost every task, from the most basic to the most complex.
Name one business process that is not supported by technology. We have entered an era where the systems support almost every task, from the most basic to the most complex. Artificial intelligence (AI) and robotics are becoming mainstream. The technical evolution of the last 20 years has taken business technology from a luxury to a functional necessity. The mass usage of technology has created challenges with exponential increases in network traffic and data. Further, it has provided accessibility to data, even sensitive data, from any location in the world. This business enabler has presented a suite of risks and forced companies to further refine the balance between convenience and risk. Technology ecosystems have become more complex, which has made it more challenging to secure sensitive data. Technology risk, bot operational and security focused, are very real and malicious actors now have access to more sophisticated tools to streamline the attack process. In order to prevent a breach or compromise, a critical element is management awareness and support (tone of the top). This enables IT to effectively implement a technology control program, for example maintain a risk based asset inventory, perform periodic risk assessments and allocate resources to focus on processes and controls that will have the biggest impact on risk mitigation activities. Additionally, some key systems may fall under the scope of regulatory compliance requirements, so IT must maintain proper due diligence to ensure the control program is both "right sized" and effective. At a minimum, basic IT general controls (ITGCs) should be implemented on all applications. ITGCs consist of logical access, change management and IT operations. - Logical access includes application password parameters, appropriate user provisioning and removal of access, periodic user access reviews, appropriate elevated users. - Change management controls consist of changes to be authorized and approved prior to implemented on to production, developers not have the ability to promote changes in a non-tracking environment, the code which has been UAT is the same making to the production. - IT operations controls validates the job processing within the application to occur completely and accurately, which includes data backups. For individual applications, these controls should be applied at the following layers; application, local server, database and network. History has confirmed that some of the largest data breaches occurred were lacking ITGCs and could have been prevented with basic control hygiene.
We are a full-service management consulting and CPA firm covering all aspects of audit, compliance, risk management, accounting, finance, tax, IT risk, and more. Just let us know what you need help with and an expert will be in touch!
Request Your ConsultationClearview Group is an award-winning, dynamic management consulting and CPA firm offering services that are flexible and scalable to meet the specific needs of our clients of all sizes and industries. Committed to providing real solutions that offer practical and efficient improvements to processes, procedures and operations, Clearview Group delivers exemplary client services normally associated with national firms, but with the hands-on, personalized feel of a local firm.
11155 Red Run Boulevard, Suite 410
Owings Mills, MD 21117
410-415-9700