Data Security

The following 197 items are listed by Content Data.
Policies & Procedures

Data Backup and Retention Policy

This tool contains three sample policies that highlight guidelines and procedures common to recognizing and retaining da...
Subscriber Content
Mon, Sep 20, 2021
Articles

Resilience and the Workforce Are Key Concerns in 2021 and Over the Next Decade, According to Protiviti-NC State Global Survey

Here, we highlight the results of our ninth annual risk survey and illustrate the top 10 risks for 2021 and 2030 in orde...
Subscriber Content
Mon, Sep 20, 2021
Policies & Procedures

Physical Security Standard Policy

The purpose of this policy is to create and maintain a physically secure environment that protects company property and ...
Subscriber Content
Mon, Sep 6, 2021
Articles

Transforming Delivery Through Value Streams

Protiviti's Evan Campbell and Sofia Hansen discuss how organizations can achieve the benefits of value streams by implem...
Subscriber Content
Mon, Aug 16, 2021
Articles

Preparing for a Dynamic Post-Pandemic Fraud Landscape

The five strategies described in this article can help organizations strengthen their fraud prevention practices and avo...
Subscriber Content
Mon, Aug 2, 2021
Benchmarking Tools

Privacy Program Leading Practices

This tool features several leading practices to consider when establishing a privacy program.
Subscriber Content
Mon, Jul 26, 2021
Articles

How Firms Can Tackle Technology Risk Blind Spots to Build Resilience

Protiviti’s Ewen Ferguson and Hirun Tantirigama identify common critical technology risks and illustrate what organizati...
Subscriber Content
Mon, Jul 5, 2021
Policies & Procedures

Network Access Control Devices Policy

The purpose of this sample policy is to ensure that all company network devices and firewalls are properly identified an...
Subscriber Content
Mon, Jul 5, 2021
Articles

The Three C’s of a Quality Cloud Audit

This article outlines Protiviti's comprehensive cloud audit approach, which is based on leading practices and frameworks...
Subscriber Content
Mon, Jul 5, 2021
Articles

Gone Phishing: Elaborate Scams Are on the Rise, Are You Smart Enough to Recognize Them?

Protiviti Managing Director Michael Lyons shares a personal experience with, and an in-depth analysis of, a sophisticate...
Subscriber Content
Mon, Jun 21, 2021
Policies & Procedures

Encryption Key Policy

This tool contains two sample policies that establish guidelines for use of encryption to secure company information ass...
Subscriber Content
Mon, Jun 14, 2021
Articles

Importance of Internal Controls for Cybersecurity

Audit Analytics examines the increase in cybersecurity breaches disclosed by public companies since 2011.
Subscriber Content
Mon, Jun 14, 2021