Data Security

The following 195 items are listed by Content Data.
Blog

Guide to the State of Data Analytics

What is Data Analytics? Data analytics is the practice of embedding insight into operations to drive busin...
Thu, Oct 5, 2017
Blog

How IT Controls Enhance the Value of IT Assets

It is impossible to overstate the value of information technology (IT) to the world of businesses and indus...
Thu, Oct 6, 2022
Blog

How to Identify Remarkable Value in Data Analytics for Internal Audit

Internal auditors have weighed the benefits of data analytics software since the earliest versions of the ...
Mon, Mar 9, 2020
Blog

Human Resources Best Practices: Tools to Help Meet the Challenge

The Challenge Human resources (HR) professionals have a real and ongoing responsibility to the employees o...
Thu, Jul 7, 2022
Blog

Important Factors of Data Analytics You Need to Know

Auditors can use data analytics to avoid the massive waste spending that often goes hand-in-hand with hiri...
Sat, Feb 29, 2020
Blog

Intellectual Property: Risks You Need to Know

Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Thu, Feb 21, 2019
Blog

Intelligence Automation: How to Get Started

Discussions of robotic process automation (RPA) and artificial intelligence (AI) tend t...
Thu, Feb 20, 2020
Blog

Making the Most of Your Internal Audit Practice

IntroductionIf you are reading this article, you are likely in the internal audit (IA) profession or lookin...
Thu, Oct 13, 2022
Blog

New Content on KnowledgeLeader - 3/25/2024

ToolsThe following tools were published on KnowledgeLeader this week:IT Data Management PolicyOur IT D...
Mon, Mar 25, 2024
Blog

New Content on KnowledgeLeader - 5/29/2023

ToolsThe following tools were published on KnowledgeLeader this week:Privacy Audit Work ProgramThis to...
Fri, Jun 2, 2023
Blog

Risks Associated with Data Integrity and Management Best Practices

Failure to manage data integrity risk can have the following impact: Authorization, completeness,...
Mon, Oct 29, 2012
Blog

Safeguarding Sensitive Data: Proactive Measures Against Cyber Threats

Data Security and Internal Controls In today’s digital age, breaches in data security from cyberattacks ha...
Thu, Mar 30, 2023