IT Audit

The following 308 items are listed by Content Data.

Change Management Audits: Key Factors You Need to Know

Information technology is critical to the long-term success of most organizations. It is a key driver for ...

What is Transaction Authenticity?

What Is Transaction Authenticity? "Transaction authenticity" can be defined as the authentication of a par...

What is Internal Auditing?

What is Internal Auditing? About Internal Audit The internal audit profession, through The Institute of ...

What Are the Benefits and Risks Associated With Data Integrity?

Data integrity is the assurance that information can only be accessed or modified by those authorized to a...

How to Identify Gaps in Your IT Strategy Process

Everybody is talking about IT strategy these days. As IT managers, you’re faced with considerable pressure...

Guide to the State of Data Analytics

What is Data Analytics? Data analytics is the practice of embedding insight into operations to drive busin...

How to Remarkably Audit Your IT Initiatives

Changes to a company’s information technology (IT) environment, both information systems and the underlying...

The Three Components of a Successful Systems Design

What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term de...

What is IT Audit?

It is common to find organizations investing more and more resources – money, time, staff, etc. – these day...

External Access Risk: Key Factors You Need to Know

Many businesses today exchange goods, services, information and knowledge using network-enabled technologi...

Electronic Discovery Risks, Challenges and Procedures

Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Audit Programs

Physical Security for Information Technology Facilities Audit Work Program

The purpose of this work program is to provide the general steps used to perform an audit of physical security for IT fa...
Subscriber Content
Tue, Oct 31, 2000