Technology

Guest Article: 2022-2023 Cyber Insurance Outlook

Cyber coverage in the public school arena is challenging. In a recent demographic study of K-12 public school districts, school districts with larger enrollments and lower economic metrics are more likely to see a cyber event than those with a smaller enrollment and...

Guest Article: Educational Institutions Cyber Liability Marketplace Update

Since the onset of the COVID-19 Pandemic, the cybersecurity environment has rapidly transformed. The frequency of incidents and cyber liability insurance claims have multiplied exponentially and continue to grow. Cyber Liability Insurance underwriters are on high...

IT and Cybersecurity Concerns – Cerini Short

IT and Cybersecurity Concerns Cerini Short In this Cerini Short, Shari Diamond, CIA, Partner explains the importance of cybersecurity and introduces our IT Guidebook.

Internal Controls – Cerini Short

Internal Controls Cerini Short In this Cerini Short, Nicholle Mezier, CPA, Manager explains Internal Controls. WHAT ARE INTERNAL CONTROLS? WHY DO WE NEED THEM? Internal controls are one of the most essential elements within any organization. Internal controls are put...

Internal Controls: The 5 Components

What are internal controls? Why do we need them?
Internal controls are one of the most essential elements within any organization. Internal controls are put in place to enable organizations to achieve their goals and missions.

Recommended IT Policies

Good governance and accountability require an organization to adopt policies and procedures related to IT to provide criteria and guidance for the company’s computer-related operations. To effectively protect computing resources and data, companies should have an...

Guest Article: Cybersecurity – Legal Expert Analysis

Navigating the ambiguous requirement of ‘Reasonable Security’ measures while protecting personal information. Over the last couple of years, cybersecurity laws have commonly required that sensitive information be protected through the use of “reasonable security.”...

Guest Article: Disposing Technology

What businesses should know about electronic data destruction and e-recycling to maintain data compliance, avoid a catastrophic data breach, and protect the environment. IT Asset Disposition (ITAD) is the process of retiring computer equipment and other IT Hardware...

Guest Article: Cybersecurity Insurance

Times have certainly changed with respect to cybersecurity controls. Regardless of industry or organizational size, companies should expect to see a continued disciplined underwriting approach that remains laser-focused on data security controls, with rates continuing...

Guest Article: Cybersecurity Considerations for Small Organizations and Nonprofits

Ensuring your organization has a robust cybersecurity environment takes a lot of resources specifically qualified people. For small and nonprofit organizations that don’t have the budget to support hiring so many different professionals, this can be problematic. A...
Guest Article: Incident Response Planning

Guest Article: Incident Response Planning

Imagine this: You’re the Executive Director of a $5 million dollar nonprofit organization. It’s 6:30 AM on Monday morning and even though you wish you were still sleeping; you are logging into your email to follow-up with some donors. You get a login error message,...

read more
Guest Article: Cybersecurity Audits and Assessments

Guest Article: Cybersecurity Audits and Assessments

How do you tell if your information technology environment is properly implemented? An audit is the best way to find out. Many organizations do not have sufficient staff or resources to be able to perform such an audit. Even if you do have a robust internal IT...

read more
Guest Article: Vulnerability Assessments and Penetration Tests

Guest Article: Vulnerability Assessments and Penetration Tests

There is some confusion between what a vulnerability assessment accomplishes versus a penetration test. While both are critical in reducing cybersecurity attacks, a vulnerability assessment encompasses scanning the environment for anomalies within your IT environment....

read more
A CYBERSECURITY PRIMER

A CYBERSECURITY PRIMER

Cybersecurity in a nutshell is the combination of knowledge about what information is valuable in your organization, who wants to exploit it, why they want to exploit it, what your organization is willing to do to prevent a breach of information, and how well your...

read more
IT CONTROLS – BEST PRACTICES

IT CONTROLS – BEST PRACTICES

First Point: It’s Everyone’s Problem COO Ultimately responsible for the operational viability of the firm. The COO must support the CIO and CTO. They must hold every employee to a high standard of protecting the firm’s interests through careful attention and vigilance...

read more
Cybersecurity Risks

Cybersecurity Risks

Cybersecurity risks have grown exponentially in the past decade’s. Every company that has data is at risk of having that data exposed to hackers: social security numbers, credit card numbers, medical records, driver’s license numbers, bank accounts, financial reports,...

read more