At Tandem, we occasionally receive questions from our clients on the topic of an “IT audit risk assessment." Where did this concept come from, what exactly is it, and how would you begin to conduct one? Let’s find out.
Get our blog posts straight to your inbox.
In this article, we discuss the increasingly adopted definition of risk in today's cybersecurity world as well as its associated opportunities.
An organization’s security is only as strong as its weakest element, and ransomware is a threat that exploits vulnerabilities to their fullest extent. As such, having a plan for responding to ransomware is key to an organization’s cyber resilience.
In October 2020, the NIST published NISTIR 8286 over Integrating Cybersecurity and ERM. In this article, we will summarize some of the key concepts presented in the NIST document.
Here are 10 reasons why over 1400 organizations have chosen Tandem over other cybersecurity and compliance software solutions.
While there are many benefits to using social media to attract and/or interact with clients, risk and compliance issues also exist for financial institutions.
This article uses bank and credit union regulatory references to back-up recommended best practices for business continuity planning.
As states announce their intentions for the new R-SAT, we will add them to this list. We expect most state-charted institutions will be contacted about the R-SAT.
On Tuesday, October 13, 2020, a Ransomware Self-Assessment Tool (R-SAT) was released to state-chartered financial institutions. Read this article for FAQs about the R-SAT.
In the process of conducting a work from home risk assessment, once you have identified reasonably foreseeable threats to your organization and data, the next step is to evaluate and implement controls.
Securing customer, member, and organization data while employees work remotely takes on a unique angle when organizations are doing so in during a pandemic.