
This post was originally published on Small Business Computing. Every organization requires some form of management; otherwise, it would be called a disorganization and business success would be elusive at…
This post was originally published on Small Business Computing. Every organization requires some form of management; otherwise, it would be called a disorganization and business success would be elusive at…
In late 2014, the American Institute of Certified Public Accountants updated the criteria for the Trust Services Principles related to security, availability, processing integrity, and confidentiality (most commonly reported out…
This post was originally published on Techsling. Security breaches in every industry are all over the news these days, and companies are becoming more mindful of the need for compliance…
This post was originally published on Small Business CEO. It seems like major corporate data breaches have become all too common. In fact, they’ve become so common that you might have…
This post was originally published on Cloud Computing Journal. When describing cloud computing, terms like highly scalable, efficient, and on-demand probably come to mind. Unfortunately, those same descriptors aren’t commonly associated…
Service organization control (SOC) reporting, in particular, can be a daunting task for many organizations. BARR has issued hundreds of SOC 1, SOC 2, and SOC 3 assurance reports, provided…
Reminder for 2015 planning: As announced on October 2, 2014, the American Institute of CPAs (AICPA) and CPA Canada have decided to discontinue the SysTrust and SOC 3 SysTrust for…
Problems arise all the time, but the only way to conquer them is to run right at them. That’s what Brad Thies has learned while leading Barr Assurance & Advisory…
Why are cloud service providers and data centers spending tens of thousands of dollars on a SOC 1 / SSAE 16 (SSAE 16) audit report that does not address their client’s…