Information Technology Tag

Data security is a critical part of the audit risk assessment. If your financial statements are audited, your audit team will tailor their procedures to answer critical questions about cyber risks and the effectiveness of your internal controls. While conducting fieldwork, they will assess how...

Fraud perpetrators are constantly altering their methods to evade detection. Nimble cybercriminals, for example, are why information technology security companies update their software so frequently. The use of deepfakes (a word derived from ‘deep learning’ and ‘fake’) is one of the latest threats to emerge....

In one recent cybercrime scheme, a mortgage company employee accessed his employer’s records without authorization, then used stolen customer lists to start his own mortgage business. The perpetrator hacked the protected records by sending an email containing malware to a coworker. This particular dishonest worker was...