Skip to main content

Blog

  • data privacy

    Simplifying HIPAA Compliance for Business Associates

    Organizations are beginning to understand that the regulations apply not only to Covered Entities (health care providers, health plans, and clearinghouses), but also Business Associates - third parties that may also have access to patient data.

    • Published:

    • Category:Data Privacy

  • audit

    10 Strategies for Remediating SoDs

    Management of separation of duty (SoD) issues continues to be a challenge at organizations of all sizes.

    • Published:

    • Category:IT/Internal Audit

  • cyber security

    NIST Security Publication

    The National Institute of Standards and Technology (NIST) has issued a Special Publication that details the actions that systems engineers should take to develop more defensible and survivable systems.

    • Published:

    • Category:Cyber Security

  • cyber security

    Cyber Standards for Banks

    Federal regulators have issued an advanced notice of proposed rulemaking (ANPR) requesting public comment on a set of proposed cyber security risk management standards to be applied to large banks. We break down what this means for you.

    • Published:

    • Category:Cyber Security

  • audit

    Preparing for Model Audit Rule

    For small and mid-sized insurers, compliance with the Model Audit Rule (MAR) requires an enormous lift from the internal audit function.

    • Published:

    • Category:IT/Internal Audit

  • cyber security

    Best Practices for Securing IoT

    With up to 50 billion connected devices expected to be online by 2020, the internet of things (IoT) poses a major security threat for almost all organizations. Last month, hackers hijacked nearly 100,000 security cameras. Where will the next major IoT attack come from?

    • Published:

    • Category:Cyber Security

  • data analytics

    5 Steps to Better Analytics

    Internal audit executives are running toward data analytics in huge numbers. Here are the five biggest tips for launching a successful internal audit analytics program.

    • Published:

    • Category:Data Analytics

  • audit

    When Fraud Goes Unchecked

    A visual look at the impact of fraud on modern businesses and what you can do to prevent it. Statistics from the ACFE 2015 Report to the Nations.

    • Published:

    • Category:IT/Internal Audit

  • cyber risk

    AICPA Cybersecurity Risk Management

    Understanding and reporting on cyber risk has long posed a challenge for non-technical audit and compliance professionals.

    • Published:

    • Category:Cyber Risk

  • cyber risk

    August Media Roundup

    August was another busy month for Sunera’s thought leaders. We’ve pulled the highlights from the past few weeks into our monthly media roundup. 

    • Published:

    • Category:Cyber Risk