Service: Cybersecurity

Our team of security and audit professionals help clients build and maintain security programs that reduce risk, mitigate threats and maintain compliance.

PCI DSS Compliance: Document Types, Tasks, and Cost

The first step to compiling effective PCI documentation is to define the various types of documents you will need to record. The second step is to identify all the various tasks that will be defined in your procedures. This article covers three important document types and tasks to consider.

Top 11 Windows Events to Monitor

Monitoring is an imperative part of a healthy information security program. Here are the Windows events you should be monitoring.

Prevent Church Fraud with Better Internal Controls

A majority of perpetrators of church fraud are first-time offenders without a criminal history, and most are long-time employees of the church. This article gives tips on how to protect the church’s resources and improve financial oversight.

eDiscovery or Digital Forensics?

Here’s a brief explanation and comparison of both, as well as a few key reasons that it’s important to know the difference and choose the right experts carefully.