Here’s some links for Audit and IT Audit for dummies, one from the IIA, the other from ISACA. Most of them do not require being a member or logging in.
While these articles are not extensive, they will point new auditors in the right direction, and provide a refresher for the rest of us. Continue reading →
Like this:
Like Loading...
Filed under Audit, How to...
Tagged as access control, Audit, basic, basics, dummies, google, iia, isaca, it auditor, sampling, should know, social media, Tommie Singleton, workpapers
A friend of mine received the following email on Friday, 2 full days after the LinkedIn attack was made public, titled “Important update regarding your LinkedIn password”. Here’s the text she received, addressed to her by her first and last name:
[see UPDATE below]
Continue reading →
Like this:
Like Loading...
Filed under Security
Tagged as access, alert, attack, compromise, disable, hack, linkedin, password, posted, publish, receive, report, reset, Security, social media, spam, text, unauthorized

We all know that LinkedIn was hacked and lost at least 6.5 million hashed passwords, or at least that’s how many were was posted. Besides changing passwords, is anyone thinking about their LinkedIn lock-down/security settings? What about other social media? See further below instructions for locking down LinkedIn, Facebook, Twitter, and Google+.
Like this:
Like Loading...
Filed under Free, Security
Tagged as adaware, antivirus, backup, change, configure, eharmony, Facebook, free, google, guide, hack, i got in, incident, linkedin, lock down, log, malwarebytes, passwords, response, review, Security, social media, spybot, Twitter
I am often amused how common sense is paraded as a solution (aka “how to write a post about anything”).
When you consider the bullet points in 5 Tips to Survive a Social Media Disaster, you can see that those actions can be applied to many issues, including one of our favorite subjects, auditing.
Continue reading →
Like this:
Like Loading...
Filed under Audit
Tagged as Audit, communicate, formula, IT, kindness, listen, plan, respond, Security, social media, success, tips
On Facebook, you can share your pictures; on LinkedIn, you can share your resume; on Twitter, you can share what you had for second breakfast.
On Blippy, you can share your credit card purchases!
Continue reading →
Like this:
Like Loading...
Filed under Security
Tagged as blippy, Bruce Schneier, credit card, Ed Skoudis, Facebook, iTunes, netflix, purchases, second breakfast, shareoholics, social media, Twitter