Internal Audit and Compliance Blog
Topics: Risk Management
Topics: Hiring a Consultant
Technology makes our lives easier and our companies run more smoothly—most of the time. But not surprisingly those same technologies that are supposed to make your role easier, such as data-sharing software, social media, mobile computing and other emerging technologies, are actually quietly adding risks and new vulnerabilities for your company.
Topics: Risk Management
What is Twitter? More business use than you think...According to the Twitter website, Twitter is “without a doubt the best way to share and discover what is happening right now.” For the most part, I tend to agree with that. It is an incredibly simple way to understand what is going on with people, concepts, trends or subjects in real time as they are happening or transpiring. And while it may have started out as a mostly social way to ‘follow’ your friends, relatives and other people of interest (as noted in this YouTube video describing what Twitter is), it has also become a very relevant way to follow business trends, industry leaders, breaking news and companies.
Based on the Fraud Triangle, developed by criminologist Dr. Donald Cressey, three factors must be present for an ordinary person to commit occupational fraud: Opportunity, Rationalization and Pressure.
As recently as December of 2009, I engaged in a conversation with a Director of Internal Audit on what exactly Continuous Auditing and Continuous Monitoring are. I offered what my interpretation of each was and he did the same. They were not exact matches.
During a recent business trip to Indianapolis, I was lucky enough to have the opportunity to stay with an old college roommate. While there I had a brief moment to talk to his wife, Courtney (a made up name to protect the innocent), about a current goal of hers: to run a marathon (26.2 miles). The Disney Marathon in fact, taking place in early January 2010.
In the August 2009 issue of the Internal Auditor magazine, the Institute of Internal Auditors (IIA) cover story focused on Data Gathering, getting to the right data and analyzing it to benefit the Internal Audit process. Several data analysis software tools were identified, but the majority of those polled who use them are using four primary tools: ACL (51%), Excel (14%), Access (9%) and IDEA (6%).