As the manager of IT Audit, Greg Loge aims to ensure UC Davis computer networks are equipped with safeguards like firewalls, such as the one running on the monitor behind him, regulating traffic in ...
If you are like most administrators, you want to know who is logging on, to which computer, and accessing resources on your servers. For your Windows computers and Active Directory environment, you ...
Carol Hall failed one of the first computer auditing exams she ever took, miserably. But it did not stop her from going on to establish a career in auditing and also co-found the Bermuda chapter of ...
This concentration equips students with skills and tools required to examine and evaluate an organization's information technology infrastructure, policies and operations. It focuses on the process of ...
JEFFERSON CITY (AP) - A new audit finds state agencies could do a better job of tracking their computers and planning for buying new ones. The state audit studied seven agencies and found none could ...
An risk management audit function is required to ensure sensitive data and valuable assets are appropriately safeguarded. Take a hard look at who has access to sensitive data and whether those ...
The computer network for the city of Hartford is in need of major safety and security upgrades. The NBC Connecticut Troubleshooters obtained a report, written by the Hartford Internal Audit Department ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results