The second article in a series on Information Security introduces CPAs to key considerations for effective Security Policy development. Learn how to develop and implement effective IT policies and what to look for in client policies. Discover how IT Policies and Procedures support critical internal controls such as segregation of duties and fraud prevention, and provide critical insight into an entity's control environment. Click here to read the article.
Published in Brief: