Request A Demo!

Author - Rajesh Unadkat

GRC compliance

Three IT Areas for SOX Compliance

The Sarbanes-Oxley Act doesn’t just affect your company’s accounting department, SOX compliance is also critical to the IT department. IT managers need to be aware of SOX compliance issues and what they need to do to avoid running afoul of the law. SOX was passed in 2002, largely in response to corporation accounting scandals that had rocked the financial world in the early 00s. In addition to creating rules regarding accounting practices and corporate disclosures, the act also regulates how [...]

Internal audit software

Four GRC Trends to Watch for 2017

The new year is shaping up to be an exciting time for governance, risk management, and compliance professionals as globalization, technology, and demographic changes present new challenges and opportunities. Looking ahead for 2017, these trends have been identified as key areas of interest for GRC professionals: Cyber vulnerability – While IT departments have the lead role in tackling the threats posed by hacking and other computer issues, risk management, and compliance officers have an important role in accessing threats and [...]

GRC Tech Trends

Three GRC Tech Trends for 2017

Governance, risk management, and compliance constantly evolve, and 2017 will bring new challenges causing GRC professionals to race to keep up with the pace of change. Some of the most interesting trends for 2017 appear, not surprisingly, to be in the area of technology.  GRC solutions experts have been running ragged to keep up with the curveballs new technologies and applications can provide (the use of personal smartphones and devices in the office, cloud computing solutions, and more). The pace will [...]

Why GRC on the Salesforce ecosystem?

Aruvio is proud to be part of the Salesforce Ecosystem: Enabling 1.9 Million New Jobs and $389 Billion in New Revenue Over the Next Five Years, see here. The rate of cloud computing adoption growth is good. However the Salesforce cloud platform’s agility, reliability, scalability, security, and mobility is helping the Salesforce Ecosystem to grow at a higher rate than the overall cloud computing adoption growth. Built in enterprise class software features such as its: • flexible security model, • extensibility, • notifications and [...]

Controversy, Compliance and Changes in Fair Labors Standard Act (FLSA)

On May 18th, an update to the Fair Labors Standard Act (FLSA) was published, where any employee making less than $47,476 will now be classified as non-exempt.  Employers have until Dec 1st, 2016 to comply.  Obviously this new ruling will undoubtedly cause headaches for your compliance and audit professionals.    ‘Covered employers’ who violate this law can be subject to heavy fines, litigation, and/or audits.  Here are ways to mitigate your organization’s risks from the new FLSA: Audit employees salary [...]

Employee Policy and SOP Management

Going Nuclear on Employee Policy & SOP Management

One of the major challenges for organizations in managing GRC is that GRC is not really an application. It is a category of a lot of different applications associated with the adherence, tracking, remediation, and reporting of policies within an organization. Historically, these applications were managed as independent applications. Regulatory compliance was compliance, information security, safety programs, quality management, HR policy management, etc. But, as these programs have evolved and broadened, as well as, the increased continuous management; organizations are [...]

Fighting the 5 I's of Information Insecurity

Fighting the 5 I’s of Information Insecurity

Every time I see one of these reports, I fight the urge to “live off the grid.” Then I remember that I make my living in the technology business. But the point remains, the IT security paradigm is broken. Not just because the threats are increasing, but because the velocity of deconstruction is outpacing our ability to prevent catastrophic failure. The idea that we can lock everything down from the bottom up approach is not working. We need to [...]

FCPA Violations and FCPA Enforcement Has Increased

FCPA violations FCPA Enforcement Has Dramatically Increased

Building compliance programs to prevent, detect and eliminate FCPA violations Although the FCPA (Foreign Corrupt Practices Act) was enacted nearly thirty years ago, the legislation is now facing more rigorous enforcement than ever by the SEC and DOJ. The Obama Administration has made it clear to the business community that FCPA enforcement will be a high priority and also focused on new industries – pharmaceutical and financial institutions – while additional resources are assigned to support the crackdown. In response, [...]

Information Security Has Holes In Their Design Just Like Swiss Cheese

What Do Information Security and Swiss cheese have in common? Both have holes in their design.

The Central Problem for Information Security Professionals With the proliferation of BYOD devices, SaaS, social media, and mass proliferation of data & file sharing; IT organizations have lost control over the ability to lock down their networks and user devices. The result is that security has morphed from keeping “bad stuff out” to figuring out how to keep “our stuff in.” As a result, information security is highly dependent upon information governance and users following IT’s lead in protecting corporate [...]

Let Us Help Your Business

Request A Demo!