Resources

Here’s what we’re thinking about, writing about, and reading about.
We hope you find it helpful.

In the News

Easing into Automation: How to Digitally TransformEasing into Automation: How to Digitally Transform
Find out about small steps you can take now to digitally transform your CPA firm.
READ MORE
READ MORE
EdUp AI podcastEdUp AI podcast
Mike DeKock talks to Jason Gulya on the EdUp AI podcast focused on building a blueprint for how colleges can leverage artificial intelligence.
READ MORE
READ MORE
SOC 2 Reports Reimagined: From Burden to Business EnablerSOC 2 Reports Reimagined: From Burden to Business Enabler
Read about why it's time to change our outlook and perception of SOC 2 audits.
READ MORE
READ MORE

Written by us

GRC SuperheroesGRC Superheroes
Putting the right team together can be exciting and challenging. It's something we think about a lot, so we decided to share the superheroes that make up our GRC dream team.
READ MORE
READ MORE
Understanding the Nuances: Privacy and ConfidentialityUnderstanding the Nuances: Privacy and Confidentiality
Within the SOC 2 framework, two crucial categories—privacy and confidentiality—play distinct roles in safeguarding sensitive data. Our latest article outlines each category and the differences between the two.
READ MORE
READ MORE
Does MJD offer SOC 2® readiness assessments?Does MJD offer SOC 2® readiness assessments?
Find out why we don't offer SOC 2 readiness assessments, and how we approach the early phases of a SOC 2 report instead.
READ MORE
READ MORE

Recommended by us

Unlocking Trust: How SOC 2 Validated Our Security ProgramUnlocking Trust: How SOC 2 Validated Our Security Program
Check out Software Secured's story focused on the process of working on their SOC 2 report with MJD Advisors
READ MORE
READ MORE
Managing the move from ISO 27001 certification to SOC 2 completionManaging the move from ISO 27001 certification to SOC 2 completion
We partnered with SecFix on this article to share the differences between ISO 27001 certification and SOC 2 completion, and how you can leverage your work from one to the other.
READ MORE
READ MORE
Penetration Testing: Why It’s Important + Common TypesPenetration Testing: Why It’s Important + Common Types
Penetration testing simulates an outside attack on your applications and network. Drata shares the types of pen tests and how to conduct one to prevent risk.
READ MORE
READ MORE

If you have questions or content you’d like to see, email us at info@mjd.cpa.
For more information on SOC report types and usage, please visit the American Institute of Certified Public Accountant's (AICPA) website.