Resources

Here’s what we’re thinking about, writing about, and reading about.
We hope you find it helpful.

In the News

3 Things CTO's Should Know About SOC 2 Compliance3 Things CTO's Should Know About SOC 2 Compliance
Read about three things that can help clarify and change your perception of SOC 2 examinations.
READ MORE
READ MORE
Cyber crises a warning about BCP, say expertsCyber crises a warning about BCP, say experts
Read about why experts say it's time to figure out and document your backup plan for mission-critical systems.
READ MORE
READ MORE
How a Cyber Spring Cleaning Can Protect Data, Build Client TrustHow a Cyber Spring Cleaning Can Protect Data, Build Client Trust
Discover how to empower your business with better data security to boost customer confidence.
READ MORE
READ MORE

Written by us

What controls are required for SOC 2® reports?What controls are required for SOC 2® reports?
There is nuance to this question, and other well-meaning and very smart people that I respect might give a different answer. But within the volumes of literature that set the standards, the true answer is this: There are absolutely no control requirements for SOC 2 reports.
READ MORE
READ MORE
Is the auditor’s role in a SOC 2® audit just to find gaps in our system?Is the auditor’s role in a SOC 2® audit just to find gaps in our system?
During the audit process, we might identify gaps or control exceptions, but our role encompasses much more than that. 
READ MORE
READ MORE
How do I communicate my new SOC 2® Report? SOC 2 Certified?How do I communicate my new SOC 2® Report? SOC 2 Certified?
We highly recommend you do not use the phrase “SOC 2 Certified." Yes, you see it everywhere, and your competitors are celebrating their certificate - but don’t do it because such a thing does not exist.
READ MORE
READ MORE

Recommended by us

Unlocking Trust: How SOC 2 Validated Our Security ProgramUnlocking Trust: How SOC 2 Validated Our Security Program
Check out Software Secured's story focused on the process of working on their SOC 2 report with MJD Advisors
READ MORE
READ MORE
Managing the move from ISO 27001 certification to SOC 2 completionManaging the move from ISO 27001 certification to SOC 2 completion
We partnered with SecFix on this article to share the differences between ISO 27001 certification and SOC 2 completion, and how you can leverage your work from one to the other.
READ MORE
READ MORE
ChatGPT and SecurityChatGPT and Security
Jemurai shares their ideas and research to present a balanced view on the security implications of using ChatGPT
READ MORE
READ MORE

If you have questions or content you’d like to see, email us at info@mjd.cpa.
For more information on SOC report types and usage, please visit the American Institute of Certified Public Accountant's (AICPA) website.