Resources

Here’s what we’re thinking about, writing about, and reading about.
We hope you find it helpful.

In the News

Mike DeKock on Building Competitive AdvantageMike DeKock on Building Competitive Advantage
How do the value creation principles of subjective value, entrepreneurship and creativity apply in a highly technical rules-based environment like SOC Compliance audits. These are objective validations of data security measures based on customer-defined criteria similar to traditional financial audits but more specific and subjective.
READ MORE
READ MORE
Everything you know about audits and compliance is changingEverything you know about audits and compliance is changing
Throughout history, the prevailing narrative surrounding compliance has been one of necessity, not choice, and audits are approached with a sense of inevitability rather than opportunity.
READ MORE
READ MORE

Written by us

What's required after my first SOC 2® report?What's required after my first SOC 2® report?
You’ve completed your SOC 2 report. That first-time report can be a lot of work, and it’s worth celebrating while you hang the new AICPA logo on the website. So what’s next?
READ MORE
READ MORE
SOC 2® Reports and Penetration TestsSOC 2® Reports and Penetration Tests
We get asked a lot about whether penetration testing is required to complete a SOC 2 report. Our latest article explores this question and more.
READ MORE
READ MORE
SOC Report FAQsSOC Report FAQs
Check out our SOC Report FAQs written by ChatGPT and edited by MJD auditors.
READ MORE
READ MORE

Recommended by us

Unlocking Trust: How SOC 2 Validated Our Security ProgramUnlocking Trust: How SOC 2 Validated Our Security Program
Check out Software Secured's story focused on the process of working on their SOC 2 report with MJD Advisors
READ MORE
READ MORE
Managing the move from ISO 27001 certification to SOC 2 completionManaging the move from ISO 27001 certification to SOC 2 completion
We partnered with SecFix on this article to share the differences between ISO 27001 certification and SOC 2 completion, and how you can leverage your work from one to the other.
READ MORE
READ MORE
Penetration Testing: Why It’s Important + Common TypesPenetration Testing: Why It’s Important + Common Types
Penetration testing simulates an outside attack on your applications and network. Drata shares the types of pen tests and how to conduct one to prevent risk.
READ MORE
READ MORE

If you have questions or content you’d like to see, email us at info@mjd.cpa.
For more information on SOC report types and usage, please visit the American Institute of Certified Public Accountant's (AICPA) website.