Resources

Here’s what we’re thinking about, writing about, and reading about.
We hope you find it helpful.

In the News

Mike DeKock on Building Competitive AdvantageMike DeKock on Building Competitive Advantage
How do the value creation principles of subjective value, entrepreneurship and creativity apply in a highly technical rules-based environment like SOC Compliance audits. These are objective validations of data security measures based on customer-defined criteria similar to traditional financial audits but more specific and subjective.
READ MORE
READ MORE
Family Business Part 2 Wayne Elliot and Security Audits Mike Dekock Family Business Part 2 Wayne Elliot and Security Audits Mike Dekock
March 28, 2024 - Family Businesses 2 Wayne Elliott and Security Audits Mike DeKock - School for Startups Radio Entrepreneur Podcast - Learn to be a low risk entrepreneur!
READ MORE
READ MORE
Debunking compliance myths in the digital eraDebunking compliance myths in the digital era
A System and Organization Controls 2 (SOC 2) report shows how compliance can continuously improve an organization and add value.
READ MORE
READ MORE

Written by us

Does MJD offer SOC 2® readiness assessments?Does MJD offer SOC 2® readiness assessments?
Find out why we don't offer SOC 2 readiness assessments, and how we approach the early phases of a SOC 2 report instead.
READ MORE
READ MORE
Why do SOC reports have to be issued by a CPA firm?Why do SOC reports have to be issued by a CPA firm?
Find out why a CPA firm must issue your SOC report and why that's actually a good thing.
READ MORE
READ MORE
What should the scope period be for my SOC 2® Type 2 report?What should the scope period be for my SOC 2® Type 2 report?
Are you looking to better understand scope periods and how to decide on yours? Our latest blog outlines some things to consider.
READ MORE
READ MORE

Recommended by us

Penetration Testing: Why It’s Important + Common TypesPenetration Testing: Why It’s Important + Common Types
Penetration testing simulates an outside attack on your applications and network. Drata shares the types of pen tests and how to conduct one to prevent risk.
READ MORE
READ MORE
How Penetration Testing Increases Your ROI of ISO 27001 ComplianceHow Penetration Testing Increases Your ROI of ISO 27001 Compliance
Software Secured shares exactly how penetration testing increases the ROI of your ISO 27001 compliance.
READ MORE
READ MORE
ISO/IEC 27001: 2022 - Your Guide to the Updates and How to Get (and Stay) CompliantISO/IEC 27001: 2022 - Your Guide to the Updates and How to Get (and Stay) Compliant
Echelon Risk + Cyber, in this article, breaks down everything you need to know about the ISO 27001: 2022 updates.
READ MORE
READ MORE

If you have questions or content you’d like to see, email us at info@mjd.cpa.
For more information on SOC report types and usage, please visit the American Institute of Certified Public Accountant's (AICPA) website.