Resources

Here’s what we’re thinking about, writing about, and reading about.
We hope you find it helpful.

In the News

3 Things CTO's Should Know About SOC 2 Compliance3 Things CTO's Should Know About SOC 2 Compliance
Read about three things that can help clarify and change your perception of SOC 2 examinations.
READ MORE
READ MORE
Cyber crises a warning about BCP, say expertsCyber crises a warning about BCP, say experts
Read about why experts say it's time to figure out and document your backup plan for mission-critical systems.
READ MORE
READ MORE
How a Cyber Spring Cleaning Can Protect Data, Build Client TrustHow a Cyber Spring Cleaning Can Protect Data, Build Client Trust
Discover how to empower your business with better data security to boost customer confidence.
READ MORE
READ MORE

Written by us

Does MJD offer SOC 2® readiness assessments?Does MJD offer SOC 2® readiness assessments?
Find out why we don't offer SOC 2 readiness assessments, and how we approach the early phases of a SOC 2 report instead.
READ MORE
READ MORE
Why do SOC reports have to be issued by a CPA firm?Why do SOC reports have to be issued by a CPA firm?
Find out why a CPA firm must issue your SOC report and why that's actually a good thing.
READ MORE
READ MORE
What should the scope period be for my SOC 2® Type 2 report?What should the scope period be for my SOC 2® Type 2 report?
Are you looking to better understand scope periods and how to decide on yours? Our latest blog outlines some things to consider.
READ MORE
READ MORE

Recommended by us

The Truth About AuditsThe Truth About Audits
Jemurai talks about the good, bad, and ugly they see around cybersecurity audits.
READ MORE
READ MORE

If you have questions or content you’d like to see, email us at info@mjd.cpa.
For more information on SOC report types and usage, please visit the American Institute of Certified Public Accountant's (AICPA) website.