Resources

Here’s what we’re thinking about, writing about, and reading about.
We hope you find it helpful.

In the News

How a Cyber Spring Cleaning Can Protect Data, Build Client TrustHow a Cyber Spring Cleaning Can Protect Data, Build Client Trust
Discover how to empower your business with better data security to boost customer confidence.
READ MORE
READ MORE
Bridging the Gap: Keys to Embracing AI in 2024Bridging the Gap: Keys to Embracing AI in 2024
AI is unchartered territory for many companies; however, the more it evolves, the more it becomes clear that AI adds critical business value when used responsibly.
READ MORE
READ MORE
Not Your Typical CPA FirmNot Your Typical CPA Firm
A CEO on a mission to guide companies through the ever-changing world of technology.
READ MORE
READ MORE

Written by us

Is the auditor’s role in a SOC 2® audit just to find gaps in our system?Is the auditor’s role in a SOC 2® audit just to find gaps in our system?
During the audit process, we might identify gaps or control exceptions, but our role encompasses much more than that. 
READ MORE
READ MORE
What controls are required for SOC 2® reports?What controls are required for SOC 2® reports?
There is nuance to this question, and other well-meaning and very smart people that I respect might give a different answer. But within the volumes of literature that set the standards, the true answer is this: There are absolutely no control requirements for SOC 2 reports.
READ MORE
READ MORE

Recommended by us

How Penetration Testing Increases Your ROI of ISO 27001 ComplianceHow Penetration Testing Increases Your ROI of ISO 27001 Compliance
Software Secured shares exactly how penetration testing increases the ROI of your ISO 27001 compliance.
READ MORE
READ MORE

If you have questions or content you’d like to see, email us at info@mjd.cpa.
For more information on SOC report types and usage, please visit the American Institute of Certified Public Accountant's (AICPA) website.