Wenlin Zhou

  • Wenlin Zhou posted a new activity comment 4 days, 16 hours ago

    Big data is a big topic of conversation—so it might be unsurprising to learn 47% of respondents are using sensitive data in big data environments. When it comes to security hered, respondents cite their top fear as “sensitive data everywhere” (46%), followed by “security of reports” (44%) and “privileged user access” (36%).

    “The digital wor…[Read more]

  • Wenlin Zhou posted a new activity comment 4 days, 16 hours ago

    The executive is suspected of forging documents and colluding with third parties to steal funds, ABB said, estimating it would take a pre-tax charge of about $100 million for the affair, which analysts said raised concerns about its corporate oversight.The company claimed that he embezzled a combined 35.7 billion won ($31.31 million) in 73…[Read more]

  • Whether or not you work in IT security, distributed denial of service (DDoS) attacks are becoming more visible by the day. In the last three months of 2016 alone, DDoS attacks greater than 100Gbps increased by […]

  • One of the appeals of Telegram is that it has encryption options for Android and iOS, whereby it uses your contact list to prepopulate contacts inside the app. Also, when someone in your contact list signs up for […]

    • Oh, the irony! I remember founder of Telegram in the Tech Crunch disrupt constantly reminding the audience how unsafe it is to send messages on Whatsapp and Facebook messenger and how Telegram is the “Whatsapp killer” and addresses these issues and guarantees complete privacy to users for sending messages.

  • The continued digitization of the financial services industry has led to a boon in electronic payments technology. Even as the transition to electronic receivables and payables improves efficiencies and reduces […]

  • Wenlin Zhou posted a new activity comment 1 month ago

    I think Lazy is worse in the auditor. If a person is lazy, he will not able to collect and analyze evidence, and he may past last year audit results and documentation. the lazy factor, which is likely an underlying issue that stands in the way of you enjoying your career (and perhaps your entire life). The lazy employee may ignore the significant…[Read more]

  • APT28 is considered to be one of the most sophisticated and successful cyberespionage groups in the world and it frequently uses zero-day exploits—exploits for previously unknown vulnerabilities. The group has been blamed for many hacking operations around the world over the years, and its selection of targets has frequently reflected Russia’s geo…[Read more]

  • Wenlin Zhou posted a new activity comment 1 month ago

    Millennials will help the Audit and Assurance profession. Managers need to really understand the personal and professional goals of millennials. Put them on special rotational assignments more frequently to give them a sense that they are moving toward something and gaining a variety of experiences. Challenge them to come up with new ways to…[Read more]

  • German regulators have banned an internet-connected doll called “My Friend Cayla” that can chat with children, warning Friday that it was a de facto “spying device”. Parents were urged to disable the interactive […]

    • European nations are definitely concerned about privacy, and this is just another great example of that mentality. I am always telling people with children to be careful sharing photos online because of the metadata attached to photos which could tell people with bad intentions a lot of information that parents wouldn’t want available about their children. This doll reminds me of the hack that took place in late 2015 against Vtech. Vteach produces a lot of learning products for children, and the hack exposed hundreds of thousands of children’s data sets. It’s really scary why any entity would want that kind of information, and even scarier what might be done with it once acquired by those with malicious intent.

  • Wenlin Zhou posted a new activity comment 1 month, 1 week ago

    Which one of these do you consider the worst type from the standpoint of the auditee? Why? The auditee is the person or group responsible for the subject matter being audited.
    From the standpoint of the auditee, I would consider that the Faker is the worst type of auditors. IT technology is changing every day, so the IS auditor cannot know…[Read more]

  • Wenlin Zhou posted a new activity comment 1 month, 1 week ago

    Technology provides a wide range of tools entrepreneurs can use to guide their new companies through the startup and growth stages. Small-business accounting, marketing and communication have been revolutionized by advances in computer, network and communications technology, and businesses in a range of industries continually adapt to take full…[Read more]

  • Hummingbad has been replaced as the top mobile malware threat. It has been usurped by Triada, a modular backdoor for Android. According to Check Point Security, Triada grants super-user privileges to downloaded […]

    • Wenlin, this article is really interesting! It reminded me another article that I read a couple weeks ago. The article I read talked about that an espionage Trojan called SpyNote RAT has been found masquerading as the popular Netflix app, to trick Android users into downloading it. Once installed, the malware is capable of activating the device’s microphone and listening to live conversations; uninstalling antivirus software; copying files from the device to the hacker’s server; recording screen captures; viewing contacts; reading SMS messages; and gaining remote control of the device.
      A suggestion is that all mobile users to take precautions when downloading anything to their devices, including apps. And we should also avoid side-loading apps from third-party app stores and avoid the temptation to download and play games that re not yet officially available on Android.

  • Nice shared. Wells Fargo comes to my mind which is the last year scandal due to lack of internal control. As most of us know, Wells Fargo has recently disclosed that a large scale fraud has taken place within the company, which resulted in 5,300 employees being fired or about 2% of its workforce. Employees incentivized to open new accounts, such…[Read more]

  • Pelican, a global provider of payments and compliance solutions for banks and corporates, is using the latest in technology to protect its clients from wire transfer fraud through its new Pelican Secure […]

  • I agree with you. There are five broad ways in which using big data can create value. First, big data can unlock significant value by making information transparent and usable at much higher frequency. Second, as organizations create and store more transactional data in digital form, they can collect more accurate and detailed performance…[Read more]

  • I am Wenlin Zhou, currently I am pursuing my master degree in IT auditing and cyber security in temple university. And I got my bachelor degree in accounting. The reason for my transfer is because in this […]

  • Wenlin Zhou posted a new activity comment 3 months, 1 week ago

    Yes, I agree with you. Unethical behavior is not only what you believe to be right and fair, it is a reflection of your personal brand and what people can expect from you personally and professionally. Therefore, the independence is very necessary for the auditor, and auditor should obey the ethical code such as AICPA ethical code.

  • Wenlin Zhou posted a new activity comment 3 months, 1 week ago

    SAP’s GRC module may be important and effective, but can the cost of GRC be justified? Explain

    In general, we deal with GRC issues in situations involving SOX or HIPAA, and when working in the public sector. This area of control and access management is highly important, and usually narrowly focused. The SAP GRC module is targeted at this a…[Read more]

  • Wenlin Zhou posted a new activity comment 3 months, 1 week ago

    How much of automated controls should be desired? Is it beneficial to consider controls at the initial design phase or controls are introduced as and when needs arise?

    the IT application controls are the opposite of the manual controls. These controls are implemented in the IT or ERP systems and are used every time transactions go through the…[Read more]

  • Wenlin Zhou posted a new activity comment 3 months, 1 week ago

    I agree with you. Audit independence refers to an unbiased mental attitude in making decisions throughout the audit and financial reporting that without independence, audit has no value, as the result, auditor should maintain independent and exists to professional ethics, Independent auditor is expected to be without bias with respect to the c…[Read more]

  • Load More
Skip to toolbar