-
Joshua Tarlow commented on the post, Week 7 Questions, on the site 8 years ago
Think one of the larger risks for a US based company that operates internationally is the Foreign Corrupt Practices Act (FCPA). It is broadly worded which makes controls harder to define. Especially for emerging markets, as noted above, face systemic corruption. In fact, it may be considered the cost of doing business in a particular country to…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
As we continue to learn about business processes and ERP systems we often discuss financial or account related terms and concepts. How much finance and accounting knowledge should IT personnel supporting business applications know and learn? Explain
An IT professional should at least have a basic understanding of business applications in…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
“Government lawyers don’t understand the Internet. That’s a problem”
The article discusses the dearth of lawyers with a science or technical background, and the effect it is happening in prosecutions and the legal profession. It first chronicles the physics professor who was arrested for espionage and accused of working for China. Eve…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
I definitely agree to all of your risk strategies. Although I was thinking that if an organization is affected by an EMP, than most likely others will be as well. So even if that data center is protected and survives the EMP, how will the surrounding damage affect its ongoing operation? If it is severe and infrastructure and businesses are…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
What would the cost be for an underground data center. Seems like it would be more expensive than building one above ground. Would the risk/impact justify the expense? Without considering the cost, it would be an effective strategy.
-
Joshua Tarlow commented on the post, Weekly Question #4: Complete by February 15, 2017, on the site 8 years ago
Third party shipping is definitely a concern, especially since the actual logistics are external to the companies oversight and internal controls. Remember a few years ago Amazon shipments for Christmas were delivered late because Fed Ex was not able to handle last minute volume of orders from Amazon. As a result many shipments were not delivered…[Read more]
-
Joshua Tarlow commented on the post, Weekly Question #4: Complete by February 15, 2017, on the site 8 years ago
Definitely agree that Finance should care more about the collection process than sales. Have a responsibility oversee collection as well as other financial aspects of an organization. Also helps with segregation of duties if a different person than the one selling is responsible for protection. It might enable fraud for employees in sales if they…[Read more]
-
Joshua Tarlow commented on the post, Weekly Question #4: Complete by February 15, 2017, on the site 8 years ago
Definitely a significant risk for start ups since they have fewer employees. Also seems to be a trend with technology startups that later grow into big companies have relatively few employees compared to there companies of their valuation. Remember when WhatsApp was acquired by Facebook for over $20 billion but had relatively few employees for a…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
You’ve now seen the entire Order to Cash (OTC) Process. If you were responsible for the controls of this process – what would keep you up at night (e.g. be your area of most concern)? Explain
There are definitely a lot of controls would concern me, but the internal controls for cash would probably worry me most. It is easier for an emp…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
Definitely a huge security issue and I don’t think people are paying enough attention to it yet. Anything that can connect to the internet can be hacked. Similar problem that many routers have, in that they are not designed and manufactured with security in mind, nor are they consistently updated with security patches. As much as I like the idea…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
Definitely a serious issue and a cohesive national policy is needed to secure election infrastructure. However, they don’t really need to hack election results to delegitimize the results. Russia has had success in Europe promoting far right parties which further destabilize an already delicate social climate. Or they could continue to release…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
Sounds similar to the another IRS scam where victims would receive a phone call from someone claiming to be from the IRS alleging back taxes owed. Victims would be threatened with prison and would then receive a call from another scammer impersonating a police officer. Many people ended up immediately wire money to an account using Money Gram.…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
“THINK TANK REPORT WARNS OF CYBERTERRORISM IN SPACE”
The article discusses the emerging cyber security vulnerabilities and threats from satellites. More and more of economic activity/productivity are dependent on satellites including functions such as GPS and communication. As more satellites enter earth’s orbit, the potential for debris from…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
What is OSI model? What’s the main function of each OSI layer?
* The OSI model is a reference/framework for vendors/developers to create products with interoperability. It is the primary method of communication between two endpoints in a telecommunication network. The model is comprised of seven layers from which data flows from one a…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
A VPN can definitely open up new security issues. It’s a difficult balance between building secure architecture and applications and preventing its use for nefarious activities. But it’s not possible at the moment to maintain the integrity technology like VPNs while prevent these issues. From my personal experiece, I know people who use VPNs to…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
What are the advantages of VPN?
A VPN allows companies to securely transit data to an external network/device. Data transmitted through a VPN is encrypted so even if it is compromised, it is still safe. Businesses often need to access and transmit data to a remote server, or allow an employee to access a network from another location. Even with…[Read more]
-
Joshua Tarlow commented on the post, Week 5 Questions, on the site 8 years ago
Definitely agree that the culture is an important component to fraud, and this particular example. Although the employees may not be able to afford the cars they manufacture, there clearly seems to be something else behind their actions. One thing could be that they do not have loyalty to the company, or feel positively towards it. Some companies…[Read more]
-
Joshua Tarlow commented on the post, Week 5 Questions, on the site 8 years ago
Your point about collusion made me consider it from a different perspective. Even if he didn’t need or receive any help, other employees could still be complicit. He stole a lot of parts over a long period of time, and more than likely someone would see him placing one in his lunchbox or another incriminating act. Even without proper audits or…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
I would be curious to see if the cost implement mandatory searches of employees is effective at preventive thefts. And if it is, is it cost effective? I can see a scenario where it does reduce employee thefts but the cost to implement the program could be larger than any potential savings from stolen inventory.
Personally, I do think that the…[Read more]
-
Joshua Tarlow posted a new activity comment 8 years ago
Using the Fraud Triangle analyze the ‘One Piece at a Time’ video scenario and explain how the environment was favorable to Fraud.
All three components of the fraud triangle are present in the video, rationalization, pressure/incentive, and opportunity. First, the subject definitely felt pressure/incentive to commit the fraud. He began to wor…[Read more]
- Load More