-
Wenlin Zhou commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 8 months ago
APT28 is considered to be one of the most sophisticated and successful cyberespionage groups in the world and it frequently uses zero-day exploits—exploits for previously unknown vulnerabilities. The group has been blamed for many hacking operations around the world over the years, and its selection of targets has frequently reflected Russia’s geo…[Read more]
-
Wenlin Zhou posted a new activity comment 7 years, 8 months ago
Millennials will help the Audit and Assurance profession. Managers need to really understand the personal and professional goals of millennials. Put them on special rotational assignments more frequently to give them a sense that they are moving toward something and gaining a variety of experiences. Challenge them to come up with new ways to…[Read more]
-
Wenlin Zhou wrote a new post on the site MIS5208 Spring 2017 7 years, 8 months ago
German regulators have banned an internet-connected doll called “My Friend Cayla” that can chat with children, warning Friday that it was a de facto “spying device”. Parents were urged to disable the interactive […]
-
Wenlin Zhou posted a new activity comment 7 years, 8 months ago
Which one of these do you consider the worst type from the standpoint of the auditee? Why? The auditee is the person or group responsible for the subject matter being audited.
From the standpoint of the auditee, I would consider that the Faker is the worst type of auditors. IT technology is changing every day, so the IS auditor cannot know…[Read more] -
Wenlin Zhou posted a new activity comment 7 years, 8 months ago
Technology provides a wide range of tools entrepreneurs can use to guide their new companies through the startup and growth stages. Small-business accounting, marketing and communication have been revolutionized by advances in computer, network and communications technology, and businesses in a range of industries continually adapt to take full…[Read more]
-
Wenlin Zhou wrote a new post on the site MIS5208 Spring 2017 7 years, 9 months ago
Hummingbad has been replaced as the top mobile malware threat. It has been usurped by Triada, a modular backdoor for Android. According to Check Point Security, Triada grants super-user privileges to downloaded […]
-
Wenlin, this article is really interesting! It reminded me another article that I read a couple weeks ago. The article I read talked about that an espionage Trojan called SpyNote RAT has been found masquerading as the popular Netflix app, to trick Android users into downloading it. Once installed, the malware is capable of activating the device’s microphone and listening to live conversations; uninstalling antivirus software; copying files from the device to the hacker’s server; recording screen captures; viewing contacts; reading SMS messages; and gaining remote control of the device.
A suggestion is that all mobile users to take precautions when downloading anything to their devices, including apps. And we should also avoid side-loading apps from third-party app stores and avoid the temptation to download and play games that re not yet officially available on Android.
-
-
Wenlin Zhou commented on the post, Progress Report for Week Ending, September 29, on the site 7 years, 9 months ago
Nice shared. Wells Fargo comes to my mind which is the last year scandal due to lack of internal control. As most of us know, Wells Fargo has recently disclosed that a large scale fraud has taken place within the company, which resulted in 5,300 employees being fired or about 2% of its workforce. Employees incentivized to open new accounts, such…[Read more]
-
Wenlin Zhou wrote a new post on the site MIS5208 Spring 2017 7 years, 9 months ago
Pelican, a global provider of payments and compliance solutions for banks and corporates, is using the latest in technology to protect its clients from wire transfer fraud through its new Pelican Secure […]
-
Wenlin Zhou commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 7 years, 9 months ago
I agree with you. There are five broad ways in which using big data can create value. First, big data can unlock significant value by making information transparent and usable at much higher frequency. Second, as organizations create and store more transactional data in digital form, they can collect more accurate and detailed performance…[Read more]
-
Wenlin Zhou wrote a new post on the site MIS5208 Spring 2017 7 years, 9 months ago
I am Wenlin Zhou, currently I am pursuing my master degree in IT auditing and cyber security in temple university. And I got my bachelor degree in accounting. The reason for my transfer is because in this […]
-
Wenlin Zhou posted a new activity comment 7 years, 11 months ago
Yes, I agree with you. Unethical behavior is not only what you believe to be right and fair, it is a reflection of your personal brand and what people can expect from you personally and professionally. Therefore, the independence is very necessary for the auditor, and auditor should obey the ethical code such as AICPA ethical code.
-
Wenlin Zhou posted a new activity comment 7 years, 11 months ago
SAP’s GRC module may be important and effective, but can the cost of GRC be justified? Explain
In general, we deal with GRC issues in situations involving SOX or HIPAA, and when working in the public sector. This area of control and access management is highly important, and usually narrowly focused. The SAP GRC module is targeted at this a…[Read more]
-
Wenlin Zhou posted a new activity comment 7 years, 11 months ago
How much of automated controls should be desired? Is it beneficial to consider controls at the initial design phase or controls are introduced as and when needs arise?
the IT application controls are the opposite of the manual controls. These controls are implemented in the IT or ERP systems and are used every time transactions go through the…[Read more]
-
Wenlin Zhou posted a new activity comment 7 years, 11 months ago
I agree with you. Audit independence refers to an unbiased mental attitude in making decisions throughout the audit and financial reporting that without independence, audit has no value, as the result, auditor should maintain independent and exists to professional ethics, Independent auditor is expected to be without bias with respect to the c…[Read more]
-
Wenlin Zhou posted a new activity comment 7 years, 11 months ago
A person’s character is very crucial in the audit industry. How would you build your reputation and maintain a good ethical character in this industry?
Learn as much as possible about your chosen subject matter. An efficient way to do this is to partner with someone who’s well-respected in that legal area, Summerville says. Offer to help on…[Read more]
-
Wenlin Zhou posted a new activity comment 7 years, 11 months ago
Mobile devices are a good way to improve the ERP competitive. Business benefits of mobilizing business scenarios.
The primary benefits of enterprise mobility are
• Increased efficiency of operations
• Enhanced productivity of the workforce
• Increased customer satisfaction
• Increased flexibilityDelivered via
• Acces…[Read more] -
Wenlin Zhou posted a new activity comment 7 years, 11 months ago
I agree with you. Employee training is important. For an effective implementation of SAP system, employees in an organization must be well knowledgeable in all the SAP functions and processes. Employees with inadequate SAP training may not do well in the business processes after SAP implementation, leading to operational inefficiency. This is why…[Read more]
-
Wenlin Zhou posted a new activity comment 7 years, 11 months ago
I agree with you. Security is very important in SAP. Any security vulnerability may result in financial loss, business disruptions, misstatement of financial information. Unlike infrastructure security vulnerability, SAP security vulnerability may directly impact the business. SAP is an integrated system, therefore, any errors may have a…[Read more]
-
Wenlin Zhou posted a new activity comment 7 years, 11 months ago
What aspect of compliance should an organization put the most effort into ensuring their controls are adequate?
the five essential elements of a corporate compliance program.
1. Leadership. The point means more than simply “Tone-at-the-top”; a successful compliance program must be built on a solid foundation of ethics that are fully and…[Read more] -
Wenlin Zhou posted a new activity comment 7 years, 11 months ago
When is the cost of implementing a compliance control higher than the benefit obtained?
Businesses often respond to regulatory compliance issues in an ad hoc, one-off manner. This approach is less and less viable as regulatory mandates, such as those of the Sarbanes-Oxley (SOX) Act, continue to multiply. Businesses must approach compliance…[Read more] - Load More
European nations are definitely concerned about privacy, and this is just another great example of that mentality. I am always telling people with children to be careful sharing photos online because of the metadata attached to photos which could tell people with bad intentions a lot of information that parents wouldn’t want available about their children. This doll reminds me of the hack that took place in late 2015 against Vtech. Vteach produces a lot of learning products for children, and the hack exposed hundreds of thousands of children’s data sets. It’s really scary why any entity would want that kind of information, and even scarier what might be done with it once acquired by those with malicious intent.