IT Audit

Hart, Brown & Associates can help design, implement and test IT General Controls for your organization and business units, we will provide practical recommendations for remediation items.

The four domains

IT General Controls

IT General Controls (ITGCs) comprise of four domains and can encompass operating systems, applications and databases.

🔹 Access to Programs and Data

  > User Identification and Authentication
  > Privileged Access
  > Periodic Review of User Access and Permissions
  > Logging and Monitoring of Privileged Activities & Account Logon Failures
  > Information Security Governance & User Awareness

🔹 Program Change
  > Change Management Policies, Procedures and Communication of Policy Updates
  > Separation of Environments (Development, Test, Production)
  > Documentation of Development and End User Testing
  > Initial Approvals to Develop and Final Approval to Implement
  > Post Implementation Review
  > Segregation of Duties
 
🔹 Program Development
  > Framework(s) for Program Development Projects (i.e. Waterfall, Agile, etc)
  > Business Sponsorship, Project Charter, Initial Authorization to Develop
  > Testing Documentation with Expected and Actual Results
  > Testing Approvals and Final Approval(s) to Implement
  > Post Implementation Review
 
🔹 Computer Operations
  > Batch Job Processing
  > Backup and Restoration Testing
  > Incident Management & Problem Management
a
Malware
a
Productivity
a
Botnets
a
Data Breach
a
Data Loss
a
Phishing
Our Services

IT Audit

Hart Brown & Associates can help design, implement and test IT Application Controls for your organization.

IT Application Controls

IT Application Controls (i.e. Business Process Controls) are transaction or process specific controls that support control objectives relevant to the business, for instance; revenue cycle, accounts receivable, accounts payable, general ledger, accounting, treasury, financial close, customer management, vendor management, and many others.

a

Pre/Post Implementation Reviews

Is your organization upgrading an existing system or installing a new one? If so, have you considered implementing applicable access, change management and SDLC controls prior to Go Live and ensuring that the proper controls are implemented after deployment and enforced these controls up-front have had future success.

a

Access Control Segregation of Duties (SOD) Analysis

The days of key management personnel needing access to entire systems and processes are over. Users having unnecessary and elevated access can increase chances of fraud and financial misstatement, Inadvertent and unintentional system changes.

How Come?

How Our Cloud Computing
Services Help You?

Our end-to-end cloud computing services allow you to automate infrastructure, reduce costs, and seamlessly scale in today’s digital world.

Cloud Computing Service Consulting

Evaluate current infrastructure and investments, set goals, and create a plan for scaling and managing multiple vendors.

PaaS (Platform as a Service)

Develop and build applications on a framework or platform delivered over the internet without the need for infrastructure management.

IaaS (Infrastructure as a Service)

Access and manage cloud infrastructure over the internet without the hassle of managing your own with secure APIs.

SaaS (Software as a Service)

Have the cloud vendor manage infrastructure and applications at a lower cost and with a faster deployment time.

Protect your business from the growing threat of cyber-attacks.

Contact us now to schedule a consultation and take the first step in protecting your business from cyber threats.

a
Don't wait until it's too late! Call us

FAQ's

Some Questions
And Their Answers

What is included in the Small Business SC Cybersecurity solution?

SC Cybersecurity solutions offer:

- A next generation firewall device with deep-packet inspection capability
- Professional firewall installation by ADT technicians and network engineers
- Premium content filtering service
- A comprehensive and customizable weekly report to see all blocked threats
- Add-on products like Secure Email and VPN services to complete the solution

What is a firewall?

SC Cybersecurity solutions offer:

- A next generation firewall device with deep-packet inspection capability
- Professional firewall installation by ADT technicians and network engineers
- Premium content filtering service
- A comprehensive and customizable weekly report to see all blocked threats
- Add-on products like Secure Email and VPN services to complete the solution

What is a Virtual Private Network (VPN)?

SC Cybersecurity solutions offer:

- A next generation firewall device with deep-packet inspection capability
- Professional firewall installation by ADT technicians and network engineers
- Premium content filtering service
- A comprehensive and customizable weekly report to see all blocked threats
- Add-on products like Secure Email and VPN services to complete the solution

How do I create my online account for ADT Cybersecurity?

SC Cybersecurity solutions offer:

- A next generation firewall device with deep-packet inspection capability
- Professional firewall installation by ADT technicians and network engineers
- Premium content filtering service
- A comprehensive and customizable weekly report to see all blocked threats
- Add-on products like Secure Email and VPN services to complete the solution

Who should I contact if I need assistance?

SC Cybersecurity solutions offer:

- A next generation firewall device with deep-packet inspection capability
- Professional firewall installation by ADT technicians and network engineers
- Premium content filtering service
- A comprehensive and customizable weekly report to see all blocked threats
- Add-on products like Secure Email and VPN services to complete the solution

Get In Touch

Atlanta, Georgia

call us:
770-235-4684