Entre las mayores preocupaciones en la Alta Dirección de las Empresas, está la Ciberseguridad y los efectos no deseados que un ciberataque pudiera provocar en la continuidad de las operaciones y del negocio en general. A este nivel hay sólo una respuesta a esta preocupación: se deben tomas todas las medidas necesarias para evitar ser […]
This is a great question that we get more often than you expect. Let’s see the different roles that own CentinelBox depending on the size and nature of the company. For most of our clients, finance owns CentinelBox, mainly when there is a thin line between finance and audit/compliance or when systems are more cloud-based […]
Some people may disagree with this statement, but it is a fact. Internal controls are the processes implemented by companies to ensure their objectives are met. They are the parts of the business process which provide mechanisms that could prevent inaccuracies or frauds, whether they were triggered by mistake or not. Preventive v/s Detective controls […]
Esta es una gran pregunta que la recibimos más veces de lo que se podría esperar. Si bien sería inapropiado que le demos esa respuesta, podemos brindarle algunas ideas y consideraciones. Vemos los diferentes roles que son propietarios de CentinelBox según el tamaño y la naturaleza de la organización. En muchos de nuestros clientes, Finanzas […]
Afirmación, que eventualmente podría no ser compartida, pero es una realidad. El control interno es un proceso o conjunto de procesos implementados para garantizar el logro de las metas u objetivos de una organización. Son las partes de un proceso de negocios que proporcionan ciertos controles y obstáculos que evitarían que se procesen imprecisiones o fraudes, […]
Cybersecurity and the need to secure access from external agents to our network are big issues that could generate concern over time. However, there is not much discussion about the incidents that could be generated internally with no external agents stepping into it*. Below I highlight some examples of the most severe incidents described by […]
It is common that investment and SAP system security project development decisions are based on the seriousness of the observations made by the External Auditors in their reviews. In addition, the executive level generally undervalues the auditors’ observations, so it is likely that the lack of action on security is always the same. The auditors’ […]
Es habitual que las decisiones de inversión y de desarrollo de proyectos de mejora en la seguridad del Sistema SAP se fundamenten con la severidad en las observaciones que entregan los Auditores Externos en sus revisiones. A lo anterior se una la general subvaloración del nivel ejecutivo a las observaciones de los auditores, por lo […]
Have you ever been exposed to a scam? The increase in phone scams to which we are often exposed is a result of the theft of internal data from banks, customer service companies and many others. To perform a phone scam, it is necessary to know the victim and their identity data such as name, […]
Do you have to meet the auditors’ reporting needs, pushing you to start an ongoing deep dive into the system to answer them? Instead, would you like to run your reports in a fast way? The internal and external auditors may have already asked you for information and statements that seem a bit stressful. The world […]