The Quaestor - Volume 10, Issue 3

What’s New in IACA? (Part 2)

Contributed by: Vernice M. Stefano, Senior IT Internal Auditor, Institute Audit, Compliance & Advisement

As reported in the last edition of Quaestor Quarterly, there were many changes in IACA over the past year.  For this edition, I would like to introduce another change to the IACA team, me.  My name is Vernice Stefano, and I’m the new Senior  IT  Auditor  as  of  August  of  this  year.    My  audit  experience  started  at Bausch &  Lomb  (B&L) where,  as  a member  of  the PeopleSoft  finance  team,  I assisted audit with data extraction and analysis, and later joined the audit team as  an  IT  auditor.    Then,  I  transitioned  to  the  internal  audit  department  at Xerox.  I have also worked in a variety of industries including pharmaceutical, manufacturing, services outsourcing, government, hospitality, and insurance.

So what does an IT internal auditor do? Like any auditor, we help an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluating and improving the effectiveness of risk management, control, and governance processes; we provide management with a level of assurance that financial, operational, and system controls are adequate and effective. Providing assurance on various aspects of the university’s system controls is where you will find me. Most IT audits center around IT general controls and how effective they are in preventing, detecting, or mitigating risk. There are many frameworks and standards by which IT general controls are evaluated including the International Organization for Standards or ISO (not to be confused with RIT’s Information Security Office), Information Technology Infrastructure Library (ITIL), the SANS Institute, Higher Education Information Security Council (HEISC), Control Objective for Information and Technology (COBIT), National Institute of Standards and Technology (NIST), and Payment Card Industry Data Security Standards (PCI DSS); this is not an exhaustive list. The frameworks and standards identify hundreds of IT control activities that an organization can employ. However, most can be grouped into the following categories:

  • IT Governance - or Tone at the Top.
  • Access Management – management of data and system access, as well as physical and logical access.  It includes password configurations as well as data, information, and system security.

IT control activities, continued

  • Change Management – management  of information and technology  system changes.    It  includes  system  development  life  cycle  management  (although sometimes this is separated out as its own category) and configuration management.
  • Operations  –  management  of  IT  operations.    It  includes  business  continuity planning/disaster recovery planning, data center operations, system administration and support, and patch management.
  • Vendor  Management  –  management  of  third  parties.    It  includes  service  level agreement (SLA) monitoring, third-party assurance reviews, and vendor life cycle management.

My work at the university will be to explore the nature of the system controls in place and  the  extent  to  which  they  are  operating  to  promote  an  effective  and  secure  IT environment.    I  am  excited  to  begin  my  journey  here  at  RIT  and  look  forward  to working with you along the way.

Inform RIT

Contributed by: Ben Woelk, Program Manager, RIT Information Security Office, infosec@rit.edu

Inform RIT is a recurring column provided by the RIT Information Security Office. The column highlights current issues and initiatives that impact the RIT community. In this issue, we’ll talk about online shopping safety. A special thank you to Kristen Holden, Information Security Communications Associate for drafting the original article.

Online Shopping Safety

The time of year spent with family, traveling, and shopping is upon us once again. With the holidays right around the corner, over 60% of Americans will  be  hopping  online  to  buy  and  send  their  gifts.  In  the  past  five  years  alone,  online shopping has grown nearly 30% with projections suggesting it may rise another 14% in the next few years.

With more people relying on the convenience of online shopping for their purchases, it’s important to remember safe shopping practices and tips so that you don’t succumb to identity theft, fraud, or scams that are in abundance online. Follow these tips to protect your privacy and information, and increase purchasing security.

Use a Secure Computer

Make sure you are using a secure internet connection and not sending private information out on public computers that could contain malware. Additionally, make sure that your anti-virus, operating system, and web browser have the latest versions and security patches installed.

Research the Company/Website

Investigate any retailer before you make a purchase from them. With sites like Amazon that have many different users selling products on their site, be sure to check the sellers feedback and rating to make sure they’re legitimate and have left other customers with good experiences.

Research the Product/Service

Do the prices seem amazing or too good to pass up? Oftentimes, insane deals can indicate a counterfeit product or may contain links to a malicious website. Bottomline: if it seems too good to be true, it probably is.

Use Strong Passwords

When creating an account on a site, make sure to use a strong password to help protect your private information. Remember to never use the same password twice and to add special characters, upper and lower case letters, and numbers to create a secure password!

Make Sure Purchases are made on Encrypted Sites

You’re ready to create your account or submit a payment, but does the website’s address bar contain “shttp,” “https,” or a padlock in the web browser (typically in the address bar at the top or status bar at the bottom, depending on the site)? If not, the site might not be secure and it’s best to back away.

Use a Secure Payment Method

Credit cards are one of the safest options when submitting online payments because of the federal laws in place to protect your liability against credit card fraud. Be wary of anyone who insists upon cash or wire transfers only.  Extra Tip: Want to take it one step further? Find out if your bank or credit card issuer offers one-time use virtual card numbers!

Monitor Your Accounts

Make sure to keep track of all your purchases and account histories. Print out  orders,  receipts,  email  confirmations,  and  product  descriptions  to  keep  on hand if anything goes awry. Follow up on purchases by monitoring your bank account and credit card statements to ensure unauthorized transactions don’t occur.

For more information

RIT Information Security Safe Online Shopping & Banking https://www.rit.edu/security/content/safe-online-shopping-banking

RIT Information Security How to Create a Secure Password https://www.rit.edu/security/content/creating-strong-passwords

11 Tips for Safe Online Shopping http://www.pcmag.com/article2/0,2817,2373130,00.asp

Online Shopping Scams https://www.scamwatch.gov.au/types-of-scams/buying-or-selling/online-sh…

Fake Order Confirmations http://www.pcworld.com/article/2856254/beware-this-online-shopping-scam…

I’ll Never Fall for an Online Shopping Scam Ever Again http://www.theglobeandmail.com/report-on-business/small-business/sb-gro…

Sign up for our new DSD101 course, Introduction to Digital Self Defense through CPD.  Contact Ben if you’d like us to present DSD101 to your department. http://www.rit.edu/security/

Like RIT Information Security at www.facebook.com/RITInfosec
Follow us on Twitter: @rit_infosec

Committee of Sponsoring Organizations of the Treadway Commission (COSO) Corner

Contributed by: Nancy A. Nasca, Manager, Institute Audit, Compliance & Advisement, naniaca@rit.edu

As explained in previous editions of the Quaestor Quarterly, the COSO Framework (an internationally recognized standard with which the adequacy and effectiveness of an organization’s internal controls are evaluated) was updated in May 2013 to further define the principles underlying the five components of internal control (Control Environment, Risk Assessment, Control Activities, Information and Communication, and Monitoring). According to the Framework, these principles are fundamental concepts that must be present and functioning in order to achieve an effective system of internal control.

 In addition,  the  Framework  includes  points  of  focus  or  characteristics  that  are  examples  of behaviors  or  processes  that  would  be  expected  to  be  in  place  to  demonstrate  that  the related  principle  is  in  fact  present and  functioning.  This  edition of  the COSO  Corner  will summarize  the  sixth  COSO  principle,  which  is  the  first  principle  related  to  the  Risk Assessment component of the COSO Framework, as well as the related points of focus.

Principle 6 –   The  organization  specifies  objectives  with  sufficient  clarity  to  enable  the identification and  assessment  of  risks  relating  to  objectives.   These  objectives  align  with and  support  the  university  in  the  pursuit  of  its  strategic  direction.    As  part  of  internal control,  management  objectives  should  be  grouped  within  relevant  categories  (i.e., operations, reporting, compliance) at all levels of the university to allow for the identification and assessment of the risks that could compromise the achievement of these objectives. The related points of focus for this principle and how they are relevant to RIT operations include:

  • Organizational  objectives  reflect  management’s  choices  about  structure,  industry considerations  and  performance  of  the  university  and  consider  acceptable  levels  of variation relative to the achievement of these goals.  RIT’s mission, vision, and most recent strategic plan establish the university’s key objectives and goals.
  • External financial reporting objectives should be consistent with applicable accounting principles and reflect the underlying university transactions and events.  RIT publishes audited financial statements on an annual basis which are available on the Controller’s Office website: https://www.rit.edu/fa/controller/accounting/auditstatements.html.
  • External non-financial reporting objectives should be consistent with laws and regulations  or  standards  and  frameworks  of  recognized  external  organizations. RIT has multiple external non-financial reporting requirements (i.e., accreditation organizations, sponsoring organizations, federal and state agencies) with which it must comply.
  • Internal reporting should provide management with accurate and complete information  to  assist  in  assessing  whether  objectives  have  been  met.    Outcomes assessment reporting is an integral part of RIT’s commitment to  measuring success and guiding improvements towards the accomplishment of objectives.
  • Compliance  objectives should be  consistent  with  standards  of conduct established by applicable laws and regulations.  RIT has demonstrated a commitment to compliance as documented in RIT’s Compliance Policy and Code of  Ethical Conduct and with the recent  appointment  of  the  newly  created  Assistant  Vice  President  for  Compliance  & Ethics position.

Reference
Committee of Sponsoring Organizations of the Treadway Commission (May 2013). “Internal Control – Integrated Framework – Framework and Appendices”

Additional Information by IACA

Watch IACA’s Monday Minute video series here!
Our video series focuses on opportunities for improving internal controls and increasing awareness of various university processes, policies, and protocols. If you have questions, feel free to contact anyone in the IACA office using information on our webpage.
Just to name a few, past topics include: Travel Policy changes, FERPA Regulations, RIT’s Ethics & Compliance Hotline, Records Management Policy, Risk Assessment, and many others.

What about ethics in the workplace?
Learn about the RIT Ethics and Compliance Hotline

IACA Team
Learn more about your IACA team.