Resources
Here’s what we’re thinking about, writing about, and reading about.
We hope you find it helpful.
Written by us

Putting the right team together can be exciting and challenging. It's something we think about a lot, so we decided to share the superheroes that make up our GRC dream team.


Within the SOC 2 framework, two crucial categories—privacy and confidentiality—play distinct roles in safeguarding sensitive data. Our latest article outlines each category and the differences between the two.


Find out why we don't offer SOC 2 readiness assessments, and how we approach the early phases of a SOC 2 report instead.


Find out why a CPA firm must issue your SOC report and why that's actually a good thing.


Are you looking to better understand scope periods and how to decide on yours? Our latest blog outlines some things to consider.


Interviewing auditors is a necessary step in the process as you begin your SOC exam. Here we outline some questions and considerations to help you along the way.

Recommended by us

Jemurai talks about the good, bad, and ugly they see around cybersecurity audits.


Echelon Risk + Cyber, in this article, breaks down everything you need to know about the ISO 27001: 2022 updates.


Software Secured shares exactly how penetration testing increases the ROI of your ISO 27001 compliance.

If you have questions or content you’d like to see, email us at info@mjd.cpa.
For more information on SOC report types and usage, please visit the American Institute of Certified Public Accountant's (AICPA) website.