Resources

Here’s what we’re thinking about, writing about, and reading about.
We hope you find it helpful.

In the News

SOC 2 Reports Reimagined: From Burden to Business EnablerSOC 2 Reports Reimagined: From Burden to Business Enabler
Read about why it's time to change our outlook and perception of SOC 2 audits.
READ MORE
READ MORE
How Compliance Can Help New Founders Effectively Scale Their BusinessHow Compliance Can Help New Founders Effectively Scale Their Business
Find out about the compliance industry's technological shifts and the business advantages of adopting compliance early for startups.
READ MORE
READ MORE
Cyber crises a warning about BCP, say expertsCyber crises a warning about BCP, say experts
Read about why experts say it's time to figure out and document your backup plan for mission-critical systems.
READ MORE
READ MORE

Written by us

Why do SOC reports have to be issued by a CPA firm?Why do SOC reports have to be issued by a CPA firm?
Find out why a CPA firm must issue your SOC report and why that's actually a good thing.
READ MORE
READ MORE
What should the scope period be for my SOC 2® Type 2 report?What should the scope period be for my SOC 2® Type 2 report?
Are you looking to better understand scope periods and how to decide on yours? Our latest blog outlines some things to consider.
READ MORE
READ MORE
How do I choose a SOC auditor?How do I choose a SOC auditor?
Interviewing auditors is a necessary step in the process as you begin your SOC exam. Here we outline some questions and considerations to help you along the way.
READ MORE
READ MORE

Recommended by us

Unlocking Trust: How SOC 2 Validated Our Security ProgramUnlocking Trust: How SOC 2 Validated Our Security Program
Check out Software Secured's story focused on the process of working on their SOC 2 report with MJD Advisors
READ MORE
READ MORE
Managing the move from ISO 27001 certification to SOC 2 completionManaging the move from ISO 27001 certification to SOC 2 completion
We partnered with SecFix on this article to share the differences between ISO 27001 certification and SOC 2 completion, and how you can leverage your work from one to the other.
READ MORE
READ MORE
Penetration Testing: Why It’s Important + Common TypesPenetration Testing: Why It’s Important + Common Types
Penetration testing simulates an outside attack on your applications and network. Drata shares the types of pen tests and how to conduct one to prevent risk.
READ MORE
READ MORE

If you have questions or content you’d like to see, email us at info@mjd.cpa.
For more information on SOC report types and usage, please visit the American Institute of Certified Public Accountant's (AICPA) website.