HR Audit Checklist

The Hiring Process
– Accurate job description developed for all positions
– Job application submitted with required forms (background check, reference check, credit check release)
– Is your job application compliant with the law?
– Completed reference checks
– I-9 forms completed with proper identification
– Important medical information and emergency contacts gathered and filed
– Proper identification of independent contractors
– W-4 forms completed and submitted to the IRS
– Personnel files kept (and kept current)
Read more

Cybersecurity Program Development

Cybersecurity Program Basics
An effective cybersecurity program will:
– assign responsibility
– identify information asset
– conduct periodic risk assessments
– implement security controls
– monitor effectiveness over time
– conduct regular effectiveness reviews
– address third party risksĀ 
Read more

Top 10 Cyber Risks Facing Your Business

Within the past several years, technological advances have swept the business industry. The dramatic increase of technology used daily has drastically increased the importance of cybersecurity measures to protect private data. The following list outlines some of the greatest threats in cybersecurity for a business:
Read more