Institute Audit, Compliance & Advisement R·I·T Achieving Excellence Through Collaboration the Quaestor Quarterly Volume 10, Issue 2 Spring 2015 quaes· tor [kwes'tôr] ‘one who asks questions’ IACA’s Mission What’s New in IACA? Institute Audit, Compliance & Advisement promotes a strong internal control environment by objectively and independently assessing risks and controls; evaluating business processes for efficiency, effectiveness, and compliance; providing management advisory services; and offering training to the university community. We focus on preserving the resources of the university for use by our students as they prepare for successful careers in a global society. Inside This Issue Page Training Opportunities Provided by IACA 2 Inform RIT 3 COSO Corner 5 Word on the Street 6 RIT Ethics Hotline 6 Pop Quiz Challenge 7 It appears we have finally shaken the cold winter and can welcome spring. The past several months have been a time of change at IACA as well. We have been busy adjusting to new roles and responsibilities while continuing to provide the same level of high quality professional internal auditing services to the RIT community. This past November, I was named Assistant Vice President of IACA. However, as most of you likely know, I’m not new to IACA; I have been the Associate Director of IACA for the past nine years. In my current role, I have a dual reporting relationship reporting both to Dr. Watters, RIT’s Senior Vice President for Finance and Administration, as well as the Chairperson of the Audit Committee of the Board of Trustees. That reporting relationship provides IACA the independence required of an internal audit function. The two former Senior Internal Auditors for IACA, Nancy Nasca and Wendy Roy, were recently promoted to Managers which serves to adjust their titles to reflect the responsibilities they perform for IACA in addition to their audit engagement responsibilities. Nancy is also our departmental compliance coordinator - making sure IACA is aligned with the professional standards we must abide by as members of the internal audit profession. Additionally, Nancy is developing a training session that will be offered through RIT’s Center for Professional Development (CPD) on the topic of Risk Assessment. As internal auditors, we often talk about internal controls; this class will help attendees to identify business risks that may require internal controls to be implemented or strengthened in order to meet business objectives. In other words, identifying “the things that keep you up at night.” Wendy is our professional development coordinator, responsible for tracking the licensing and training that is required by our professional licenses and certifications. Wendy and I present our CPD offering of Internal Controls and Fraud in the Workplace as well as the Basic Business Essentials sessions for academic department heads. Wendy also hosts the popular IACA Monday Minute video series found here https://www.rit.edu/fa/iaca/content/iacamonday-minute. (continued on p. 2) Page Page 2 2 Regulatory Compliance... (continued from p. 1) Chris VanHemel, our Staff and Audit Assistant, has learned new audit skills to expand her ability to assist with various types of audits. The newest member of the IACA team is our Associate Internal Auditor, Alissa Jatsenti. She is a CPA and was most recently with the accounting firm KPMG. Alissa is new to the Rochester area and is very excited to be here at RIT. Although our Senior IT Auditor position is currently vacant, we have begun to recruit for that position. This past October, the IACA staff earned Six Sigma Yellow Belt certifications through RIT’s Center for Quality and Applied Statistics. For our in-class assignment (which extended beyond as well) we worked primarily on improving the format and distribution of our audit reports. Since our report is the final “product” of our services, it is a very important document for us as well as our clients. The goal was to simplify our reports, ensure the appropriate level of management is aware of the opportunities for improvement, and acknowledge areas that have effective and efficient internal controls – something most audit reports (including our previous report style) typically don’t include. We are all excited and energized by the many changes that have occurred over the past months at IACA and we remind you that we are here to serve the university community with professional services. We include time for advisory requests in our annual audit plan; so if you have a process/area that you would like reviewed, or just have an internal controls related question, please give any of us a call. We are here to serve the RIT Community. ~~ Contributed by Patrick M. Didas Assistant Vice President Institute Audit, Compliance & Advisement Training Opportunities Provided by IACA IACA’s Internal Controls and Fraud in the Workplace class is two and one half hours in length and is required to receive the RIT Accounting Practices, Procedures and Protocol Certificate of Completion. However, anyone interested in learning about internal controls and fraud prevention is welcome to attend. To learn more about these important topics, sign up for IACA’s Internal Controls and Fraud in the Workplace class at the CPD website: http://www.rit.edu/fa/cpd/leadership/internalcontrolsandfraud.html Upcoming Internal Controls & Fraud in the Workplace Training Sessions: Tuesday, July 21, 2015 9:00am to 11:30am 2140 Louise Slaughter Hall Wednesday, October 14, 2015 9:00am to 11:30am 2140 Louise Slaughter Hall PagePage 3 3 Inform RIT Inform RIT is a recurring column provided by the RIT Information Security Office. The column highlights current issues and initiatives that impact the RIT community. In this issue, we’ll talk about reliance on anti-virus for protection and the concept of layering. Anti-virus isn’t enough! For years, PC users have relied on anti-virus to provide them with 100% protection from attacks by malicious software, whether the attack occurs when visiting a website or opening an infected attachment. Mac users have sometimes assumed that they needed no malware protection whatsoever. What percentage of malware (malicious software, including viruses, worms, Trojans, etc.) do you think is detected by anti-virus software? 95%? 90%? 80%? How does anti-virus work? AV-Comparatives (https://av-comparatives.org) states that they are an independent organization offering systematic testing of PC/Mac-based antivirus products. Reading their most recent report is encouraging. Depending on the anti-virus product you choose, malware detection may be more effective now than ever. However, other studies (http:// www.imperva.com/docs/HII_Assessing_the_Effectiveness_of_Antivirus_Solutions.pdf) have shown that anti-virus detection rates, although very good for some of the industryleading products, are sorely lacking for some products, with detection rates of less than 50%. (McAfee, the anti-virus protection offered by RIT, scores well on both tests.) OK. So you’ve chosen an anti-virus product with very high detection rates. Your worries are over, right? Unfortunately, it’s not that simple. Most anti-virus products score well against known samples. However, new malware variants are created hourly, and your anti-virus may or may not be good at detecting unknown malware. Anti-virus relies on two types of detection, signatures (also known as DAT files) of known malware and heuristic detection (behavioral analysis) of unknown malware. Not surprisingly, anti-virus doesn’t do as well against unknown malware threats as it does against known threats. Another factor in determining anti-virus effectiveness is how long it takes an anti-virus firm to update their detections. The longer the gap between malware appearing and it being added as a signature, the longer you may be exposed to that malware threat. OK. You’ve told me anti-virus isn’t enough and I may be starting to believe you. What do I need to do to protect myself? The classic model of protection in information security is the concept of layering. Layering means that you don’t rely on any one level of protection (such as anti-virus) to provide all of your protection. For you, that means employing a combination of technical protections, practices, and a dose of common sense. The RIT Desktop and Portable Computer Standard https://www.rit.edu/security/content/desktop-and-portablecomputer-security-standard provides minimum requirements for protecting desktop computers. (continued on p. 4) “I believe in evidence. I believe in observation, measurement, and reasoning, confirmed by independent observers. I’ll believe anything, no matter how wild and ridiculous, if there is evidence for it. The wilder and more ridiculous something is, however, the firmer and more solid the evidence will have to be.” - Isaac Asimov, scientist and writer (1920-1992) Page Page 4 4 Inform RIT (continued from p. 3) Those requirements include ensuring that your firewall is active, that you’re up to date on security patches, that your computer is set to log you out automatically after a set time period (15 minutes is a good choice for most users), that your computer is encrypted when accessing private information, and a few other requirements. The Password Standard (https://www.rit.edu/security/content/password) provides minimum password requirements; and we provide a brochure that explains how to create an easy-to-remember passphrase. Although there’s been a lot of talk about the usefulness of passwords, a good password provides an additional layer of protection. Practices include the proper access, storage, and transfer of Private and Confidential information (IAP Standard), use of an appropriate RIT signature on official communication, and proper use of portable media. The Best Practices section of our website (https://www.rit.edu/security/content/keeping-safe) provides a great deal of information that will help you protect yourself (at home and at RIT), other members of the RIT community, and RIT resources. Wait! That’s a lot I need to do! Yes, in some ways that’s true. However, cyber criminals target you, not just computers and systems. Because we are each targeted, we need to not only take advantage of the protection provided by RIT, but to take an active role ourselves in providing protection. We’re not asking you to become a cyber warrior. We do want you to realize you have active adversaries and that the best technical protection can’t stop human error. Much of what we need to do is to slow down and think before we click. Our adversaries try to hurry us into making poor decisions. We are refreshing the DSD101 course, Introduction to Digital Self Defense, and plan to begin offering it again later this summer. Let me know what you’d like us to cover in that class. Ben Woelk, CISSP ISO Program Manager For more information about protecting yourself and RIT, visit the RIT Information Security Webpage (http://www.rit.edu/security), contact us at [email protected], or call us at 585-475-4123. Did you know that the RIT Information Security Office has more than 6800 likes of its Facebook Page (http://www.facebook.com/RITInfosec) and more than 1100 Twitter followers (@RIT_Infosec)? Like us or follow us today! ~~ Contributed by Ben Woelk Program Manager RIT Information Security Office PagePage 5 3 COSO Corner Committee of Sponsoring Organizations of the Treadway Commission (COSO) As explained in previous editions of the Quaestor Quarterly, the COSO Framework (internationally recognized standard against which the adequacy and effectiveness of an organization’s internal controls are evaluated) was updated in May 2013 to further define the principles underlying the five components of internal control (Control Environment, Risk Assessment, Control Activities, Information and Communication, and Monitoring). According to the Framework, these principles are fundamental concepts that must be present and functioning in order to achieve an effective system of internal control. In addition, the Framework includes points of focus or characteristics that are examples of behaviors or processes that would be expected to be in place to demonstrate that the related principle is in fact present and functioning. This edition of the COSO Corner will summarize the fifth and final principle relating to the Control Environment component of the COSO Framework, as well as the related points of focus. Principle 5 – The organization holds individuals accountable for their internal control responsibilities in the pursuit of objectives: Management and the Board of Trustees enforce accountability for performance of internal control responsibilities across the university and implement corrective action as necessary. At RIT, IACA provides the Audit Committee of the Board of Trustees a summary of audit results and periodic status updates on management’s implementation of corrective actions. Performance measures, incentives and rewards are developed at all levels of the university to encourage the achievement of organizational objectives. These measures should be reviewed periodically for on-going relevance and adequacy. RIT’s current initiatives to review its current staff performance appraisal system and update its tenure and promotion policies is consistent with this point of focus. Employee performance is periodically measured against established measures, and rewards are allocated or disciplinary action is exercised as appropriate. RIT’s annual performance appraisal processes illustrate the application of this principal. Pressures created by the establishment of goals and targets toward the achievement of objectives are balanced with appropriate messaging, incentives and rewards. RIT’s commitment to acknowledging staff and faculty member achievements in its numerous award and recognition programs demonstrates the presence of this principal. Reference Committee of Sponsoring Organizations of the Treadway Commission (May 2013). “Internal Control – Integrated Framework – Framework and Appendices” ~~ Contributed by Nancy A. Nasca Manager Institute Audit, Compliance & Advisement ~ Ask the Auditor ~ Submit a question to the IACA webpage https://www.rit.edu/fa/iaca/forms/ask by July 31, 2015. If your question is chosen for publication in our newsletter, you will receive a prize valued at $15. Page 6 Word on the Street “This year, our university behavioral intervention team, SBCT (Student Behavior Consultation Team) requested an internal audit from IACA regarding our business process utilized when managing students of concern. We had the opportunity to work with Ms. Nancy Nasca as the project lead for this audit. I was extremely impressed with Nancy’s thoughtful questions, her understanding of all of the complexities involved in managing student behavior, along with the sensitive nature and confidentiality requirements necessary when working with students who have exhibited mental health concerns. She met with our team, along with key individuals, and was able to synthesize her findings into a report that was both pragmatic, insightful and accurately captured the essence of what we do each day. I know as Chair of SBCT, I deeply appreciated the “homework” that Nancy did prior to initiating the audit, and her ability to listen to all of the stakeholders who dedicate themselves to assisting students in need. It was a very positive experience, and I hope to continue working with IACA as we examine all of our protocols within the area I supervise.” ~~ Contributed by Dr. Dawn Meza Soufleris Associate Vice President, Residential Education and Community Standards Division of Student Affairs Watch IACA’s Monday Minute video series here! Our monthly one-minute video series focuses on opportunities for improving internal controls; we hope that you find the information beneficial. If you have questions, feel free to contact anyone in the IACA office using information on our webpage. Past Topics: Travel Policy changes, FERPA Regulations, and Lenel Access What about ethics in the workplace? To learn more about the RIT Ethics Hotline, check out http://www.rit.edu/fa/svp/content/ethics-andcompliance-hotline-whistleblower Page Page 7 3 Pop Quiz Challenge Take the Pop Quiz Challenge! Correctly answer the question below and you will be entered in a drawing to win a prize valued at $15. One lucky winner will be chosen randomly and notified by email. Question: According to Inform RIT, malware “signatures” are also known as which of the following? A. DAT files B. Heuristic detection C. Malware Achieving Excellence Through Collaboration IACA TEAM: D. Anti-virus software Patrick M. Didas ‘90, CPA, CFE, CCA Post your answer to our Quiz webpage at: https://www.rit.edu/fa/iaca/content/quiz ************************************************************ Congratulations to Tish Purcell from the College of Applied Science and Technology for correctly answering the Winter issue’s Pop Quiz question. The question and the correct answer were: According to the lead article, RIT’s Educational Records Policy addresses key requirements of which Federal or State laws? assistant vice president 475-6826 Wendy J. Roy, CPA manager 475-7011 Nancy A. Nasca, CPA, CIA manager 475-5293 Alissa Jatsenti, CPA A. FCPA associate internal auditor B. Title IX 475-7849 C. EH&S Correct Christine M. VanHemel ‘12 D. FERPA staff & audit assistant 475-7647 ~ Ask the Auditor ~ Submit a question to the IACA webpage https://www.rit.edu/fa/iaca/forms/ask by July 31, 2015. If your question is chosen for publication in our newsletter, you will receive a prize valued at $15. R·I·T
© Copyright 2026 Paperzz