8 Simple Steps to Protect Your Database - #6. Require Independent Review
Even trusted users can manipulate standard business practices to perpetrate fraud with special, end-of-period adjustments. Check all individual- and application-sourced changes to financial data to identify odd adjustments. And, verify adjustments with independent monitoring and auditing software, rather than the accounting software that your financial personnel use.
Just how do you protect your database? Here are eight tips to consider when you are looking to lock down the structured data in your enterprise.