Technology & Information Management
Posted: October 10, 2017
CPAs can use their cybersecurity expertise to perform new services for clients under a new reporting framework recently issued by the AICPA.
Posted: September 14, 2017
Blockchain technologies allow two or more entities to share information on the internet without having to rely on any one of the others or to pay a third party service to be the master record keeper. Find out more.
Posted: September 13, 2017
The reality is that accounting has changed, and many clients expect an answer any time, all the time. With a VPN, you can offer those answers. However, security is the utmost importance if you have remote access.
Posted: July 11, 2017
Organizations must constantly monitor cybersecurity practices, policies, and plans. This is where internal audit plays a crucial role. Find out four areas where internal audit focuses on cybersecurity.
Posted: June 30, 2017
It takes a conscious effort to remember to change passwords or recognize when you’re on public WiFi vs. using a hotspot, but it’s a small thing in comparison to leaving yourself vulnerable to hackers. Read for more tips on keeping yourself and your business safe.
Posted: June 19, 2017
It is a lightning rod for highly charged opinion, confusion, and even fear.
Posted: May 23, 2017
It's not a matter of just slowing down operations; data theft could jeopardize pending mergers and acquisitions or create a public relations nightmare. Cybersecurity needs to be a company-wide priority.
Posted: May 17, 2017
The AICPA recently released a cybersecurity risk management reporting framework that aligns with those existing methods, controls and frameworks companies currently employ to manage cybersecurity risks. Find out more.
Posted: April 28, 2017
The AICPA’s new framework will enable all organizations – in industries worldwide – to take a proactive and agile approach to cybersecurity risk management and to communicate on those activities with stakeholders.
Posted: April 27, 2017
How valuable is your data or your client’s data? What actions should be taken to protect valuable information? Good security reviews reduce the risk of exposure and eliminate the obvious. Find out what are common sense best practices.