Calling all CPA’s: Do you have a sense of adventure? Do you wish to lead your firm into a new era risk minimization? Join me as we begin to explore the new threat landscape of cybersecurity. The summer of 2019 has provided a treacherous landscape for CPAs and accounting firms to navigate. Many have already… Read More »Cybersecurity for CPAs: A Journey
New York State has become the latest in a long line of states to tweak its laws around data breach notifications. On July 19, Capital One suffered one of the biggest data breaches ever. On July 25, New York Governor Andrew Cuomo signed new legislation, the Stop Hacks and Improve Electronic Data Security Act (SHIELD Act) into… Read More »New York Governor Signs Cyber Law After Capital One Breach
It seems as if every week there is another major data breach or cyber-attack in the United States. At this point, almost every person with an online presence has likely had their email and/or password compromised. Many common forms of authentication like multi-factor hardware tokens or employee access badges can be easily lost. Worse still,… Read More »Biometrics: From Your Phone to Your Business
We’ve seen the situation play out countless times. A company falls victim to a cyber-attack and eventually is crippled by the amount it costs to recover. Prominent in this pool of victims are tax professionals and their organizations, who hold data that cyber-criminals are eager to get their hands on: taxpayer information. From Social Security… Read More »A Matter of Taxpayer Safety: How the IRS is Stepping Up to Show the Importance of Cyber-Vigilance
Rising Attacks on MSPs: Why Small and Medium Sized Businesses Should Think Twice Before Handing Over Control to Managed IT Service Providers
The mid-market businesses of our country are worried about a lot of things. They’re worried about their bottom line, hiring and retaining talent to take their company to the next level and meeting ever-demanding client expectations. That’s what makes the prospect of using a managed IT service provider (MSP) so appealing to these companies. IT… Read More »Rising Attacks on MSPs: Why Small and Medium Sized Businesses Should Think Twice Before Handing Over Control to Managed IT Service Providers
In one form or another, it is more likely than not that your company is in possession of personal or sensitive data that requires some degree of protection from potential cyber threats. With data breaches seeming to make daily headlines, and hackers developing innovative methods to penetrate cyber defenses, businesses must contemplate what “reasonable” security… Read More »Cybersecurity Risk, what does a “reasonable” posture entail and who says so?
Your organization’s risk surface may be larger than you think. Here is why. Depending on the industry or vertical niche, most businesses today rely on several (if not many) third-party service providers and other vendors to support core business functions. Supply chains are interconnected so just-in-time inventory management hums along seamlessly. The multi-function printers contact… Read More »3rd Party Cybersecurity Risk – Literally the Keys to Your Front (and Every Other) Door!
The FBI and national cybersecurity experts are trying to get the word out to executives and their direct reports about a growing and successful attack approach: Business Email Compromise (BEC). Also known as “CEO fraud,” the FBI predicts that these attacks – which already cost businesses upwards of 12.5 billion dollars annually, will only continue to grow and evolve.… Read More »Business Email Compromise (BEC): What You Need To Know
Published in USA Trailblazer Magazine For years, computer and other technology original equipment manufacturers (OEMs) have diligently responded to business and consumers’ ever-constant demands for more and faster features to make their lives convenient and cost efficient. However, as the design and architecture of the newer technology have indeed included features that made things more connected,… Read More »Once Tech Features – Now Flaws!