Artificial Intelligence May 14, 2026
Scammers Are Using AI to Target You—Don’t Get Caught Off Guard
As scammers leverage AI, consumers can defend themselves by becoming familiar with common scams and being suspicious of unexpected calls.
Artificial Intelligence May 14, 2026
As scammers leverage AI, consumers can defend themselves by becoming familiar with common scams and being suspicious of unexpected calls.
March 30, 2026
March 27, 2026
February 25, 2021
Almost from the outset of the pandemic, financial services organizations found themselves near the top of hackers' hit lists. And, at least in a few crucial respects, it's not so hard to see why. Reams of personal and financial data.
January 28, 2020
Financial services organizations have been among the biggest targets for hackers in recent years, and it's easy to see why. As keepers of sensitive personal and financial information, CPA firm databases are enticing treasure troves for tech-savvy ...
January 24, 2018
The guessing game may be over, thanks to a new feature in the popular travel app TripIt Pro. The new feature works similar to traffic apps, letting users how long it they can expect the wait to be at their airport's security lines.
November 28, 2017
With the Equifax data breach exposing the personal identifiable information (PII) of 143 million Americans this year, we will need to be prepared to receive and answer more concerns than ever from our clients about tax related identify theft this ...
November 20, 2017
It’s not hard to see why people don’t like passwords. We share a lot of sensitive personal information with companies, including Social Security numbers, health records, and bank account and credit card numbers. Even password managers don’t eliminate ...
October 31, 2017
One in three victims spent at least $50,000 to recover from a cyber attack, yet rebuilding reputation and customer trust can take more than a year.
October 31, 2017
According to the company's threat research team, NotPetya was the most destructive ransomware of 2017, followed closely by WannaCry and Locky. The data surveyed includes all devices running windows operating systems that were infected with ransomware ...
June 27, 2017
Authentication is simply a process that verifies a user’s identity. The most common form of authentication is a password, but given the rise of tax-related identity theft and phishing schemes that accounting firms face, a password is no longer enough ...
June 15, 2017
Security and privacy should keep entrepreneurs up at night. Jim Bourke, CPA.CITP, CGMA, the Managing Director of the Advisory Services group at Withum and a CPA Practice Advisor Thought Leader, talks about how an accountant can assist businesses in safeguarding these issues. For more on Jim, please visit https://www.withum.com/partner/james-c-bourke.
April 14, 2017
In today’s digital environment, employees are connected continuously to enterprise networks whether they are in the office, working offsite or on vacation in another country. At the same time, data breaches are growing in complexity and sophistication.
March 22, 2017
As I wrote in a previous column, whether it’s securing a perimeter in a war zone or an accounting firm, the strength of the defense is only as robust as the front lines. In your firm, the front line is your people who are handling sensitive client data on
February 20, 2017
Past practices for using temporary and part-time workers may not be adequate. Be clear on the scope of work each employee is able to perform as well as the level of oversight necessary to ensure accuracy. Integrate them into the workflow process to ...