October 31, 2017
More than Half of Small Businesses Have Suffered Some Form of Cyber Attack or Breach
One in three victims spent at least $50,000 to recover from a cyber attack, yet rebuilding reputation and customer trust can take more than a year.
October 31, 2017
One in three victims spent at least $50,000 to recover from a cyber attack, yet rebuilding reputation and customer trust can take more than a year.
October 31, 2017
According to the company's threat research team, NotPetya was the most destructive ransomware of 2017, followed closely by WannaCry and Locky. The data surveyed includes all devices running windows operating systems that were infected with ransomware ...
June 27, 2017
Authentication is simply a process that verifies a user’s identity. The most common form of authentication is a password, but given the rise of tax-related identity theft and phishing schemes that accounting firms face, a password is no longer enough ...
June 15, 2017
Security and privacy should keep entrepreneurs up at night. Jim Bourke, CPA.CITP, CGMA, the Managing Director of the Advisory Services group at Withum and a CPA Practice Advisor Thought Leader, talks about how an accountant can assist businesses in safeguarding these issues. For more on Jim, please visit https://www.withum.com/partner/james-c-bourke.
April 14, 2017
In today’s digital environment, employees are connected continuously to enterprise networks whether they are in the office, working offsite or on vacation in another country. At the same time, data breaches are growing in complexity and sophistication.
March 22, 2017
As I wrote in a previous column, whether it’s securing a perimeter in a war zone or an accounting firm, the strength of the defense is only as robust as the front lines. In your firm, the front line is your people who are handling sensitive client data on
February 20, 2017
Past practices for using temporary and part-time workers may not be adequate. Be clear on the scope of work each employee is able to perform as well as the level of oversight necessary to ensure accuracy. Integrate them into the workflow process to ...
August 31, 2016
Security continues to be a top priority for firms today. Clients trust CPAs with some of their most sensitive data and it’s our responsibility to do everything possible to protect it. While most wish there was a magic bullet that would guarantee 100% ...
August 22, 2016
Ransomware is a type of malicious software that encrypts files, blocks access to computer systems then requires an anonymous payment, and has the ability to make a dramatic and devastating impact on your business. A recent report released by the FBI ...
July 26, 2016
Ransomware is a type of malicious software that encrypts files, blocks access to computer systems then requires an anonymous payment, and has the ability to make a dramatic and devastating impact on your business. A recent report released by the FBI ...
July 19, 2016
There are several measures CPA firms can take to mitigate data risk and manage their security. CPA firms are responsible for tax identification numbers, social security numbers, financial account numbers, and additional data which can threaten the ...
June 14, 2016
When businesses enter into outsourcing agreements with cloud service providers, they are looking to offer their customers access to applications, storage and other cloud-related functions in a convenient and cost-effective way. To do so, they must ...