Journal of Accountancy Large Logo

Search Results

System Security and Reliability

Sort by: Show:
Page  1 | 2 | 3 | 4 | 5 >> 

1. Six cybersecurity basics   WebExclusive

BY Ken Tysiac
The steady barrage of headlines about cybersecurity underscores a topic viewed with wary eyes by many executives, board members, and investors.Employees may have access to sensitive data through smartphones that they carry everywhere. Globalization has increased the geographic reach of companies – making them visible to ever more hackers.And those hackers are constantly getting more sophisticated.“They’re changing techniques at lightning speed,” Marcus Prendergast, the chief information security officer of electronic brokerage and financial technology firm ITG said Wednesday.

2. Auditors have important role in cybersecurity   WebExclusive

BY Ken Tysiac
The steady stream of headlines about data breaches has the business community and regulators on high alert with regard to cybersecurity.An online PwC survey of global executives and IT directors conducted early in 2013 found that detected cybersecurity incidents rose 25% over the previous year. And 31% of executives responding to EY’s Global Information Security Survey for 2013 said the number of cybersecurity incidents at their organization grew at least 5% over the previous year.The SEC has taken notice of concerns over this issue and will hold a round-table meeting Wednesday to address cybersecurity.In recognition of these

3. TIGTA report says IRS should do a better job protecting taxpayer data   WebExclusive

BY Sally P. Schreiber, J.D.
The IRS does not do a good job of correcting security weaknesses, thereby failing to protect taxpayer data, the Treasury Inspector General for Tax Administration (TIGTA) concluded in a report released Thursday. TIGTA’s audit found that the IRS does not always correct known security problems and the corrective action process does not always work as intended.

4. Survey spotlights need for data and security strategies  

BY Jeff Drew
On the surface, the results of the 2013 North America Top Technology Initiatives survey show that “managing and retaining data” nudged past “securing the IT environment” to become the top technology priority cited by the nearly 2,000 accounting professionals polled. Dig a little deeper, and the evidence indicates that the emphasis on data stems at least in part from concerns about the increased security risks caused by the proliferation of mobile devices and the mass movement of confidential information to the cloud.

5. Seven ways to address IT vulnerability   WebExclusive

BY Neil Amato
When Mike Foster hears from CFOs about IT security issues, he gets the sense they’re focusing on a single hacking event here or there, instead of viewing IT security as a project that needs constant management and attention. What Foster tells the CFOs is this: “We don’t want to fight alligators.

6. Data, security take top two spots in AICPA technology priorities survey   WebExclusive

BY Jeff Drew
On the surface, the results of the 2013 North America Top Technology Initiatives survey, released Wednesday by the AICPA and CPA Canada, show that “managing and retaining data” nudged past “securing the IT environment” to become the top technology priority cited by the nearly 2,000 accounting professionals polled.

7. Cybersecurity: 2013 is already “the year of the hack”   WebExclusive

BY Ken Tysiac
Many organizations are unprepared to protect themselves against an emerging, relentless cybersecurity danger that threatens national security and economic stability, according to a new global survey. Advanced persistent threats (APTs) are not easily deterred, which makes them different from traditional threats, according to global IT association ISACA. But an ISACA survey of more than 1,500 security professionals found that 53% of respondents do not believe APTs differ from traditional threats.

8. Malware growth maintains rapid pace as mobile threats surge   WebExclusive

BY Jeff Drew
The number and complexity of cyberattacks, especially those targeting mobile devices, grew at an alarming pace in the second quarter, security technology company McAfee Labs said in its latest Threats Report. McAfee identified more than 8 million previously undiscovered samples of malicious software, or malware, during the three months that ended June 30.

9. PwC: Internal audit has to play a more substantial role in information security   WebExclusive

BY Jeff Drew
Most companies fail to adequately monitor and update their defenses against cybercriminals, raising the risk of costly data security breaches, according to PwC. Fortifying Your Defenses: The Role of Internal Audit in Assuring Data Security and Privacy, a PwC white paper, asserts that the increasing frequency and sophistication of hacker attacks require companies to do more than simply establishing a data security protocol.

10. Most U.S. small businesses lack disaster-recovery plans   WebExclusive

BY Jeff Drew
More than 60% of U.S. small businesses do not have a formal emergency-response plan and fail to back up their financial data off-site, leaving them vulnerable to catastrophic data loss in the event of a natural disaster. The Small Business Disaster Preparedness Study, conducted by software maker Sage North America, found that while 94% of small U.S.
Page  1 | 2 | 3 | 4 | 5 >> 
CPE Direct articles Web-exclusive content
AICPA Logo Copyright © 2013 American Institute of Certified Public Accountants. All rights reserved.
Reliable. Resourceful. Respected. (Tagline)