Journal of Accountancy Large Logo

Search Results

System Security and Reliability

Sort by: Show:
Page  1 | 2 | 3 | 4 | 5 >> 

1. Global cyberattacks rose 48% in 2014   WebExclusive

BY Samantha White
It should be no surprise amid the constant barrage of headlines about cybersecurity incidents that the number and cost of breaches is on the rise.Security incidents cost businesses an average of $2.7 million each year, according to a survey by PwC. Despite the burgeoning threat, information security is an issue that receives little involvement from the board, and security budgets decreased in the last year.

2. Data security risk: You can take it anywhere  

BY Richard Sheinis, J.D. and Sarah Beckett Ference, CPA
It has been said that with great power comes great responsibility. Mobile devices and cloud computing empower CPAs to work on an anytime, anywhere basis, but increased access demands greater responsibility for data security. A CPA’s obligation to protect client confidential data is not only governed by the AICPA Code of Professional Conduct and Internal Revenue Code Sec.

3. Harnessing the power of the cloud  

BY Jeff Drew
Technology continues to transform the accounting profession. Cloud computing and mobile devices have untethered CPAs from their desks and desktops, allowing them to do work and access data on a virtually anytime, anywhere basis. Technology continues to break down geographic and market barriers, creating unprecedented opportunities for CPA firms and for CPAs in business and industry.

4. Six cybersecurity basics   WebExclusive

BY Ken Tysiac
The steady barrage of headlines about cybersecurity underscores a topic viewed with wary eyes by many executives, board members, and investors.Employees may have access to sensitive data through smartphones that they carry everywhere. Globalization has increased the geographic reach of companies – making them visible to ever more hackers.And those hackers are constantly getting more sophisticated.“They’re changing techniques at lightning speed,” Marcus Prendergast, the chief information security officer of electronic brokerage and financial technology firm ITG said Wednesday.

5. Auditors have important role in cybersecurity   WebExclusive

BY Ken Tysiac
The steady stream of headlines about data breaches has the business community and regulators on high alert with regard to cybersecurity.An online PwC survey of global executives and IT directors conducted early in 2013 found that detected cybersecurity incidents rose 25% over the previous year. And 31% of executives responding to EY’s Global Information Security Survey for 2013 said the number of cybersecurity incidents at their organization grew at least 5% over the previous year.The SEC has taken notice of concerns over this issue and will hold a round-table meeting Wednesday to address cybersecurity.In recognition of these

6. TIGTA report says IRS should do a better job protecting taxpayer data   WebExclusive

BY Sally P. Schreiber, J.D.
The IRS does not do a good job of correcting security weaknesses, thereby failing to protect taxpayer data, the Treasury Inspector General for Tax Administration (TIGTA) concluded in a report released Thursday. TIGTA’s audit found that the IRS does not always correct known security problems and the corrective action process does not always work as intended.

7. Survey spotlights need for data and security strategies  

BY Jeff Drew
On the surface, the results of the 2013 North America Top Technology Initiatives survey show that “managing and retaining data” nudged past “securing the IT environment” to become the top technology priority cited by the nearly 2,000 accounting professionals polled. Dig a little deeper, and the evidence indicates that the emphasis on data stems at least in part from concerns about the increased security risks caused by the proliferation of mobile devices and the mass movement of confidential information to the cloud.

8. Seven ways to address IT vulnerability   WebExclusive

BY Neil Amato
When Mike Foster hears from CFOs about IT security issues, he gets the sense they’re focusing on a single hacking event here or there, instead of viewing IT security as a project that needs constant management and attention. What Foster tells the CFOs is this: “We don’t want to fight alligators.

9. Data, security take top two spots in AICPA technology priorities survey   WebExclusive

BY Jeff Drew
On the surface, the results of the 2013 North America Top Technology Initiatives survey, released Wednesday by the AICPA and CPA Canada, show that “managing and retaining data” nudged past “securing the IT environment” to become the top technology priority cited by the nearly 2,000 accounting professionals polled.

10. Cybersecurity: 2013 is already “the year of the hack”   WebExclusive

BY Ken Tysiac
Many organizations are unprepared to protect themselves against an emerging, relentless cybersecurity danger that threatens national security and economic stability, according to a new global survey. Advanced persistent threats (APTs) are not easily deterred, which makes them different from traditional threats, according to global IT association ISACA. But an ISACA survey of more than 1,500 security professionals found that 53% of respondents do not believe APTs differ from traditional threats.
Page  1 | 2 | 3 | 4 | 5 >> 
CPE Direct articles Web-exclusive content
AICPA Logo Copyright © 2013 American Institute of Certified Public Accountants. All rights reserved.
Reliable. Resourceful. Respected. (Tagline)