The AICPA issued its annual ranking of the 10 technologies most likely to significantly affect practitioners, their clients and their employers in the coming year ( ). For the first time, the AICPA invited members of ISACA to join the AICPA Information Technology (IT) section members and Certified Information Technology Professional (CITP) credential holders in the voting. Heading the list for the fourth consecutive year was information security—the use of hardware, software and processes to protect an organization’s data. It was followed by assurance and compliance applications (that, for example, help companies comply with Sarbanes-Oxley and manage enterprise risk); disaster recovery and business-continuity-planning processes; IT governance methodologies; privacy management procedures; digital identity and authentication processes; wireless communication technologies; application and data integration techniques; paperless digital technologies; and “antispyware” applications, which detect and remove programs attempting to covertly gather and transmit confidential data.

The Institute and ISACA also entered into an agreement under which the CITP credential will be granted automatically to all CPAs who are AICPA members and also hold ISACA’s Certified Information Systems Auditor (CISA) credential. CPA/CISAs who wish to obtain the CITP credential under this agreement should visit , where they can download the streamlined CPA/CISA application.


Year-end tax planning and what’s new for 2016

Practitioners need to consider several tax planning opportunities to review with their clients before the end of the year. This report offers strategies for individuals and businesses, as well as recent federal tax law changes affecting this year’s tax returns.


News quiz: Retirement planning, tax practice, and fraud risk

Recent reports focused on a survey that gauges the worries about retirement among CPA financial planners’ clients, a suit that affects tax practitioners, and a guide that offers advice on fraud risk. See how much you know with this short quiz.


Bolster your data defenses

As you weather the dog days of summer, it’s a good time to make sure your cybersecurity structure can stand up to the heat of external and internal threats. Here are six steps to help shore up your systems.