Companies moving IT systems to the cloud are encountering higher costs and more implementation problems than they expected, KPMG International reported in a survey.

About one-third of the more than 650 business and IT leaders in the global survey experienced higher-than-anticipated expenses adopting cloud-computing services, while a similar number reported significant implementation challenges. The survey report is available at

Rick Wright, leader of KPMG’s Global Cloud Enablement Program, said companies need to focus on more than just technology issues when developing their cloud adoption strategies. Companies should examine their business processes and redesign them as needed to secure a smoother transition to the cloud. “Simply put, executives have found that simultaneous process redesign is central to addressing the complexities that often arise in the implementation and operational phases of cloud adoption,” Wright, a partner with KPMG LLP, said in a news release.

Moving to the cloud is not about short-term cost savings, said Erik Asgeirsson, president and CEO of CPA2Biz, the AICPA’s technology subsidiary. “It’s about positioning your business for new fields of growth,” he said. “Down the line, there certainly are cost advantages, but some investment is required upfront, particularly to work through change management issues.”

  Many organizations are unprepared to protect themselves against an emerging, relentless cybersecurity danger that threatens national security and economic stability, according to a new global survey.

Advanced persistent threats (APTs) are not easily deterred, which makes them different from traditional threats, according to global IT association ISACA. But an ISACA survey of more than 1,500 security professionals found that 53% of respondents do not believe APTs differ from traditional threats.

This disconnect indicates that IT professionals and their organizations may not be fully prepared to protect themselves against APTs, according to ISACA.

“APTs are sophisticated, stealthy, and unrelenting,” ISACA International Vice President Christos Dimitriadis said in a news release. “Traditional cyberthreats often move right on if they cannot penetrate their initial target. But an APT will continually attempt to penetrate the desired target until it meets its objective—and once it does, it can disguise itself and morph when needed, making it difficult to identify or stop.”

The survey report is available at

Although more than 70% of the IT professionals surveyed said their organizations can detect APT attacks, and more than 70% said they can respond to APT attacks, their description of controls indicate a misunderstanding and lack of preparation, according to ISACA. Top controls enterprises are using to stop APTs were identified as anti-virus and anti-malware programs (95%) and network perimeter strategies such as firewalls (93%). But APTs have been known to avoid being detected or deterred by these types of controls.



Year-end tax planning and what’s new for 2016

Practitioners need to consider several tax planning opportunities to review with their clients before the end of the year. This report offers strategies for individuals and businesses, as well as recent federal tax law changes affecting this year’s tax returns.


News quiz: Retirement planning, tax practice, and fraud risk

Recent reports focused on a survey that gauges the worries about retirement among CPA financial planners’ clients, a suit that affects tax practitioners, and a guide that offers advice on fraud risk. See how much you know with this short quiz.


Bolster your data defenses

As you weather the dog days of summer, it’s a good time to make sure your cybersecurity structure can stand up to the heat of external and internal threats. Here are six steps to help shore up your systems.