Basic analysis of the inventory process can become easier through use of a new audit data standard issued by the AICPA Assurance Services Executive Committee.
Information management and technology assurance
This Technology Workshop shows how to use Microsoft Excel to determine whether the numbers in a data set follow Benford’s curve or point to possible malfeasance.
To launch Chrome’s incognito mode by default in Windows 10, create a shortcut on your Desktop and edit the shortcut’s command line as follows.
Text does behave somewhat differently when typed into tables, and Word provides some additional tools specifically designed for typing in tables.
A monthly look at apps and websites that can make the CPA’s job and life better.
When it comes to choosing the best font for displaying both text and numbers, the font you choose matters.
The decision of the IRS and some states to recommend—or, in a few cases, require—the use of driver’s license numbers as form of authentication on electronically filed personal tax returns has made them a higher-value target for hackers and other criminals.
Strategic planning is among the top priorities for CFOs in a new survey, but some finance chiefs feel hampered by legacy IT systems.
These recently released publications can help jump-start CPA efforts to remain competitive in the evolving digitized environment.
U.S. securities issuers will be required to include a hyperlink to each exhibit in a corporate filing’s exhibit index under new rule and form amendments.
Follow these steps to start or grow data-based auditing practices.
Education and effective governance are keys to an effective cybersecurity policy, according to Steven J. Ursillo Jr., CPA/CITP, CGMA.
Defense from cyberattacks on a CPA firm’s fortress requires more than the IT cavalry.
Almost all smartphones include a calculator, but not all of them are advanced enough to meet the demanding needs of a true tech-savvy CPA.
Worth your Tile: Find keys or wallet easily with app ... Updates boost Automatic’s tracking of driving habits
Microsoft Excel 2016 has two new mapping capabilities.
I dropped my Turbo 2 phone through a couch, and when I tilted the couch to retrieve the phone, I rocked the couch’s metal frame atop the phone and completely shattered the screen; or at least so I thought.
The best measure you can take to secure your Gmail is to enable two-step verification.
Recently, I've become concerned about the privacy of sending email. What's a cheap and easy way to protect my email messages?
Excel offers three functions for calculating the internal rate of return, and I recommend you use all three.