Nick Graf, an ethical hacker with CNA, discusses all the cyber threats that go bump in the night and ways to prevent them from harming your business.
Information Management and Technology Assurance
This column discusses five reasons finance executives should care about blockchain and its potential.
By following a common set of spreadsheet design rules, companies can produce more consistent workbooks that may be easier to review, edit, and use by others in their organizations.
How to connect a subsequent numbered list to a previous numbered list in Microsoft Word.
EZ Texting lives up to its name in a big way ... DialMyCalls does that and a whole lot more
Do you still believe RFID technology is the future?
The framework gives an organization’s management criteria for explaining its cybersecurity risk management program and provides CPAs with guidance to be used in engagements to report on clients’ cybersecurity controls.
Basic analysis of the inventory process can become easier through use of a new audit data standard issued by the AICPA Assurance Services Executive Committee.
This Technology Workshop shows how to use Microsoft Excel to determine whether the numbers in a data set follow Benford’s curve or point to possible malfeasance.
To launch Chrome’s incognito mode by default in Windows 10, create a shortcut on your Desktop and edit the shortcut’s command line as follows.
Text does behave somewhat differently when typed into tables, and Word provides some additional tools specifically designed for typing in tables.
A monthly look at apps and websites that can make the CPA’s job and life better.
When it comes to choosing the best font for displaying both text and numbers, the font you choose matters.
The decision of the IRS and some states to recommend—or, in a few cases, require—the use of driver’s license numbers as form of authentication on electronically filed personal tax returns has made them a higher-value target for hackers and other criminals.
Strategic planning is among the top priorities for CFOs in a new survey, but some finance chiefs feel hampered by legacy IT systems.
These recently released publications can help jump-start CPA efforts to remain competitive in the evolving digitized environment.
U.S. securities issuers will be required to include a hyperlink to each exhibit in a corporate filing’s exhibit index under new rule and form amendments.
Follow these steps to start or grow data-based auditing practices.
Education and effective governance are keys to an effective cybersecurity policy, according to Steven J. Ursillo Jr., CPA/CITP, CGMA.
Defense from cyberattacks on a CPA firm’s fortress requires more than the IT cavalry.