Skip to content

This site uses cookies to store information on your computer. Some are essential to make our site work; others help us improve the user experience. By using the site, you consent to the placement of these cookies. Read our privacy policy to learn more.

Close
AICPA-CIMA
  • AICPA & CIMA:
  • Home
  • CPE & Learning
  • My Account
Journal of Accountancy
  • TECH & AI
    • All articles
    • Artificial Intelligence (AI)
    • Microsoft Excel
    • Information Security & Privacy

    Latest Stories

    • Incorporating prompt engineering into the accounting curriculum
    • Create a dynamic to-do list with Excel’s checkboxes
    • Another way to manage authentication texts
  • TAX
    • All articles
    • Corporations
    • Employee benefits
    • Individuals
    • IRS procedure

    Latest Stories

    • Paper tax refund checks on the way out as IRS shifts to electronic payments
    • IRS keeps per diem rates unchanged for business travel year starting Oct. 1
    • Details on IRS prop. regs. on tip income deduction
  • PRACTICE MANAGEMENT
    • All articles
    • Diversity, equity & inclusion
    • Human capital
    • Firm operations
    • Practice growth & client service

    Latest Stories

    • Paper tax refund checks on the way out as IRS shifts to electronic payments
    • Practice mobility update: New NASBA tool tracks changes for CPAs
    • IRS keeps per diem rates unchanged for business travel year starting Oct. 1
  • FINANCIAL REPORTING
    • All articles
    • FASB reporting
    • IFRS
    • Private company reporting
    • SEC compliance and reporting

    Latest Stories

    • SEC accepting Professional Accounting Fellow applications
    • SEC names new chief accountant
    • SEC ends legal defense of its climate rules
  • AUDIT
    • All articles
    • Attestation
    • Audit
    • Compilation and review
    • Peer review
    • Quality Management

    Latest Stories

    • AICPA unveils new QM resources to help firms meet Dec. 15 deadline
    • 8 steps to build your firm’s quality management system on time
    • Auditing Standards Board proposes a new fraud standard
  • MANAGEMENT ACCOUNTING
    • All articles
    • Business planning
    • Human resources
    • Risk management
    • Strategy

    Latest Stories

    • Business outlook brightens somewhat despite trade, inflation concerns
    • AICPA & CIMA Business Resilience Toolkit — levers for action
    • Economic pessimism grows, but CFOs have strategic responses
  • Home
  • News
  • Magazine
  • Podcast
  • Topics
Advertisement
  1. newsletter
  2. Cpa Insider
CPA INSIDER

How to be street smart when budgeting for security

These 5 tips will help organizations fit security spending into their budgets in a balanced way.

By Joel Lanz, CPA/CITP/CFF, CGMA
October 31, 2016

Please note: This item is from our archives and was published in 2016. It is provided for historical reference. The content may be out of date and links may no longer function.

Related

November 1, 2016

New path for CPAs in cyber risk management

October 24, 2016

Don’t fall victim to the newest phishing scam

October 1, 2016

Keeping clients’ tax data secure

TOPICS

  • Technology
    • Information Security & Privacy
  • Management Accounting
    • Accounting Information Systems

As we head through fall, many financial professionals are focusing on the annual budget preparation “festivities.” As it relates to technology, this year is no different than previous years. The focus is on how to allocate and justify capital investments to better drive the achievement of organizational objectives. Even more challenging for budgeting professionals is determining the right balance of cyber and information security spending—whether from an investment perspective to enable increasing sales and customer retention or from an overhead perspective used to ensure protection of assets, compliance with regulations, and prevention of stakeholder actions, including, but not limited to, lawsuits.

The appropriate budget allocation will vary by organization based on specific profiles, needs and available resources. Most large organizations have mature processes that sufficiently address these issues. However, many entrepreneurial businesses—e.g., small to midsize businesses (SMBs) and non-profit organizations (NPOs)—face challenges in determining the appropriate balance between security and mission in their financial allocations. For example, every dollar that a nonprofit spends on cybersecurity is not spent directly on the NPO’s mission. For some NPOs, overspending on cybersecurity could affect the organization’s ability to save a life.

As you enter budget negotiations relating to cybersecurity, you’ll want to do the following:

  • Review the overall cybersecurity program and strategy to determine how budget requests help achieve the organization’s or program’s objectives. Although traditional budgeting metrics may not properly evaluate cybersecurity investments, the rationale for the budgeted items and how they would address program and strategy needs—as reviewed by the appropriate governance function (usually at the board level)—should be clearly defined and understandable from a business perspective. For example, investments in developing partitioned networks may facilitate compliance with mandatory standards, such as those pertaining to the payment card industry, or provide the ability to deliver heightened security protection over highly sensitive assets.  
  • Reconcile previous cybersecurity purchases and investments to what is actually being used today. The information security function should be able to provide a reconciliation of prior purchases and their overall effectiveness. This helps to identify broken implementation processes that could result in wasted or unneeded purchases and also provides evidence of the information security function’s ability to conduct appropriate due diligence for potential security investments. This particular technique helps identify the “chasing” of the trendy gadgets and tools that were popular during previous budget cycles but not sufficiently vetted to confirm their applicability to the organization’s needs and environment. Another potential benefit of this reconciliation process is identifying technology no longer used and canceling related payments for maintenance, licensing renewal and other recurring fees.  
  • Invest in cost-effective automated security testing tools. The cost of automated security tools such as web application and network vulnerability scanners have dramatically decreased during the past few years, while their effectiveness and ability to detect potential exploits have significantly improved. These tools provide organizations with the ability to continuously test the effectiveness of their cybersecurity strategies to protect against the most common threats and exploits used by hackers. Although not a substitute for the more expensive penetration tests, these automated tools generally give organizations the ability to identify and repair many potential exploits. Organizations should complete a robust vulnerability assessment and remediation process before attempting a more expensive penetration test.  
  • Consider the use of managed security service providers (MSSPs) to perform high risk yet commodity-type services. MSSPs help organizations monitor activity and traffic, identify potential data leakage, expertly configure firewalls and provide 24/7 oversight for a fraction of what it would cost individual organizations to do so internally. Most importantly, MSSPs provide the evolving expertise needed to manage external threats—something very difficult for most organizations to handle internally.  
  • Support security awareness training to educate users on practices they can employ—and, perhaps even more importantly, avoid—in the battle to keep hackers at bay. Users of an organization’s computing resources can help protect the computing environment by selecting strong passwords, and they can avoid opening the door to hackers by not clicking on tainted attachments or links, which are often delivered in cleverly disguised emails designed to fool users into introducing malware into the organization’s network. Far too often, executives assume that users know how to do the right thing. Yet, even users who have had security training in the past need at least yearly updates on the rapidly evolving and increasingly sophisticated tools of deception hackers are using to break into networks and steal potentially damaging information, including customer credit card and Social Security numbers.  

Enhancing your organization’s cybersecurity posture does not have to be expensive. Alternatively, selecting only cheap alternatives does not make your organization secure. Clearly understanding business objectives and selecting street-smart cybersecurity strategies to facilitate those objectives are critical in ensuring cost-effective budgeting decisions.

Joel Lanz, CPA/CITP/CFF, CGMA is the founder and principal of Joel Lanz, CPA PC, a niche CPA practice focusing on information assurance, technology risk management, and security. He also chairs the AICPA Information Management and Technology Assurance Executive Committee and is an adjunct professor in the business school at The State University of New York at Old Westbury in Old Westbury, N.Y.

Advertisement

latest news

September 24, 2025

Paper tax refund checks on the way out as IRS shifts to electronic payments

September 24, 2025

Practice mobility update: New NASBA tool tracks changes for CPAs

September 23, 2025

IRS keeps per diem rates unchanged for business travel year starting Oct. 1

September 22, 2025

Managing teams, managing time: The importance of setting expectations

September 19, 2025

Details on IRS prop. regs. on tip income deduction

Advertisement

Most Read

MAP Survey finds CPA firm starting pay on the rise
IRS finalizes regulations for Roth catch-up contributions under SECURE 2.0
NASBA, AICPA release proposed revisions to CPE standards
Congress passes act allowing tax relief when a state declares disaster
Treasury posts preliminary list of jobs eligible for no tax on tips
Advertisement

Podcast

September 25, 2025

Professional liability risks related to Form 1065, CPA firm acquisitions

September 18, 2025

‘We’re still the thinkers’ — a reminder for tax pros in the AI era

September 11, 2025

Strong storytelling helps speakers deliver ‘medicine’ without the aftertaste

Features

Calming nervous clients nearing retirement
Calming nervous clients nearing retirement

Calming nervous clients nearing retirement

7 retirement tips for small firm CPAs
7 retirement tips for small firm CPAs

7 retirement tips for small firm CPAs

Building a better CPA firm: Stepping up service offerings
Multi-colored plus signs

Building a better CPA firm: Stepping up service offerings

2025 tax software survey
Smiley, frowney, and neutral faces for Tax Software Survey.

2025 tax software survey

FROM THIS MONTH'S ISSUE

Flip out with the latest Tech Q&A

The September Technology Q&A column shows how to create dynamic to-do lists with Excel's checkboxes and also how to set up multifactor authentication texts that don't rely on phones. Flip through both items and view a video walkthrough in our digital format. 

From The Tax Adviser

August 30, 2025

2025 tax software survey

August 30, 2025

Are you doing all you can to keep the cash method for your clients?

July 31, 2025

Current developments in S corporations

July 31, 2025

Paid student-athletes: Tax implications for universities and donors

MAGAZINE

September 2025

September 2025

September 2025
August 2025

August 2025

August 2025
July 2025

July 2025

July 2025
June 2025

June 2025

June 2025
May 2025

May 2025

May 2025
April 2025

April 2025

April 2025
March 2025

March 2025

March 2025
February 2025

February 2025

February 2025
January 2025

January 2025

January 2025
December 2024

December 2024

December 2024
November 2024

November 2024

November 2024
October 2024

October 2024

October 2024
view all

View All

http://JofA_Default_Mag_cover_small_official_blue

PUSH NOTIFICATIONS

Coming soon: Learn about important news

CPA LETTER DAILY EMAIL

CPA Letter Logo

Subscribe to the daily CPA Letter

Stay on top of the biggest news affecting the profession every business day. Follow this link to your marketing preferences on aicpa-cima.com to subscribe. If you don't already have an aicpa-cima.com account, create one for free and then navigate to your marketing preferences.

Connect

  • X Logo JofA on X
  • facebook JofA on Facebook

HOME

  • News
  • Monthly issues
  • Podcast
  • A&A Focus
  • PFP Digest
  • Academic Update
  • Topics
  • RSS feed rss feed
  • Site map

ABOUT

  • Contact us
  • Advertise
  • Submit an article
  • Editorial calendar
  • Privacy policy
  • Terms & conditions

SUBSCRIBE

  • Academic Update
  • CPE Express

AICPA & CIMA SITES

  • AICPA-CIMA.com
  • Global Engagement Center
  • Financial Management (FM)
  • The Tax Adviser
  • AICPA Insights
  • Global Career Hub
AICPA & CIMA

© 2025 Association of International Certified Professional Accountants. All rights reserved.

Reliable. Resourceful. Respected.