In this video, Lisa Traina, CPA/CITP, CGMA, Traina & Associates, a CapinCrouse company, explains why organizations should examine their understanding of cybersecurity threats and offers three ways that CPAs can enhance their organization’s security.
Data and information security
Blockchain could streamline how money moves between nations.
Key statistics illustrate the threats facing the accounting profession—and potential liability for firms if a breach occurs.
Our annual technology roundtable explores the importance of multifactor authentication and solutions for securing clients’ data in the cloud.
What should CPAs be doing to better protect their data and derive more value from the investments in technology? Find out from our panel of accounting technology experts.
Nick Graf, an ethical hacker with CNA, discusses all the cyber threats that go bump in the night and ways to prevent them from harming your business.
This column discusses five reasons finance executives should care about blockchain and its potential.
The framework gives an organization’s management criteria for explaining its cybersecurity risk management program and provides CPAs with guidance to be used in engagements to report on clients’ cybersecurity controls.
To launch Chrome’s incognito mode by default in Windows 10, create a shortcut on your Desktop and edit the shortcut’s command line as follows.
The decision of the IRS and some states to recommend—or, in a few cases, require—the use of driver’s license numbers as form of authentication on electronically filed personal tax returns has made them a higher-value target for hackers and other criminals.
These recently released publications can help jump-start CPA efforts to remain competitive in the evolving digitized environment.
Education and effective governance are keys to an effective cybersecurity policy, according to Steven J. Ursillo Jr., CPA/CITP, CGMA.
Defense from cyberattacks on a CPA firm’s fortress requires more than the IT cavalry.
The best measure you can take to secure your Gmail is to enable two-step verification.
AICPA proposals would guide design and evaluation of cyber risk management.
These 5 tips will help organizations fit security spending into their budgets in a balanced way.
Scam perpetrators can mine crucial information from executives’ public profiles on social media.
Here’s how preparers can help thwart identity thieves.
Two proposals issued Monday would create guidance for management in designing and describing its cybersecurity risk management program.
These steps can help close holes in your cybersecurity setup.