Data and information security

CPAs select security as top technology priority

A steady stream of high-profile cybercrimes involving corporate and customer data has captured the attention of North American accounting professionals, who ranked IT security as their top technology priority.

Free backup gets easier

Windows 8/8.1 includes a new backup solution called File History. Here's how to set it up.

How small businesses can keep data secure

Lisa Traina, CPA/CITP, CGMA, president and owner of information technology security firm Traina & Associates, suggests ways for organizations with limited IT budgets to keep their data secure.

Tech-no-phobes

The advantages of technologies may seem obvious to you and me, but not everyone agrees.

Technology

Security incidents cost businesses an average of $2.7 million each year, according to a PwC survey.

How to take a forward-looking approach to cybersecurity

Although many companies are seeing cybersecurity threats rise, many lack the resources to handle these risks, a new global survey shows. Two-thirds (67%) of organizations report facing rising threats in their information security risk environment, according to EY’s Global Information Security Survey, which polled 1,825 organizations in 60 countries. More

Global cyberattacks rose 48% in 2014

It should be no surprise amid the constant barrage of headlines about cybersecurity incidents that the number and cost of breaches is on the rise. Security incidents cost businesses an average of $2.7 million each year, according to a survey by PwC. Despite the burgeoning threat, information security is an

Searching for privacy

Q: I’ve heard that search engines such as Google and Yahoo! keep a record of your searches and the websites you visit and that they often share this personal information with other companies. I don’t do anything illicit on the internet, but I’m still not comfortable with these search engines

Substantiating trust

Q: When introduced to new privacy solutions (such as DuckDuckGo or Disconnect), what assurances do we have that these solutions aren’t themselves stealthily tracking our computing or internet activities? A: Before trusting a lesser-known privacy solution, at a minimum make sure that it meets the following criteria: The company makes

Data security risk: You can take it anywhere

While no security program or security software can guarantee that data will never be lost or stolen, application of a few basic principles can help address mobile security risks and mitigate professional liability exposure.

Harnessing the power of the cloud

Cloud computing and increasingly powerful mobile devices are breaking down communication, data access, and market barriers for CPAs, but the breakthroughs also open the door to potential trouble. A panel of technology experts offers advice on how CPAs can make the most of technology while minimizing the risks.

Six cybersecurity basics

The steady barrage of headlines about cybersecurity underscores a topic viewed with wary eyes by many executives, board members, and investors. Employees may have access to sensitive data through smartphones that they carry everywhere. Globalization has increased the geographic reach of companies – making them visible to ever more hackers.

Auditors have important role in cybersecurity

The steady stream of headlines about data breaches has the business community and regulators on high alert with regard to cybersecurity. An online PwC survey of global executives and IT directors conducted early in 2013 found that detected cybersecurity incidents rose 25% over the previous year. And 31% of executives

Use data privacy to gain a competitive advantage

Data privacy doesn’t have to be an issue that keeps executives awake at night. Instead, companies that approach data privacy the right way can use it to differentiate themselves, said Carolyn Holcomb, CPA, the leader of PwC’s data protection and privacy practice in the United States. “We see companies that

TIGTA report says IRS should do a better job protecting taxpayer data

The IRS does not do a good job of correcting security weaknesses, thereby failing to protect taxpayer data, the Treasury Inspector General for Tax Administration (TIGTA) concluded in a report released Thursday. TIGTA’s audit found that the IRS does not always correct known security problems and the corrective action process

Survey spotlights need for data and security strategies

On the surface, the results of the 2013 North America Top Technology Initiatives survey show that “managing and retaining data” nudged past “securing the IT environment” to become the top technology priority cited by the nearly 2,000 accounting professionals polled. Dig a little deeper, and the evidence indicates that the

SPONSORED REPORT

Building client loyalty with payroll services

In this report, CPA experts detail their tactics for performing successful payroll services, how to mitigate risk in the process, and the impact payroll can have as a value-added service.

PODCAST

Using drones to enhance audits

Hermann Sidhu, CPA, global assurance digital leader at EY, walks us through EY’s exciting new project to use drones to help audit large warehouses and outdoor inventories.