The percentage of Americans who have fallen prey to an information security breach has risen to 25% from 11% the previous year, a new AICPA survey found.
Data and information security
A steady stream of high-profile cybercrimes involving corporate and customer data has captured the attention of North American accounting professionals, who ranked IT security as their top technology priority.
What are the minimum criteria for creating a strong password?
Windows 8/8.1 includes a new backup solution called File History. Here's how to set it up.
Lisa Traina, CPA/CITP, CGMA, president and owner of information technology security firm Traina & Associates, suggests ways for organizations with limited IT budgets to keep their data secure.
The advantages of technologies may seem obvious to you and me, but not everyone agrees.
The principles outlined in a popular internal control framework can help organizations manage their cybersecurity.
CPAs must properly secure any patient health care data that may come into their possession, to avoid potentially severe civil and criminal penalties.
Security incidents cost businesses an average of $2.7 million each year, according to a PwC survey.
Although many companies are seeing cybersecurity threats rise, many lack the resources to handle these risks, a new global survey shows. Two-thirds (67%) of organizations report facing rising threats in their information security risk environment, according to EY’s Global Information Security Survey, which polled 1,825 organizations in 60 countries. More
It should be no surprise amid the constant barrage of headlines about cybersecurity incidents that the number and cost of breaches is on the rise. Security incidents cost businesses an average of $2.7 million each year, according to a survey by PwC. Despite the burgeoning threat, information security is an
Q: I’ve heard that search engines such as Google and Yahoo! keep a record of your searches and the websites you visit and that they often share this personal information with other companies. I don’t do anything illicit on the internet, but I’m still not comfortable with these search engines
Q: When introduced to new privacy solutions (such as DuckDuckGo or Disconnect), what assurances do we have that these solutions aren’t themselves stealthily tracking our computing or internet activities? A: Before trusting a lesser-known privacy solution, at a minimum make sure that it meets the following criteria: The company makes
While no security program or security software can guarantee that data will never be lost or stolen, application of a few basic principles can help address mobile security risks and mitigate professional liability exposure.
Cloud computing and increasingly powerful mobile devices are breaking down communication, data access, and market barriers for CPAs, but the breakthroughs also open the door to potential trouble. A panel of technology experts offers advice on how CPAs can make the most of technology while minimizing the risks.
The steady barrage of headlines about cybersecurity underscores a topic viewed with wary eyes by many executives, board members, and investors. Employees may have access to sensitive data through smartphones that they carry everywhere. Globalization has increased the geographic reach of companies – making them visible to ever more hackers.
The steady stream of headlines about data breaches has the business community and regulators on high alert with regard to cybersecurity. An online PwC survey of global executives and IT directors conducted early in 2013 found that detected cybersecurity incidents rose 25% over the previous year. And 31% of executives
Data privacy doesn’t have to be an issue that keeps executives awake at night. Instead, companies that approach data privacy the right way can use it to differentiate themselves, said Carolyn Holcomb, CPA, the leader of PwC’s data protection and privacy practice in the United States. “We see companies that
The IRS does not do a good job of correcting security weaknesses, thereby failing to protect taxpayer data, the Treasury Inspector General for Tax Administration (TIGTA) concluded in a report released Thursday. TIGTA’s audit found that the IRS does not always correct known security problems and the corrective action process
On the surface, the results of the 2013 North America Top Technology Initiatives survey show that “managing and retaining data” nudged past “securing the IT environment” to become the top technology priority cited by the nearly 2,000 accounting professionals polled. Dig a little deeper, and the evidence indicates that the