Data and information security

CPAs select security as top technology priority

A steady stream of high-profile cybercrimes involving corporate and customer data has captured the attention of North American accounting professionals, who ranked IT security as their top technology priority.

Free backup gets easier

Windows 8/8.1 includes a new backup solution called File History. Here's how to set it up.

How small businesses can keep data secure

Lisa Traina, CPA/CITP, CGMA, president and owner of information technology security firm Traina & Associates, suggests ways for organizations with limited IT budgets to keep their data secure.

Tech-no-phobes

The advantages of technologies may seem obvious to you and me, but not everyone agrees.

Technology

Security incidents cost businesses an average of $2.7 million each year, according to a PwC survey.

How to take a forward-looking approach to cybersecurity

Although many companies are seeing cybersecurity threats rise, many lack the resources to handle these risks, a new global survey shows. Two-thirds (67%) of organizations report facing rising threats in their information security risk environment, according to EY’s Global Information Security Survey, which polled 1,825 organizations in 60 countries. More

Global cyberattacks rose 48% in 2014

It should be no surprise amid the constant barrage of headlines about cybersecurity incidents that the number and cost of breaches is on the rise. Security incidents cost businesses an average of $2.7 million each year, according to a survey by PwC. Despite the burgeoning threat, information security is an

Searching for privacy

Q: I’ve heard that search engines such as Google and Yahoo! keep a record of your searches and the websites you visit and that they often share this personal information with other companies. I don’t do anything illicit on the internet, but I’m still not comfortable with these search engines

Substantiating trust

Q: When introduced to new privacy solutions (such as DuckDuckGo or Disconnect), what assurances do we have that these solutions aren’t themselves stealthily tracking our computing or internet activities? A: Before trusting a lesser-known privacy solution, at a minimum make sure that it meets the following criteria: The company makes

Data security risk: You can take it anywhere

While no security program or security software can guarantee that data will never be lost or stolen, application of a few basic principles can help address mobile security risks and mitigate professional liability exposure.

Harnessing the power of the cloud

Cloud computing and increasingly powerful mobile devices are breaking down communication, data access, and market barriers for CPAs, but the breakthroughs also open the door to potential trouble. A panel of technology experts offers advice on how CPAs can make the most of technology while minimizing the risks.

Six cybersecurity basics

The steady barrage of headlines about cybersecurity underscores a topic viewed with wary eyes by many executives, board members, and investors. Employees may have access to sensitive data through smartphones that they carry everywhere. Globalization has increased the geographic reach of companies – making them visible to ever more hackers.

SPONSORED REPORT

2018 financial reporting survey: Challenges and trends

Learn the top reporting challenges that emerged in a survey of more than 800 finance, accounting, and compliance professionals across the world, and compare them with your organization's obstacles.

PODCAST

How the skill set for today’s CFO is changing

Scott Simmons, a search expert for large-company CFOs, gives advice for the next generation of finance leaders and more, including which universities are regularly producing future CEOs and CFOs.