AICPA proposals would guide design and evaluation of cyber risk management.
Information management and technology assurance
Internet privacy: Account killer
Is it possible to delete all personal profile information from the internet?
Microsoft Windows: ‘Gigantic’ tip for freeing hard disk space
Tips to free up space on a computer hard drive.
Microsoft Word: Control your pasting with this alternate approach
A handy formatting tip for pasting from the internet into a Word document.
Microsoft Word: Check this out
How to add a checkmark to your Microsoft Word document.
Microsoft Excel: Printing all sheets
Tips for printing all of the worksheets in an Excel workbook at one time.
How to be street smart when budgeting for security
These 5 tips will help organizations fit security spending into their budgets in a balanced way.
Don’t fall victim to the newest phishing scam
Scam perpetrators can mine crucial information from executives’ public profiles on social media.
Expanding your app-titude
This month: A Fantastical approach to a one-stop calendar app … Bringing a touch of CloudMagic to email
Keeping clients’ tax data secure
Here’s how preparers can help thwart identity thieves.
Mobile apps: Ultra-cheap to Uber-expensive
Ideas to help minimize your Uber fees.
Security: Secure your things in a blink
Can you recommend a good, low-cost (under a few hundred dollars), wireless security camera system that automatically records and notifies you when motion is detected?
Excel: Keyboarding for speed
With speed in mind, here are a few of my favorite Excel keyboard commands. How many do you already know?
Powerpoint: Animated painting
How to animate all of the images on a single PowerPoint slide at the same time.
6 ethical questions about Big Data
Organizations must consider the ethical use of data collected from various devices.
Internet: Connect to Wi-Fi using a QR code
How to simplify your wi-fi connection process.
New path proposed for CPAs in cyber risk management
Two proposals issued Monday would create guidance for management in designing and describing its cybersecurity risk management program.
Technology risk: It’s more than cybersecurity
This column discusses the “silent killers” of technology risk that organizations must master to protect their business.
FASB releases proposed 2017 GAAP taxonomy
The taxonomy allows companies to apply computer-readable tags to thousands of pieces of financial data that are included in financial reports.
Outlook 2016: From weak view to week view
How to quickly drill into your Outlook 2016 Calendar to display the Week view.
Features
SPONSORED REPORT
How to find the right CAS clients
The key to success with CAS is selecting the best clients. Tools like ideal client profiles (ICPs), buyer personas, and even artificial intelligence can help identify the businesses that best fit each CAS practice.
