Technology & Cybersecurity


    Connecticut CPA magazine feature
Blockchain Brings Exponential Disruption, Growth Potential to Accounting

By Geoff Hopkins, Director, Technology and Management Consulting, RSM

Distributed blockchain was conceptualized and put into practice as a public and peer-to-peer autonomous ledger. As the core component of bitcoin, it immediately solved a digital currency double spending problem without a trusted authority or central administrator.

Read more>>>
 


  Connecticut CPA magazine feature
Client Data Is a Virtual Treasure Trove:
Why CPA firms must be vigilant about cybersecurity

By Mark R. Torello, CPA, CFE, CISA; Chair, CTCPA Technology Interest Group

Because CPA firms have access to a virtual treasure trove of data, we’re vulnerable to hackers and, therefore, held to higher levels of compliance requirements at both the state and federal levels. As accounting professionals, we should embrace these laws, because standardization and guidance are good for our industry and our clients. However, the myriad cybersecurity-related laws can be challenging to navigate.

Read more>>>
 
    Risk Alert – Social Engineering for CPAs

As with many fraud schemes perpetrated against accounting professionals, social engineering has obtained a greater level of sophistication. This development has arisen in response to increased awareness and vigilance of such schemes. Recent variations of the schemes have emerged to create a stronger appearance of legitimacy.

Read more>>>
 

 

Cybersecurity: A top concern among accounting professionals
The latest facts, court rulings, and new regulations

Stan Sterna, JD, Vice President, Risk Management, Aon Insurance Services

Safeguarding your clients’ nonpublic information from cyber-criminals is a top priority for CPA firms. In fact, the latest data breach statistics from RSA Security show an alarming increase in the number of exposed consumer records across industries:

  • 4,149 reported breaches exposing 4.2 billion records
  • 53% of all breaches resulted from hacking by outside sources
  • 91% of all breaches were electronic, as opposed to stolen hardware

Read more>>>
 

   

Creating a Disaster Plan to Ensure Your Company’s Security

By Paul C. Ursich, CPA, and Robert Risk, Wiss & Company LLP

When it comes to defending your enterprise from undefined catastrophes, traditional disaster recovery tactics are no longer adequate. If cyber terrorists seize your company’s critical information, or if human error or natural disasters erase your company’s data, your resources cannot be swiftly returned by outdated recovery methods.

Read more>>>