How Accountants Can Get Ahead in the Automation Age
ccountants, it’s time to keep up or fall way behind. Better yet, learn how to get and stay ahead. Because, while change has been a constant for decades – thank you, Bob Dylan – it’s reaching warp speed. That’s the overarching message of a new...
IRS Message to the Tax Professional Community
The IRS continues to review its procedures to better protect sensitive taxpayer data. As part of this effort, the IRS will request additional information from tax professionals who contact us through the Practitioner Priority Service or any...
Connecticut Works To Fend Off Cybersecurity Attacks On Election
Two days after President Donald Trump eliminated the position of cybersecurity coordinator on the National Security Council, Secretary of the State Denise Merrill convened the second meeting of the Elections Cybersecurity Task Force....
Tech, people skills are key as accountants face changing demands
Accounting and finance professionals are finding that they must continually learn, unlearn, and relearn to maintain their highly trusted position in a rapidly changing business environment. Accountants need to understand emerging technologies...
Small businesses should guard against tax-return identity theft
The IRS on Thursday issued a warning to employers and small businesses to beware of growing attempts by cybercriminals to target businesses to obtain the business’s and employees’ information. These criminals then use the stolen...
IRS, Security Summit Partners warn of new twist on phone scam; crooks direct taxpayers to IRS.gov to “verify” calls
The Internal Revenue Service today warned of a new twist on an old phone scam as criminals use telephone numbers that mimic IRS Taxpayer Assistance Centers (TACs) to trick taxpayers into paying non-existent tax bills. The IRS and its Security...
 
 

Upcoming Programs and Webinars:

 
    Connecticut CPA magazine feature
Blockchain Brings Exponential Disruption, Growth Potential to Accounting

By Geoff Hopkins, Director, Technology and Management Consulting, RSM

Distributed blockchain was conceptualized and put into practice as a public and peer-to-peer autonomous ledger. As the core component of bitcoin, it immediately solved a digital currency double spending problem without a trusted authority or central administrator.

Read more>>>
 


  Connecticut CPA magazine feature
Client Data Is a Virtual Treasure Trove:
Why CPA firms must be vigilant about cybersecurity

By Mark R. Torello, CPA, CFE, CISA; Chair, CTCPA Technology Interest Group

Because CPA firms have access to a virtual treasure trove of data, we’re vulnerable to hackers and, therefore, held to higher levels of compliance requirements at both the state and federal levels. As accounting professionals, we should embrace these laws, because standardization and guidance are good for our industry and our clients. However, the myriad cybersecurity-related laws can be challenging to navigate.

Read more>>>
 
    Risk Alert – Social Engineering for CPAs

As with many fraud schemes perpetrated against accounting professionals, social engineering has obtained a greater level of sophistication. This development has arisen in response to increased awareness and vigilance of such schemes. Recent variations of the schemes have emerged to create a stronger appearance of legitimacy.

Read more>>>
 

 

Cybersecurity: A top concern among accounting professionals
The latest facts, court rulings, and new regulations

Stan Sterna, JD, Vice President, Risk Management, Aon Insurance Services

Safeguarding your clients’ nonpublic information from cyber-criminals is a top priority for CPA firms. In fact, the latest data breach statistics from RSA Security show an alarming increase in the number of exposed consumer records across industries:

  • 4,149 reported breaches exposing 4.2 billion records
  • 53% of all breaches resulted from hacking by outside sources
  • 91% of all breaches were electronic, as opposed to stolen hardware

Read more>>>
 

   

Creating a Disaster Plan to Ensure Your Company’s Security

By Paul C. Ursich, CPA, and Robert Risk, Wiss & Company LLP

When it comes to defending your enterprise from undefined catastrophes, traditional disaster recovery tactics are no longer adequate. If cyber terrorists seize your company’s critical information, or if human error or natural disasters erase your company’s data, your resources cannot be swiftly returned by outdated recovery methods.

Read more>>>