Is IT Safe?

5 common security pitfalls and what your firm can do to protect itself.

While there are ever-increasing threats to a firm's IT security, technology consultant Dave Cieslak, principal and co-founder of Simi Valley, Calif.-based Arxis Technology, advises that firms pay attention to these five common pitfalls, and offers tips to abate the risks.

1. Mobile assets 1. Mobile assets

Threat: With the explosive proliferation of small devices (such as tablets, cell phones, ultrabooks, etc.) as well as laptops, loss, theft and improper disposal are quickly becoming some of the most significant threats to overall IT security and data leakage/loss.

Response: Reasonable steps to reduce this increasing risk include setting up passwords for all devices, encrypting data on the devices themselves, installing tracking and/or remote-wipe software in the event devices are misplaced, and end-user training.

2. Cloud security 2. Cloud security

Threat: Since data and applications will now be residing somewhere other than the "safe and secure" corporate computer room, security concerns are increasingly taking center stage.

Response: Organizations need to consider both internal factors (any requirements or laws preventing certain data from being migrated to the cloud), as well as external factors, such as where the data will be stored, who will have access, what controls the vendor has in place, will the data be replicated, can an organization make their own off-line backups, are intrusion detection mechanisms in place, and is the vendor SAS 70-certified -- to name just a few.

3. Social media 3. Social media

Threat: Users, it seems, are comfortable sharing virtually everything these days via online social media Web sites. But this "personal" information can, and will, be used against them. Cybercriminals are incorporating unique user information into targeted phishing scams.

Response: Users need to be on a keen lookout for these targeted attacks and be more wary than ever regarding what they click on.

4. Infected Web links 4. Infected Web links

Threat: More and more cybercriminals are using infected links as a means of inducing users to install malware on their machines.

Response: End users need to be vigilant about what they click on and make sure they have an up-to-date antivirus solution in place.

5. Backups 5. Backups

Threat: The loss of data -- through natural disasters, fires, equipment failures, and even theft -- can mean the collapse of a firm or its clients.

Response: Critical data, applications and services need to be identified and a backup solution implemented to ensure that the e-lifeblood of an organization is not placed in significant peril. Organizations should definitely consider using one of the many cloud-based backup services to complement, or even as the foundation of, their backup strategy.



Top 10 Challenges of Managing Multiple Accounting Offices

Consolidation in the accounting industry has resulted in more accounting firms juggling multiple locations. Maureen Schwartz, executive director of BKR International, provides a top 10 list of challenges as well as guidance for multiple-office practice management.

View the slideshow >>


What to Do When Your Identity Has Been Stolen

A step-by-step guide for victims of ID theft (and their advisors)

View the slideshow >>


The 'Tax Warrior' Creed

Philadelphia firm Drucker & Scaccetti creates a warrior mindset

View the slideshow >>


10 Tips for Fighting Tax-Related ID Theft

Constant vigilance is the price of fighting online fraud

View the slideshow >>


Taxpayers Speak!

A WalletHub survey reveals what your clients really think about taxes and more

View the slideshow >>


Top 10 Form W-2, 1099 and 1095 Myths vs. Realities

Greatland Corporation has compiled a list of misconceptions when it comes to tax-reporting requirements. Failing to understand the real truth behind these myths can cost a business extra money to file again or, even worse, to pay steep fines if reporting is not done in compliance with regulations.

View the slideshow >>


The Fastest-Growing Firms in the U.S.

The firms with the highest 2015 revenue growth from our Top 100 Firms/Regional Leaders list

View the slideshow >>


6 Ways to Attract and Retain Millennial CPAs

Millennials have a very different set of priorities when deciding where they want to work than previous generations. Employers need to ensure they are tailoring their organizations in order to find and keep millennial talent. Here are some suggestions from Henner Schliebs, VP and head of finance audience marketing at SAP.

View the slideshow >>


The 2016 IRS Dirty Dozen

The 12 most egregious tax scams of the year

View the slideshow >>


Top 10 Tax Tips for Farmers and Ranchers

While some farms may raise cattle, poultry or fish and others grow fruits or vegetables, all will report their farm income on Schedule F, Profit or Loss from Farming. If your clients own a farm or ranch, here are 10 tax tips from the IRS.

View the slideshow >>



Subscribe to the Tax Pro Today newsletter