Free Site Registration


Is IT Safe?

5 common security pitfalls and what your firm can do to protect itself.

While there are ever-increasing threats to a firm's IT security, technology consultant Dave Cieslak, principal and co-founder of Simi Valley, Calif.-based Arxis Technology, advises that firms pay attention to these five common pitfalls, and offers tips to abate the risks.

1. Mobile assets 1. Mobile assets

Threat: With the explosive proliferation of small devices (such as tablets, cell phones, ultrabooks, etc.) as well as laptops, loss, theft and improper disposal are quickly becoming some of the most significant threats to overall IT security and data leakage/loss.

Response: Reasonable steps to reduce this increasing risk include setting up passwords for all devices, encrypting data on the devices themselves, installing tracking and/or remote-wipe software in the event devices are misplaced, and end-user training.

2. Cloud security 2. Cloud security

Threat: Since data and applications will now be residing somewhere other than the "safe and secure" corporate computer room, security concerns are increasingly taking center stage.

Response: Organizations need to consider both internal factors (any requirements or laws preventing certain data from being migrated to the cloud), as well as external factors, such as where the data will be stored, who will have access, what controls the vendor has in place, will the data be replicated, can an organization make their own off-line backups, are intrusion detection mechanisms in place, and is the vendor SAS 70-certified -- to name just a few.

3. Social media 3. Social media

Threat: Users, it seems, are comfortable sharing virtually everything these days via online social media Web sites. But this "personal" information can, and will, be used against them. Cybercriminals are incorporating unique user information into targeted phishing scams.

Response: Users need to be on a keen lookout for these targeted attacks and be more wary than ever regarding what they click on.

Advertisement
4. Infected Web links 4. Infected Web links

Threat: More and more cybercriminals are using infected links as a means of inducing users to install malware on their machines.

Response: End users need to be vigilant about what they click on and make sure they have an up-to-date antivirus solution in place.

5. Backups 5. Backups

Threat: The loss of data -- through natural disasters, fires, equipment failures, and even theft -- can mean the collapse of a firm or its clients.

Response: Critical data, applications and services need to be identified and a backup solution implemented to ensure that the e-lifeblood of an organization is not placed in significant peril. Organizations should definitely consider using one of the many cloud-based backup services to complement, or even as the foundation of, their backup strategy.



Dumbest Employee Excuses for Being Late

Running a little late could have big repercussions, especially at a firm in the midst of busy season. From escaped zebras to must-see TV, employers told CareerBuilder some of the most memorable excuses they've heard from tardy employees.

View the slideshow >>


Common Taxpayer Misconceptions

The NAEA’s collection of ridiculous things tax clients believe

View the slideshow >>


The 10 Fastest-Growing Firms in the U.S.

The firms with the highest 2013 revenue growth in our Top 100 Firms/Regional Leaders list

View the slideshow >>


Top 10 Tech Trends for 2014

As companies gain more affordable access to new technology and platforms, they also seek to make smarter investments. As we begin 2014, James Cashin, partner at McGladrey, has identified 10 common strategies in how companies are capitalizing on their IT investments to best implement process improvements and increase performance.

View the slideshow >>


Most Unusual Sales Tax Changes Last Year

The Tax & Accounting business of Thomson Reuters has compiled its annual sampling of quirky sales tax changes passed or implemented in 2013.

View the slideshow >>


Strangest Tax Deductions

The Minnesota Society of CPAs recently conducted its annual CPA member survey about the most strange and unusual tax deductions proposed by clients. The responses included everything from pets and wedding rings to gifts not given.

View the slideshow >>


A Taxpayer Bill of Rights?

The Taxpayer Advocate proposes a list of rights — and responsibilities

View the slideshow >>


The Top Stories in Accounting in 2013

Our editors’ picks for the biggest stories in accounting in 2013

View the slideshow >>


10 Ways to Attract Talent and Show Off Your Firm’s Assets

Is your firm attracting the right kind of candidates—or any candidates? Dawn Wagenaar, a principal at the accounting and professional consulting agency, Ingenuity Marketing Group, offers 10 ways for firms to attract the hottest talent.

View the slideshow >>


The Top Accounting Technology Stories in 2013

Our editors’ picks for the biggest technology stories in 2013

View the slideshow >>



Advertisement

Advertisement

Advertisement

Advertisement