Print Friendly, PDF & Email


Value-Based and Alternative Payment Methodologies Require a New Approach to Data Analysis, Reporting

Since the inception of electronic medical records and practice management systems, healthcare facility finance teams have had an overwhelming amount of data at their disposal that has gone largely underutilized. With the emergence of Accountable Care Organizations (ACOs) and other alternative payment methodologies (APMs), providers have been asked to become more patient-focused, implementing care management […]

Membership Organization Revenue Management and Predictive Analytics

With the onset of the Financial Accounting Standards Board’s (FASB) Accounting Standard Update (ASU) 2014-09, Revenue from Contracts with Customers, (ASC Topic 606) membership organizations face a complex accounting exercise when answering: What value are members receiving? The value question proves extremely complex when applying the five-step approach outlined in the new revenue standard—specifically, step […]

How Secure Is Your Physical Office Space?

Data and IT Security goes well beyond cyberspace. The security of your physical office space may also be at risk. A successful physical breach by an outsider could produce unauthorized access to packages, equipment, documents, as well as threats of theft and employee safety. AAFCPAs has outlined for your considerations some best practice recommendations to […]

October is National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month

Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online. The Business & IT Security practice at AAFCPAs has published the following insights […]

IT Security Vulnerabilities Caused by Web Applications

Custom business applications are increasingly attractive because they allow companies to improve employee and customer user experiences with enhanced flexibility and efficiency. Some custom business app platforms tout that “creating your own custom apps is easy, even if your programming knowledge is non-existent.” However, this ease and accessibility can lead to unanticipated security vulnerabilities. According […]

Internet of Things (IoT) and Cyber Security

What Is IoT And How Do Hackers Infiltrate Your Devices? An increasing number of companies are installing Internet of Things (IoT) devices on their networks. IoT devices are typically “black box” devices, the inner workings of which are unknown to most users. For example, HVAC systems, smart fridges, computer printers, and even cars can contain […]

Configuration & Application Vulnerabilities in Cyber & IT Security

Despite the best efforts of IT teams, organizations continue to be plagued with IT security vulnerabilities in their systems by both internal and external threats. The most common vulnerabilities are poor configurations and outdated/unpatched systems or applications. These vulnerabilities may subject your organization to the risk of hackers gaining access to sensitive employee or client […]

Eye on Cyber: A Day in the Life of an Ethical Hacker

Listen to Podcasts:   “Innovation, organization, and sophistication—these are the tools of cyber attackers as they work harder and more efficiently to uncover new vulnerabilities,” reports Symantec in their 2018 Internet Security Threat Report. Ethical hacking services are a great way for organizations to unearth security weaknesses before they can be exploited by online criminals. […]

Common Social Engineering Cyber Attacks and Prevention Strategies

What is Social Engineering & what are the risks? The human component of cyber security is the weakest link in protecting your organization against external threats. Recently, social engineering attacks have become the most prevalent type of threat within reported cyber breaches. Social engineering is a malicious activity in which bad actors produce items such […]

SOC Report Approach & Timeline

This report highlights the approach, responsibilities and timeline for a three phase System and Organization Controls, SOC 2 Report.  AAFCPAs has provided this resource in an effort to help management of service organizations better understand SOC examinations and how to prepare for a SOC 2 engagement.