Print Friendly, PDF & Email


October is National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month

Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online. The Business & IT Security practice at AAFCPAs has published the following insights recently to outline the most common vulnerabilities and how to mitigate risks: IT Security Vulnerabilities... continue reading

IT Security Vulnerabilities Caused by Web Applications

Custom business applications are increasingly attractive because they allow companies to improve employee and customer user experiences with enhanced flexibility and efficiency. Some custom business app platforms tout that “creating your own custom apps is easy, even if your programming knowledge is non-existent.” However, this ease and accessibility can lead to unanticipated security vulnerabilities. According to Impervia, in 2018, web application security vulnerabilities increased by 23% from 2017 and by... continue reading

Internet of Things (IoT) and Cyber Security

What Is IoT And How Do Hackers Infiltrate Your Devices? An increasing number of companies are installing Internet of Things (IoT) devices on their networks. IoT devices are typically “black box” devices, the inner workings of which are unknown to most users. For example, HVAC systems, smart fridges, computer printers, and even cars can contain IoT-enabled technology that connects through WiFi or cellular and therefore can be considered IoT devices.... continue reading

Configuration & Application Vulnerabilities in Cyber & IT Security

Despite the best efforts of IT teams, organizations continue to be plagued with IT security vulnerabilities in their systems by both internal and external threats. The most common vulnerabilities are poor configurations and outdated/unpatched systems or applications. These vulnerabilities may subject your organization to the risk of hackers gaining access to sensitive employee or client data. What are Countermeasures/Prevention Techniques? Change Management Organizations must establish and document their process for... continue reading

Eye on Cyber: A Day in the Life of an Ethical Hacker

Listen to Podcasts:   “Innovation, organization, and sophistication—these are the tools of cyber attackers as they work harder and more efficiently to uncover new vulnerabilities,” reports Symantec in their 2018 Internet Security Threat Report. Ethical hacking services are a great way for organizations to unearth security weaknesses before they can be exploited by online criminals. In this instructive session, AAFCPAs’ IT Security professionals James Jumes and Vassilis Kontoglis go behind the disguise with our... continue reading

AAFCPAs’ Mr. Anderson Earns Certified Ethical Hacker Credential

AAFCPAs’ Mr. Anderson Earns Certified Ethical Hacker Credential

AAFCPAs’ “white hat” ethical security hacker and business continuity advisor, Mr. Anderson has been awarded the Certified Ethical Hacker (CEH) credential issued by the International Council of E-Commerce Consultants (EC-Council). Mr. Anderson was awarded the CEH credential in recognition of his earned expertise in understanding how to uncover weaknesses and vulnerabilities in target systems and use the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess... continue reading

AAFCPAs Enhances Consulting Expertise in Cybersecurity, IT Systems, Business Process, and Performance Controls

AAFCPAs Enhances Consulting Expertise in Cybersecurity, IT Systems, Business Process, and Performance Controls

Due to growth in client demand, AAFCPAs expands its Business Process & IT Advisory Practice with the addition of two deeply experienced Managers: Dawn Pantano, CPA, CITP, and Mr. Anderson, MCSE, CCNP, CISSP. Dawn and Mr. Anderson are highly regarded for their expertise in IT security, business continuity, and selecting and deploying key business applications and technologies to meet corporate objectives, and drive productivity. These valuable additions present AAFCPAs’ clients... continue reading