Meet Mr. Anderson, AAFCPAs’ Certified Ethical Hacker

Meet Mr. Anderson, AAFCPAs’ Certified Ethical Hacker

AAFCPAs’ reminds clients that October is cybersecurity awareness month in the United States. AAFCPAs performs Information Technology (IT)/Cyber Security Assessments which help clients identify risks from the use of technology that could potentially cause information loss and/or financial and reputational harm to your organization. Our assessments include Vulnerability & Penetration testing performed by Mr. Anderson, […]

IT Execs Must Balance Security with Productivity

COVID-19 has challenged businesses to think about operations in a new way, and in many cases, your IT specialists may be supporting employees for the first time ever that were never intended or conceived to be remote or fully remote. This shift in the way we work has created competing interests for IT departments, who […]

Changes Proposed to Healthcare Privacy Rules

AAFCPAs would like to make healthcare clients aware that the Department of Health & Human Services’ Office for Civil Rights (DHHS OCR) proposed new regulations to modify the Standards for the Privacy of Individually Identifiable Health Information (Privacy Rule) under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the Health Information Technology […]

AAFCPAs’ Mr. Anderson Earns Amazon Web Services Certified Solutions Architect Professional Credential

AAFCPAs’ “white hat” Certified Ethical Hacker and business continuity advisor, Mr. Anderson has been awarded the Amazon Web Services Certified Solutions Architect Professional (AWS CSAP) certification. Mr. Anderson was awarded the AWS CSAP certification in recognition of his demonstrated knowledge selecting, managing, and configuring services on Amazon Web Services. Amazon Web Services is a subsidiary […]

eBook: Best Practices for Reducing IT & Cyber Risks

eBook: Best Practices for Reducing IT & Cyber Risks

Cyber threats are continuously evolving, with new structures and schemes emerging daily. This everchanging landscape of both cyber security and its infiltrators makes it difficult for individuals and corporations alike to know how to protect their Personally Identifiable Information (PII), client records, proprietary information, and other sensitive data.

How Secure Is Your Physical Office Space?

Data and IT Security goes well beyond cyberspace. The security of your physical office space may also be at risk. A successful physical breach by an outsider could produce unauthorized access to packages, equipment, documents, as well as threats of theft and employee safety. AAFCPAs has outlined for your considerations some best practice recommendations to […]

October is National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month

Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online. The Business & IT Security practice at AAFCPAs has published the following insights […]

IT Security Vulnerabilities Caused by Web Applications

Custom business applications are increasingly attractive because they allow companies to improve employee and customer user experiences with enhanced flexibility and efficiency. Some custom business app platforms tout that “creating your own custom apps is easy, even if your programming knowledge is non-existent.” However, this ease and accessibility can lead to unanticipated security vulnerabilities. According […]

Internet of Things (IoT) and Cyber Security

What Is IoT And How Do Hackers Infiltrate Your Devices? An increasing number of companies are installing Internet of Things (IoT) devices on their networks. IoT devices are typically “black box” devices, the inner workings of which are unknown to most users. For example, HVAC systems, smart fridges, computer printers, and even cars can contain […]

Configuration & Application Vulnerabilities in Cyber & IT Security

Despite the best efforts of IT teams, organizations continue to be plagued with IT security vulnerabilities in their systems by both internal and external threats. The most common vulnerabilities are poor configurations and outdated/unpatched systems or applications. These vulnerabilities may subject your organization to the risk of hackers gaining access to sensitive employee or client […]