Print Friendly, PDF & Email


Optimize Your IT General Controls

Information Technology General Controls (ITGCs) help organizations guard their systems and operations against IT-related risks in critical business areas like finance, purchasing, and payroll. ITGCs are the foundation for the overall IT control environment as they provide the assurance that systems operate as intended and that output is reliable. (For public companies, these controls support […]

AAFCPAs Helps Clients Prepare a 360 Degree Action Plan for Business Continuity

On March 11, the World Health Organization (WHO) declared the novel Coronavirus an official global pandemic. Businesses across the globe experienced interruptions, shortages, and other unexpected challenges that impacted multiple aspects of their organizations. Many continue to struggle to adapt. Some industries, like hospitality, are dealing with acute slowdowns in their operations and revenue. Others, […]

Mitigate Risks Associated With Outsourcing Services

If you outsource services such as payroll processing, loan servicing, data center/co-location/IT Managed Services, Software as a Service (SaaS), or medical claims processing, you rely on the service provider to keep your data secure, maintain confidentiality, integrity of processing, availability of services or systems, and/or privacy.  However, AAFCPAs reminds clients that outsourcing may expose your […]

eBook: Best Practices for Reducing IT & Cyber Risks

eBook: Best Practices for Reducing IT & Cyber Risks

Cyber threats are continuously evolving, with new structures and schemes emerging daily. This everchanging landscape of both cyber security and its infiltrators makes it difficult for individuals and corporations alike to know how to protect their Personally Identifiable Information (PII), client records, proprietary information, and other sensitive data.

Overcome Cyber Security Challenges of a Remote Workforce

COVID-19 has challenged businesses to think about operations in a new way, and in many cases, your IT specialists may be supporting students and faculty for the first time ever that were never intended or conceived to be remote or fully remote. With an increased risk of students and faculty falling prey to cyber-attacks, AAFCPAs […]

Overcome Cyber Security Challenges of a Remote Workforce

COVID-19 has challenged businesses to think about operations in a new way, and in many cases, your IT specialists may be supporting employees for the first time ever that were never intended or conceived to be remote or fully remote. With an increased risk of employees falling prey to cyber-attacks, AAFCPAs advises clients to create […]

Cyberattacks, Foreign Disinformation Campaigns Leverage Coronavirus Theme

AAFCPAs would like to remind clients that cyber criminals and other bad actors are often poised to capitalize on a crisis. In this case, cyber criminals and foreign governments are using the Coronavirus (COVID-19) pandemic as a theme to lure individuals into making harmful clicks or actions. AAFCPAs reminds clients and their employees to be […]

October is National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month

Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online. The Business & IT Security practice at AAFCPAs has published the following insights […]

Eye on Cyber: A Day in the Life of an Ethical Hacker

Listen to Podcasts:   “Innovation, organization, and sophistication—these are the tools of cyber attackers as they work harder and more efficiently to uncover new vulnerabilities,” reports Symantec in their 2018 Internet Security Threat Report. Ethical hacking services are a great way for organizations to unearth security weaknesses before they can be exploited by online criminals. […]

Common Social Engineering Cyber Attacks and Prevention Strategies

What is Social Engineering & what are the risks? The human component of cyber security is the weakest link in protecting your organization against external threats. Recently, social engineering attacks have become the most prevalent type of threat within reported cyber breaches. Social engineering is a malicious activity in which bad actors produce items such […]