Print Friendly, PDF & Email


Optimize Your IT General Controls

Information Technology General Controls (ITGCs) help organizations guard their systems and operations against IT-related risks in critical business areas like finance, purchasing, and payroll. ITGCs are the foundation for the overall IT control environment as they provide the assurance that systems operate as intended and that output is reliable. (For public companies, these controls support […]

AAFCPAs Helps Clients Prepare a 360 Degree Action Plan for Business Continuity

On March 11, the World Health Organization (WHO) declared the novel Coronavirus an official global pandemic. Businesses across the globe experienced interruptions, shortages, and other unexpected challenges that impacted multiple aspects of their organizations. Many continue to struggle to adapt. Some industries, like hospitality, are dealing with acute slowdowns in their operations and revenue. Others, […]

Mitigate Risks Associated With Outsourcing Services

If you outsource services such as payroll processing, loan servicing, data center/co-location/IT Managed Services, Software as a Service (SaaS), or medical claims processing, you rely on the service provider to keep your data secure, maintain confidentiality, integrity of processing, availability of services or systems, and/or privacy.  However, AAFCPAs reminds clients that outsourcing may expose your […]

Keys to a Successful Accounting Software Implementation

Implementing a new accounting software application requires significant investments in time, energy, and financial resources. A proper implementation plan is key to maximizing the long-term value of your new system. AAFCPAs Provides the Following Best Practice Recommendations to Ensure Clients Get the Most Out of Their New System: Change is Hard AAFCPAs advises clients to […]

eBook: Best Practices for Reducing IT & Cyber Risks

eBook: Best Practices for Reducing IT & Cyber Risks

Cyber threats are continuously evolving, with new structures and schemes emerging daily. This everchanging landscape of both cyber security and its infiltrators makes it difficult for individuals and corporations alike to know how to protect their Personally Identifiable Information (PII), client records, proprietary information, and other sensitive data.

Overcome Cyber Security Challenges of a Remote Workforce

COVID-19 has challenged businesses to think about operations in a new way, and in many cases, your IT specialists may be supporting students and faculty for the first time ever that were never intended or conceived to be remote or fully remote. With an increased risk of students and faculty falling prey to cyber-attacks, AAFCPAs […]

Five Internal Control Modifications Needed in Response to the ‘New Normal’

Some organizations’ internal control frameworks and operational processes did not skip a beat when faced with the disruptions caused by COVID-19. Especially those who had already implemented cloud-based systems and remote-enabled processes. Others were forced to “change the tire while driving.” During this pandemic, organizations have been challenged by processes executed with fewer people and […]

Overcome Cyber Security Challenges of a Remote Workforce

COVID-19 has challenged businesses to think about operations in a new way, and in many cases, your IT specialists may be supporting employees for the first time ever that were never intended or conceived to be remote or fully remote. With an increased risk of employees falling prey to cyber-attacks, AAFCPAs advises clients to create […]

How to Move Critical Business Processes to the Cloud

How effectively does your organization support remote work?  The current Coronavirus pandemic is testing many businesses’ ability to remain productive and effective while remote. Beyond the social impact, many are experiencing difficulty, slowness, or inability to execute critical business processes in this time of social distancing. What can you do? AAFCPAs advises clients to take […]

How Secure Is Your Physical Office Space?

Data and IT Security goes well beyond cyberspace. The security of your physical office space may also be at risk. A successful physical breach by an outsider could produce unauthorized access to packages, equipment, documents, as well as threats of theft and employee safety. AAFCPAs has outlined for your considerations some best practice recommendations to […]