Technology Risk Assessment

All Topics

Bill Introduced to Repeal R&D Expense Capitalization

Bill Introduced to Repeal R&D Expense Capitalization

AAFCPAs provides the following update to clients with expenditures incurred in connection with your trade or business which represent research and development costs in the experimental or laboratory sense. On Thursday, March 16th, Senators Maggie Hassan (D) of New Hampshire and Todd Young (R) of Indiana reintroduced a bill to repeal the required capitalization of […]

Be Cyber Smart: decrease risks and protect yourself online

Be Cyber Smart: decrease risks and protect yourself online

Now in its 18th year, Cybersecurity Awareness Month (October) continues to raise awareness about the importance of cybersecurity across our Nation so Americans can take the steps they need to be safer and more secure online. To decrease cybersecurity risks and protect yourself online, AAFCPAs offers cybersecurity technical and non-technical resources to help you and […]

Download Checklist: IT & Cybersecurity HealthCheck

Download Checklist: IT & Cybersecurity HealthCheck

AAFCPAs designed this comprehensive IT & Cybersecurity HealthCheck to assist clients in surfacing, understanding, and managing priority IT risks that may be mitigated to better secure your organization’s Personally Identifiable Information (PII), client records, proprietary information, and/or other sensitive data.

Cyber Actors Target K-12 Distance Learning

Cyber Actors Target K-12 Distance Learning

AAFCPAs would like to make education clients aware that the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have assessed that malicious cyber actors are targeting kindergarten through twelfth grade (K-12) educational institutions, leading to ransomware attacks, the theft of data, and […]

Secure Your IT Infrastructure & Create Resiliency

Secure Your IT Infrastructure & Create Resiliency

IT infrastructure is the combination of hardware, software, communications, data centers/hosting services, and human resources that allows an organization to deliver information technology services to its constituent communities. IT resiliency refers to an organization’s ability to avoid or minimize business disruption when the IT infrastructure is challenged by planned or unplanned events, such as the […]

eBook: Best Practices for Reducing IT & Cyber Risks
eBook Best Practices for Reducing IT & Cyber Risks

eBook: Best Practices for Reducing IT & Cyber Risks

Cyber threats are continuously evolving, with new structures and schemes emerging daily. This everchanging landscape of both cyber security and its infiltrators makes it difficult for individuals and corporations alike to know how to protect their Personally Identifiable Information (PII), client records, proprietary information, and other sensitive data.

How Secure Is Your Physical Office Space?

How Secure Is Your Physical Office Space?

Data and IT Security goes well beyond cyberspace. The security of your physical office space may also be at risk. A successful physical breach by an outsider could produce unauthorized access to packages, equipment, documents, as well as threats of theft and employee safety. AAFCPAs has outlined for your considerations some best practice recommendations to […]

Internet of Things (IoT) and Cyber Security

Internet of Things (IoT) and Cyber Security

What Is IoT And How Do Hackers Infiltrate Your Devices? An increasing number of companies are installing Internet of Things (IoT) devices on their networks. IoT devices are typically “black box” devices, the inner workings of which are unknown to most users. For example, HVAC systems, smart fridges, computer printers, and even cars can contain […]

Configuration & Application Vulnerabilities in Cyber & IT Security

Configuration & Application Vulnerabilities in Cyber & IT Security

Despite the best efforts of IT teams, organizations continue to be plagued with IT security vulnerabilities in their systems by both internal and external threats. The most common vulnerabilities are poor configurations and outdated/unpatched systems or applications. These vulnerabilities may subject your organization to the risk of hackers gaining access to sensitive employee or client […]