Print Friendly, PDF & Email


Internet of Things (IoT) and Cyber Security

What Is IoT And How Do Hackers Infiltrate Your Devices? An increasing number of companies are installing Internet of Things (IoT) devices on their networks. IoT devices are typically “black box” devices, the inner workings of which are unknown to most users. For example, HVAC systems, smart fridges, computer printers, and even cars can contain IoT-enabled technology that connects through WiFi or cellular and therefore can be considered IoT devices.... continue reading

Configuration & Application Vulnerabilities in Cyber & IT Security

Despite the best efforts of IT teams, organizations continue to be plagued with IT security vulnerabilities in their systems by both internal and external threats. The most common vulnerabilities are poor configurations and outdated/unpatched systems or applications. These vulnerabilities may subject your organization to the risk of hackers gaining access to sensitive employee or client data. What are Countermeasures/Prevention Techniques? Change Management Organizations must establish and document their process for... continue reading

Eye on Cyber: A Day in the Life of an Ethical Hacker

Listen to Podcasts:   “Innovation, organization, and sophistication—these are the tools of cyber attackers as they work harder and more efficiently to uncover new vulnerabilities,” reports Symantec in their 2018 Internet Security Threat Report. Ethical hacking services are a great way for organizations to unearth security weaknesses before they can be exploited by online criminals. In this instructive session, AAFCPAs’ IT Security professionals James Jumes and Vassilis Kontoglis go behind the disguise with our... continue reading

Educational Podcast: Cybersecurity in 2018

Educational Podcast: Cybersecurity in 2018

Listen to Podcast Click here to listen to podcast or use the above media player. Techniques of cyber-criminals continue to evolve. A recent study shared by InfoSecurity Magazine reports “Cyber-criminals have adopted an organizational shift in how they carry out their work, implementing corporate best practices and establishing professional businesses to increase the efficiency of their attacks against enterprises and consumers.” This means advanced persistent threats specifically targeted at your organization and... continue reading

AAFCPAs Earns SOC for Cybersecurity Services Certificate

AAFCPAs Earns SOC for Cybersecurity Services Certificate

AAFCPAs’ Partners James Jumes, MBA, M.Ed. and Robin Kelley, CPA, CITP, CGMA, CSPM, CCSFP have earned the System and Organization Controls (SOC) for Cybersecurity Certificate issued by The Association of International Certified Professional Accountants (AICPA). SOC for Cybersecurity is a new entity-wide cybersecurity audit that allows organizations to voluntarily report on their cybersecurity management programs to internal and external stakeholders with credibility. Companies are under increasing pressure to manage cybersecurity... continue reading

AAFCPAs’ Business Process & IT Advisory Practice to Present Cyber Security Session at National Housing Partnership Network Meeting

Vassilis Kontoglis, manager in AAFCPAs’ Business Process & IT Advisory practice, will present an educational workshop on Cyber Security at the Housing Partnership Network’s (HPN) 2018 Spring Membership Meeting in Minneapolis, MN scheduled for June 6th – 8th. The Housing Partnership Network is a valued client of AAFCPAs. They are a collaborative network of 100 top-performing, high-capacity nonprofit housing developers, owners, and financial institutions throughout the United States.  AAFCPAs provides audit, tax, and business process... continue reading

AAFCPAs’ Business Process & IT Advisory Practice to Present Cyber Security Session to National Jewish Cemetery Association Members

Vassilis Kontoglis, manager in AAFCPAs’ Business Process & IT Advisory practice, will present an educational workshop at the 10th Annual Jewish Cemetery Association of North America (JCANA) Conference scheduled for June 4th – 10th, 2018.  The theme of this year’s Conference is “Bringing Jewish Cemeteries into the 21st Century,” and this includes managing risks associated with a new generation of IT security threats. We have entered a new era of... continue reading

AAFCPAs Urges Vigilance as Clients Respond to Uptick in Whaling Schemes, Cyber Threats

AAFCPAs would like to make clients aware that within the past two weeks, we have received two accounts from clients reporting their executives have been targeted by sophisticated whaling schemes requesting transfers of money. AAFCPAs would like to take this moment to remind you again of the critical importance of taking measures to protect against malicious cyber-attacks. We encourage you to re-read and share now with your team members our... continue reading

Installing Patches Immediately Helps Protect Your Organization from Cyber Vulnerabilities

Cyber criminals often exploit known or not yet known vulnerabilities of the Operating System and/or other critical systems, such as a web server or a database, in order to penetrate your network/systems. In the recent WannaCry attack, hackers exploited the Microsoft Windows Server Message Block protocol and encrypted data demanding ransomware. There was a patch that Microsoft had provided but thousands of systems around the world had not yet installed... continue reading

Podcast: IT Security Update

Listen to Podcast Click here to listen to podcast or use the above media player. IT security requires continuous improvement, and organizations must stay vigilant, and learn & adapt over time. AAFCPAs’ IT security pros James Jumes provides an overview of threats of significant concern in 2017, and highlight critical security controls that assist in mitigating the most prevalent vulnerabilities that often result in many of today’s cybersecurity intrusions and... continue reading