Eye on Cyber: A Day in the Life of an Ethical Hacker
Listen to Podcasts: “Innovation, organization, and sophistication—these are the tools of cyber attackers as they work harder and more efficiently to uncover new vulnerabilities,” reports Symantec in their 2018 Internet Security Threat Report. Ethical hacking services are a great way for organizations to unearth security weaknesses before they can be exploited by online criminals. […]
Listen to Podcast Click here to listen to podcast or use the above media player. Techniques of cyber-criminals continue to evolve. A recent study shared by InfoSecurity Magazine reports “Cyber-criminals have adopted an organizational shift in how they carry out their work, implementing corporate best practices and establishing professional businesses to increase the efficiency of their attacks […]
AAFCPAs Earns SOC for Cybersecurity Services Certificate
AAFCPAs’ Partners James Jumes, MBA, M.Ed. and Robin Kelley, CPA, CITP, CGMA, CSPM, CCSFP have earned the System and Organization Controls (SOC) for Cybersecurity Certificate issued by The Association of International Certified Professional Accountants (AICPA). SOC for Cybersecurity is a new entity-wide cybersecurity audit that allows organizations to voluntarily report on their cybersecurity management programs […]
AAFCPAs’ Business Process & IT Advisory Practice to Present Cyber Security Session at National Housing Partnership Network Meeting
Vassilis Kontoglis, manager in AAFCPAs’ Business Process & IT Advisory practice, will present an educational workshop on Cyber Security at the Housing Partnership Network’s (HPN) 2018 Spring Membership Meeting in Minneapolis, MN scheduled for June 6th – 8th. The Housing Partnership Network is a valued client of AAFCPAs. They are a collaborative network of 100 top-performing, high-capacity nonprofit housing […]
AAFCPAs’ Business Process & IT Advisory Practice to Present Cyber Security Session to National Jewish Cemetery Association Members
Vassilis Kontoglis, manager in AAFCPAs’ Business Process & IT Advisory practice, will present an educational workshop at the 10th Annual Jewish Cemetery Association of North America (JCANA) Conference scheduled for June 4th – 10th, 2018. The theme of this year’s Conference is “Bringing Jewish Cemeteries into the 21st Century,” and this includes managing risks associated […]
AAFCPAs Urges Vigilance as Clients Respond to Uptick in Whaling Schemes, Cyber Threats
AAFCPAs would like to make clients aware that within the past two weeks, we have received two accounts from clients reporting their executives have been targeted by sophisticated whaling schemes requesting transfers of money. AAFCPAs would like to take this moment to remind you again of the critical importance of taking measures to protect against […]
Installing Patches Immediately Helps Protect Your Organization from Cyber Vulnerabilities
Cyber criminals often exploit known or not yet known vulnerabilities of the Operating System and/or other critical systems, such as a web server or a database, in order to penetrate your network/systems. In the recent WannaCry attack, hackers exploited the Microsoft Windows Server Message Block protocol and encrypted data demanding ransomware. There was a patch […]
Listen to Podcast Click here to listen to podcast or use the above media player. IT security requires continuous improvement, and organizations must stay vigilant, and learn & adapt over time. AAFCPAs’ IT security pros James Jumes provides an overview of threats of significant concern in 2017, and highlight critical security controls that assist in […]
As a reminder, AAFCPAs warns of sophisticated cyber phishing attacks directed specifically at senior executives and other high level targets within businesses and organizations. We have seen an uptick in the frequency of these types of attacks, called whaling schemes, where cyber criminals masquerade as a highly convincing business email which may appear to be sent […]
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.