IT Assessments

All Topics

Alex Santiago Earns Certified Ethical Hacker Credential

Alex Santiago Earns Certified Ethical Hacker Credential

Boston (1/25/2023) – AAFCPAs, a leading CPA and Consulting firm based in New England, is pleased to announce Alex Santiago, Senior Associate, Business Process & IT Consulting, has earned the Certified Ethical Hacker (CEH) credential, a preeminent designation for information security professionals awarded by the EC-Council. (The International Council of Electronic Commerce Consultants). Alex is […]

Strong Password Policy Requirements Protect Data, Systems
Strong Password Policy Requirements

Strong Password Policy Requirements Protect Data, Systems

It remains a critical and ever-evolving challenge to protect your organization’s data and operations from destructive forces such as unauthorized users, cyberattacks, and data breaches. The first level of security from such attacks is the implementation of strong password policies as a line of defense for an organization’s data security. Balancing risk and user-friendliness is […]

Meet Mr. Anderson, AAFCPAs’ Certified Ethical Hacker

Meet Mr. Anderson, AAFCPAs’ Certified Ethical Hacker

AAFCPAs’ reminds clients that October is cybersecurity awareness month in the United States. AAFCPAs performs Information Technology (IT)/Cyber Security Assessments which help clients identify risks from the use of technology that could potentially cause information loss and/or financial and reputational harm to your organization. Our assessments include Vulnerability & Penetration testing performed by Mr. Anderson, […]

Secure Your IT Infrastructure & Create Resiliency

Secure Your IT Infrastructure & Create Resiliency

IT infrastructure is the combination of hardware, software, communications, data centers/hosting services, and human resources that allows an organization to deliver information technology services to its constituent communities. IT resiliency refers to an organization’s ability to avoid or minimize business disruption when the IT infrastructure is challenged by planned or unplanned events, such as the […]

2020 Cyber Crime, Cyber Security Awareness Month

2020 Cyber Crime, Cyber Security Awareness Month

In recognition of National Cyber Security Awareness Month and to foster client awareness of cyber hazards, AAFCPAs’ IT Security professionals have outlined cybersecurity risks and mitigation strategies applicable to 2020 current events. COVID-19 has changed business operations resulting in increased IT security risks, especially risks from the abrupt shift to support remote work. Even when […]

Optimize Your IT General Controls

Optimize Your IT General Controls

Information Technology General Controls (ITGCs) help organizations guard their systems and operations against IT-related risks in critical business areas like finance, purchasing, and payroll. ITGCs are the foundation for the overall IT control environment as they provide the assurance that systems operate as intended and that output is reliable. (For public companies, these controls support […]

Mitigate Risks Associated With Outsourcing Services

Mitigate Risks Associated With Outsourcing Services

If you outsource services such as payroll processing, loan servicing, data center/co-location/IT Managed Services, Software as a Service (SaaS), or medical claims processing, you rely on the service provider to keep your data secure, maintain confidentiality, integrity of processing, availability of services or systems, and/or privacy.  However, AAFCPAs reminds clients that outsourcing may expose your […]

October is National Cybersecurity Awareness Month
Cyber Security Awareness Month

October is National Cybersecurity Awareness Month

Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online. The Business & IT Security practice at AAFCPAs has published the following insights […]

IT Security Vulnerabilities Caused by Web Applications

IT Security Vulnerabilities Caused by Web Applications

Custom business applications are increasingly attractive because they allow companies to improve employee and customer user experiences with enhanced flexibility and efficiency. Some custom business app platforms tout that “creating your own custom apps is easy, even if your programming knowledge is non-existent.” However, this ease and accessibility can lead to unanticipated security vulnerabilities. According […]