
Does the FTC Safeguards Rule Apply to My Accounting Firm?
Barry was annoyed. He had spent all his time and effort on his fledging CPA operation. He had two other accountants on the payroll and
Barry was annoyed. He had spent all his time and effort on his fledging CPA operation. He had two other accountants on the payroll and
Book your free 30-minute strategy session with us. You’ll learn what you’ve been doing right–and what you can improve to secure your business.
The office was frantic. Jerry, the public relations manager, was dealing with damage control. No one knew who sent the emails. IT was checking the
Dave (the chief marketing officer) communicated normally, juggling multiple threads and handling a dozen conversations. But most importantly, he handled sensitive information about the company’s
You hear the term “cloud” everywhere. Everyone has a cloud or uses a cloud or uploads to the cloud. What is cloud computing and can
QU1CK51LV3R was your average internet scammer. He had worked various spoofs, compromises and amateur hacks, but his specialty was account takeover. And recently, sim swapping
Mark was having a typical workday when he played his voicemails back. One of them was from his boss Tom, who was on vacation and
Beware! That email from your bank, credit card, or social security can be a door to nasty malware, system hijacking, or a data breach. Fraudulent
When it comes to passwords, small-to-medium-sized businesses and organizations should remember a few things to make them more secure. But passwords should not be the
(This is the first of two articles on personally identifiable information(PII).) Steve had just received his credit report and noticed a bank loan taken out
Larry had been working in the accounting department of a medium-sized business for about a year and now had to hold down the fort while
You need secure data. Whether you are using, saving or sending it, the bad guys want to steal (exfiltrate) it or encrypt it and hold