You Are Here: Home » Posts tagged "cybersecurity"

Leveraging Generative AI in Complex Investigations

Effective Use of AI in Complex Investigations Investigators need better ways to sift through vast quantities of data to find the information at the heart of the matter. This article examines a more efficient approach to complex investigations with Generative AI. The information in this article is intended to assist in determining the effectiveness of using GenAI in fraud and other complex investigations. In ...

Read more

What is Your Privacy Fine Exposure?

From $600 to Over $1 Billion The EU General Data Protection Regulation (GDPR) and other data protection regulations apply to the smallest sole practitioner firm among us to the largest and each must take steps to implement a cybersecurity plan, to follow it, and to respond when an incident occurs. The failure to provide protection can result in fines. In this article, the author describes why Amazon and Goo ...

Read more

Cybersecurity Trends

What You Should Know About Them The world as we know it is rapidly changing and the COVID-19 crisis has accelerated the pace of that change. Some experts estimate the pandemic advanced the digital transformation timeline by seven years. These changes have opened many new opportunities for cybercriminals who have adeptly exploited these vulnerabilities. This article will summarize the trends that have create ...

Read more

The Internet is Growing Up

The Future is Here This article describes the background, concepts behind, and implications of blockchain technology deployment for commercial, governmental, and personal use. QuickRead readers are aware of proposals to move entirely away from cash (bills and coins) for daily transactions. Such a move is expected to create a major inconvenience for those without access to credit cards and basic banking ...

Read more

How Smart Contracts Can Create a Competitive Edge

Removing third-parties speeds transactions and reduces their cost. CFOs and finance departments are always looking for reductions in cost and increases in speed and efficiency in business engagements. One option that is attracting more attention is the smart contract. To read the full article in the Journal of Accountancy, click: How Smart Contracts Can Create a Competitive Edge. ...

Read more

Furious Rush of Digital Disruption Creates Opportunities for CPAs to Help Clients

With rapid advances in technology transforming companies of all types, the demand is increasing for CPA firms to understand how new technologies are affecting clients and what clients must do to adjust their processes and practices to make the most of technological innovation while also mitigating risk. To read the full article in the Journal of Accountancy, click: Furious Rush of Digital Disruption Creates ...

Read more

Robocalls Flooding Your Cellphone? Here’s How to Stop Them

An unfamiliar number, an unnatural pause after you say hello…another day, another irritating robocall.  If it feels as if your cellphone has increasingly been flooded with them, you’re right.  Christopher Mele explains. To read the full article in The New York Times, click: Robocalls Flooding Your Cellphone?  Here’s How to Stop Them. ...

Read more

Corporate Boards aren’t Prepared for Cyberattacks

Is Cybersecurity Preparedness Lacking Among Boards? Some company boards are failing to take the necessary steps to defend against cyberattacks, with one survey finding that only 19% of directors say their boards have a high level of understanding of the issue.  Many states have data breach notification laws on the books, although such a provision has yet to pass at the federal level. To read the full articl ...

Read more

5 Low- Or No-Cost Ways for CPAs To Help Slam the Door on Cybercriminals

With the news media announcing hacks, breaches, or phishing scams virtually every week, cybersecurity has become a major concern for businesses of all sizes.  To recognize National Cybersecurity Month, the AICPA is publishing a series of blog posts on the issue.  In this first post, Susan Pierce has some tips to help CPAs understand five low- or no-cost ways to defend against cybercrime. To read the full ar ...

Read more

Cybersecurity: Unknown Google Device

The presence of an unrecognized device attempting to access your Google account could be a serious threat.  J. Carlton Collins, JofA contributing editor, recommends you remove the unknown device and change your password immediately. To read the full article in the Journal of Accountancy, click: Cybersecurity: Unknown Google Device. ...

Read more

Identifying and Calculating Recoverable Damages in Cyber Security Breaches—Part 2

Predicting Cyber Security Breaches Cyber security breaches often result in the improper transfer of personal identifying information or sensitive financial and health information. This article focuses on the identification of potential cyber security breaches and how courts are addressing the presentation of such cases, including the issue of damages. Read Identifying and Calculating Recoverable Damages in ...

Read more

Identifying and Calculating Recoverable Damages in Cyber Security Breaches—Part 1

Predicting cyber security breaches Cyber security breaches often result in the improper transfer of personal identifying information or sensitive financial and health information. This article focuses on the identification of potential cyber security breaches and how courts are addressing the presentation of such cases, including the issue of damages. ...

Read more

©2024 NACVA and the Consultants' Training Institute • Toll-Free (800) 677-2009 • 1218 East 7800 South, Suite 301, Sandy, UT 84094 USA

event themes - theme rewards

Scroll to top
G-MZGY5C5SX1
lw