How to Tackle VPN Security Risks

The US experienced more data breaches in 2023 than in 2022 before the year even came to a close. USA Today predicts that this number will continue to climb and that by 2031 “attacks on businesses, consumers, governments and devices will happen every two seconds.” This significant increase indicates that cybercriminals are using every tool […]

Beneficial Ownership Information Reporting: How to Stay Compliant

What the Corporate Transparency Act and its Recent Legal Developments Mean for Your Business What is the Corporate Transparency Act (CTA)? The Corporate Transparency Act (CTA) was a part of a much larger raft of bills that became law in 2021. As of January 1st, 2024, a vital component of the CTA became active, the […]

The Nuances of Virtual Currency Tax

2022 was a challenging year for the cryptocurrency (aka crypto) industry, caused by the collapse of the cryptocurrency exchange FTX (the third-largest crypto exchange at the time). The result has been a shift in the cryptocurrency industry, with newly minted crypto millionaires facing sudden losses. Many have had to sell their cryptocurrencies at a lower […]

IRS Email Scams: What You Need to Know

It’s become all too regular an occurrence for the Internal Revenue Service (IRS) to warn taxpayers of a new scam. Thousands of taxpaying citizens have lost millions of dollars through scams, with new schemes appearing as quickly as people can be made aware of them. The solution? Taxpayers have to be aware of how the […]

CPAs: What You Need to Know for the 2024 Tax Season

According to the Internal Revenue Service (IRS), Americans didn’t pay $688 billion in taxes on their 2021 returns—highlighting an increase of more than $138 billion from 2017-2019 estimates. To address this ‘tax gap,’ the IRS is taking new actions such as increasing auditing and capitalizing on new laws such as the Corporate Transparency Act (CTA). […]

Recently Updated Data Breach Laws By State

What is a data breach? Data breaches are unauthorized access to and theft of sensitive data by cybercriminals. Bad actors may gain entry to an organization’s store of customer data through various techniques, including brute force attacks, phishing, or social engineering schemes. Ransomware attacks may encrypt sensitive data and only unlock access to vital systems […]

The Basics of Zero Trust Implementation

What is Zero Trust? Zero Trust is a cybersecurity model that keeps organizations’ data safe by requiring users to continuously verify and authenticate their identities. Analyst John Kindervag, formerly of technology research firm Forrester, first coined the term in 2010. But the concept also has roots in the “black core” architecture theory of the U.S. […]

A Guide to Navigating the ERC Tax Credit Pause

The Internal Revenue Service (IRS) created the ERC tax credit to support businesses and tax-exempt organizations that supported employees during COVID-19. However, the IRS reports that it is pausing the ERC tax credit due to reports of fraud, especially with the IRS seeing aggressive marketing that is misleading businesses and tax-exempt organizations to claim the […]

Preparing for the Worst: Disaster Data Recovery and Written Information Security Plans

Increasingly, governments and regulatory bodies, including the IRS, FTC, and SEC are requiring formalized security plans. In the U.S., some states require financial institutions, such as CPAs, accounting firms, mortgage brokers, universities, and nonbank lenders, to establish a Written Information Security Plan (WISP). This formal plan outlines the roles of staff in data security protections, […]

Two men stand in front of an open computer server analyzing it's components while holding a tablet.

Understanding the Updated SEC Cybersecurity Guidelines

Earlier this year, the SEC announced new cybersecurity guidelines and finalized those rules in August after the standard public review period. These rules affect how public companies must report major cyber breaches and when. Additionally, the rules detail how board directors should prepare and manage ongoing security issues. The new rules take effect on December […]

1 2 3 8