Does the FTC Safeguards Rule Apply to My Accounting Firm?
Barry was annoyed. He had spent all his time and effort on his fledging CPA operation. He had two other accountants on the payroll and
Barry was annoyed. He had spent all his time and effort on his fledging CPA operation. He had two other accountants on the payroll and
The office was frantic. Jerry, the public relations manager, was dealing with damage control. No one knew who sent the emails. IT was checking the
Lisa had just stepped out for a lunch break. She typically worked from home a couple of days out of the week. Lucky for Starlord465,
A written incident response plan details how your organization will respond to a cyberattack or data breach. How will you manage the consequences of an
You hear the term “cloud” everywhere. Everyone has a cloud or uses a cloud or uploads to the cloud. What is cloud computing and can
Jay was annoyed. He had a successful auto dealership, with twelve employees on the payroll, and was eyeing expansion. But now he is going to
With all your responsibility, you probably don’t have enough time to go in-depth on cyber knowledge. But as a business leader in San Diego, it’s
Creepy characters are lurking around your network without your knowledge. And they aren’t just looking around randomly. They know what they want: your data or
QU1CK51LV3R was your average internet scammer. He had worked various spoofs, compromises and amateur hacks, but his specialty was account takeover. And recently, sim swapping
It was early 2020 when, after a 6.4 earthquake, Puerto Rico’s Industrial Development Company Director Ruben Rivera received an email requesting a change to one