Technology

/Technology

How to build a compliant, secure business

What does a compliant, secure business look like? The reality is that a compliant, secure business is going to look different based on industry, size of business, type of regulatory environment the [...]

September 18th, 2018|Risk Management, Technology, Uncategorized|

Dean Dorton Technology Launches Full-Service Cybersecurity Services

As enterprise cybersecurity awareness continues to evolve, so do the layers of protection any business or nonprofit organization needs to have in order to protect themselves. From user awareness training to vendor management, Dean Dorton [...]

September 5th, 2018|Technology, Uncategorized|

Team Member Spotlight: Jason Whitaker

Focus Area: Technology Years with Dean Dorton: 1.08 Years in Accounting Industry: 22 Favorite thing about Dean Dorton: Everyone has been welcoming and friendly! Biggest firm accomplishment: I started an Aruba Networks sales and consulting practice within the firm's [...]

June 23rd, 2018|Technology|

Are You Still Independent?

New ethics interpretation on data-hosting services By Jason Miller Are you currently providing a service that will soon impair your independence? Are you currently providing a service that will soon impair your [...]

April 20th, 2018|Technology, Uncategorized|

No One Would Be Interested in My Data!

“No one would be interested in my data.” Nothing could be further from the truth! Announced in late March, the Department of Justice filed criminal charges and sanctions against nine Iranian hackers accused of compromising [...]

April 4th, 2018|data, Technology|

The Need for Speed: Is Your Business’ Close Process a Headache?

By: Jason Miller Your business is succeeding and possibly growing, with more customers and increasing revenue streams. Congratulations! Life is good. Or is it? A recent Aberdeen study found that 64 [...]

April 2nd, 2018|Technology|

Safeguarding Data: Are You Really Prepared for a Cyberattack?

By: Jason Miller “Cybersecurity” has become a buzzword over the last couple of years, especially with more cybersecurity attacks against large companies or corporations that are recognizable by name, but have you [...]

April 2nd, 2018|Technology|

Meltdown and Spectre: The Newest Computer Security Vulnerabilities

Recent news reports have highlighted computer security vulnerabilities being referred to as Meltdown and Spectre. Computer researchers have found out that the main chip in most modern computers—the CPU—has a hardware bug. It's really [...]

January 9th, 2018|Technology|

Equifax Data Breach

Are you one of 143 million people (the equivalent of approximately 1 in 2 Americans) who have potentially been impacted by the Equifax cyber breach? Equifax, one of three major credit reporting agencies, announced [...]

September 8th, 2017|Technology|

Beware of a New Email Phishing Scheme

The Internal Revenue Service warned people to avoid a new phishing scheme that impersonates the IRS and the FBI as part of a ransomware scam to take computer data hostage. The IRS said: "The [...]

September 1st, 2017|Tax, Technology|