• Skip to primary navigation
  • Skip to main content
Dean Dorton – CPAs and Advisors
  • Services
        • Audit & Assurance
          • Audits, Reviews & Compilations
          • ESG Programs & Reporting
          • Internal Audit
          • International Financial Reporting
          • Lease Accounting Managed Services
          • Peer Review Services
          • SOC Reporting
        • Family Office
        • Consulting & Advisory
          • Business Valuation Services
          • Forensic Accounting
          • Litigation Support
          • Matrimonial Dissolution
          • Merger & Acquisition
          • SEC Services
          • Succession Planning
          • Transaction Advisory Services
          • Whistleblower Hotline
        • Outsourced Accounting
        • Private Wealth
        • Healthcare Consulting
          • Finance
          • Health Systems Operational Transformation
          • Medical Billing and Credentialing
          • Risk Management & Compliance
          • Strategy and Strategy Implementation
          • Technology & Data Analytics
        • Tax
          • Business Tax
          • Cost Segregation Studies
          • Credits and Incentives
          • Estates and Trusts
          • Individual Tax
          • International Tax
          • SEC Provision and Compliance
          • State and Local Tax
        • Technology & Cybersecurity
          • Accounting Software
          • Cybersecurity
            • Cybersecurity Assessments
            • Cybersecurity Scorecard Assessment
            • Security Awareness Training
            • Virtual Information Security Office
          • Data Analytics & AI
          • IT Audit & Compliance
            • Cybersecurity Maturity Model Certification (CMMC)
            • Data Privacy Laws
            • SOC Reporting
          • IT Infrastructure & Cloud Solutions
            • Automation
            • Backup and Disaster Recovery
            • Cloud Strategy
            • Data Center
            • Enterprise Network
            • Network Security
            • Phone and Video Conferencing
            • User Identity Management Solutions
            • Webex
          • Managed IT Services
  • Industries
        • Construction
        • Distilleries and Craft Breweries
        • Energy and Natural Resources
        • Equine
        • Financial Institutions
        • Government
        • Healthcare
        • Higher Education
        • Life Sciences
        • Manufacturing and Distribution
        • Nonprofit
        • Real Estate
  • Insights
    • Articles
    • Guides
    • Case Studies
  • Events
  • Company
        • News
        • Our Team
        • Experiences
        • Careers
          • College Students
          • Experienced Professionals
        • Locations
        • Lexington, KY

          250 West Main Street
          Suite 1400
          Lexington, KY 40507
          859-255-2341

        • Raleigh, NC

          4130 Parklake Avenue
          Suite 400
          Raleigh, NC 27612
          919-782-9265

        • Cincinnati, OH

          9987 Carver Rd
          Suite 120
          Blue Ash, OH
          45242 513-891-5911

        • Louisville, KY

          435 North Whittington Parkway
          Suite 400
          Louisville, KY 40222
          502-589-6050

        • Ft. Wright, KY

          810 Wright’s Summit Parkway
          Suite 300
          Fort Wright, KY 41011
          859-331-3300

        • Indianapolis, IN

          5975 Castle Crk Pkwy Dr N
          Suite 400
          Indianapolis, IN 46250
          317-469-0169

  • Contact Us

jason

Article 04.20.2018 Dean Dorton

New ethics interpretation on data-hosting services

By Jason Miller

Are you currently providing a service that will soon impair your independence?

Are you currently providing a service that will soon impair your independence?

The AICPA Professional Ethics Executive Committee (PEEC) recently adopted a new interpretation, Hosting Services, which appears in the AICPA Code of Professional Conduct’s “Independence Rule” (ET § 1.295.143) under “Nonattest Services” and applies to practioners who provide nonattest services to attest clients. Under the new rule, providing hosting services to attest clients will soon (effective September 1, 2018) impair independence when a CPA takes responsibility for maintaining internal control over an attest client’s electronic information.Where is the new line?

Your firm’s independence will be impaired if you:

  1. Assume responsibility for safeguarding or maintaining internal control of a client’s financial or even critical non-financial information;
  2. Control client data such that it becomes incomplete or only accessible through the CPA; or
  3. Provide disaster recovery or business continuity services for an attest client.

In these three service areas, the PEEC is concluding that by providing hosting services, a CPA is delivering services that cross the “management activity” restriction.What are some examples that impair independence?

Cloud-hosted accounting software: If the CPA firm is managing the hosted software on their internal hardware or leased cloud servers, then the client is dependent on the CPA firm for controlling their critical financial information, and independence is impaired.

Website hosting: If the CPA firm hosts a client’s website on their internal hardware or leased cloud servers, then independence is impaired.

Disaster recovery: If the CPA enters into an engagement with the attest client by which they are playing a role in holding the client’s data backups or contingent processing environment to be used for disaster recovery or business continuity, then independence is impaired.

Contract management system: If the CPA firm offers the attest client services for a hosted solution to manage the client’s business contracts, then independence is impaired.

Please note, the preceding list is not intended to be all-inclusive.

What are some examples that do not impair independence?

Cloud-hosted accounting software: If a third-party software provider is responsible for the hosting, management, and availability of the hosted accounting solution and the client is controlling the access to the system, an independence issue would not be created. The primary differences between this scenario and the one above is the CPA is not controlling access to the system, and the client can maintain access to the information independent of the CPA. The client should be responsible for managing user access to the information for both their employees and the CPA team members.

Storage of client information for performance of engagement: The CPA may maintain copies of a client’s information required to provide engagement services. Information should not be the only copy or originals.

Client portal: The CPA firm may provide a secure electronic service to share information back and forth with a client, again as long as the information is required for the CPA to perform approved services and the information is not the only copy or original.

Please note, the preceding list is not intended to be all-inclusive.

Public accounting firms should always consider all applicable rules as defined in ET § 1.295 when providing non-attest services to attest clients. As a reminder, the changes discussed in this article do not take effect until September 1, 2018. This allows for adjustments to existing engagements.

The PEEC is also evaluating revisions to ET § 1.295.145 (Information Systems Design, Implementation, or Integration). Watch for proposed changes, which are expected to be released later in 2018.

As originally published in Kentucky CPA Journal

Filed Under: Accounting & Tax, Services, Technology Tagged With: cloud, CPA, independence, independent, jason, journal, KyCPA, miller

Article 04.19.2018 Dean Dorton

Event Recap

Friday, March 23 marked a day of dynamic discussions in the local and regional higher education industry at our fourth annual Higher Education Training Day: Current Issues and Trends. Topics throughout the day covered everything from new accounting standard implementation to risk management and cybersecurity. We hope this overview of the day provides some insight into common areas of interest within the higher education community.

Institutional Planning and Budgeting

Jacalyn Askin, Senior Fellow for Finance and Campus Management at the National Association of College and University Business Officers (NACUBO), spoke on NACUBO’s economic models project (EMP). EMP’s is to provide NACUBO members with a comprehensive tool that provides a foundation for productive and effective institutional conversations. The EMP has four focus areas: mission, structures, strengths, and resources.

An institution’s mission should not simply be a mission statement, but rather encompass why an institution exists. The statement should be “mission centric, but market smart.” The structures of an institution should also be analyzed. Structures may need to be altered to allow for collaborations, new leadership models, and partnerships as a means to share resources.

Institutions should also focus on playing to its strengths. Adapt curriculum to the strengths and focus on the core of the institution’s existence. Lastly, utilize resources effectively. Align and redefine resources by prioritizing deployment of the resources, leverage old resources, consider new pricing strategies, and ensure that data being used becomes predictive, rather than only informative. NACUBO has provided an online tool to help you work through the EMP for your own institution: https://emp.nacubo.org/.

New DOE Information Security Requirements

Jason Miller, Director of Technology Consulting at Dean Dorton, explained that the Department of Education (DOE) is making a significant push for colleges and universities to take information security more seriously. In 2015 and in 2016, the DOE sent Dear Colleague Letters to provide higher education institutions with gentle reminders that any school participating in the Title IV federal student financial aid program is legally obligated to protect information. Specifically, they reminded us that participating in federal aid programs attaches a requirement to comply with the Gramm-Leach-Bliley Act (GLBA). GLBA was originally focused on financial institutions; therefore, many institutions try to ignore their GLBA compliance requirements.

The time has come that institutions can no longer ignore this requirement. DOE has requested that GLBA compliance become part of the annual federal student aid (FSA) audits. They have requested the Office of Management and Budget (OMB) to add an audit objective for GLBA to the FY18 compliance supplement. We are unsure if OMB will add this for FY18, but we expect that it will be added by FY19.

What does this mean for you and your institution?

  • Have you developed and deployed a comprehensive information security program?
  • Have you designated an individual to coordinate the information security program?
  • Have you conducted an annual risk assessment that includes the requirements of 16 CFR 314.4 (b)?
    • Employee training and management;
    • Information systems, including network and software design, as well as information processing, storage, transmission, and disposal; and
    • Detecting, preventing and responding to attacks, intrusions, or other systems failures
  • Have you documented the safeguards and remediation actions for any risks identified in the annual assessment?
  • Do you have plans in place for continual monitoring, response, and improvement for your information security program?
  • Do you have a breach response plan in place that ensures compliance with DOE’s notification requirements?

These items are likely to be become required documentation points of the FSA audit. Do you have processes in place that can provide auditable evidence that your institution is in compliance?

Another important aspect of DOE’s new focus on information security is their breach notification requirements. We encourage all institutions to review these carefully and ensure they are incorporated into your comprehensive breach response plans. Some highlights to be aware of include:

  • Under GLBA, a breach is defined as “any unauthorized disclosure, misuse, alteration, destruction or other compromise of information.”
  • There are no minimum record sizes defined for triggering reporting requirements.
  • Requirements are NOT limited to electronic data; paper counts too.
  • Title IV schools are required to notify DOE on the day of detection, even if a breach is only suspected.
  • The penalty for not complying with breach notification requirements is $54,789 per violation.
  • To report a breach, email cpssaig@ed.gov or call 202.245.6550. The following elements are required in the notification:
    • Date of breach (suspected or known)
    • Impact of breach (number of records, etc.)
    • Method of breach (hack, accidental disclosure, etc.)
    • Information security program point of contact: email and phone details
    • Remediation status (complete, in process): with details and next steps (as needed)

Do not allow yourself to be caught off guard. The time to act is now. If you need help evaluating your GLBA compliance maturity, Dean Dorton has team that can help. Contact Jason Miller at jmiller@ddaftech.com or 859.425.7626.

Internal Audit: Maximizing Its Potential

Lance Mann, Director of Assurance Services at Dean Dorton, explained that internal audit is an important risk management tool that should be utilized by all higher education institutions. Some institutions have internal resources that perform this role and others have outsourced this role; in either situation, the internal audit process is very similar when executed effectively.

An effective internal audit function starts with an annual risk assessment. The risk assessment should include an industry trend analysis, compliance related items in the industry, industry news, and institution-specific information such as board meeting minutes, budgets, and financial statements audit results. The risk assessment should also include interviews of key personnel from every corner of the institution. The interviews should be targeted at understanding the risks within that area or department, and should include individuals including the president, board members, department chairs, and individuals within the finance office, registrar office, athletics, clubs, food services, housing, academic departments, health departments, security, facilities, and parking. In essence, these interviews should encompass everything that makes the institution operate.

After completing your risk assessment, you should now have a risk population that you can evaluate to develop your internal audit plan for the year. Your internal audit plan should take in to account the highest risks and your resources. However, you may have high-risk items in which you may lack the internal expertise to adequately perform the audit work. You can always look at finding other resources on campus to help with this part of the audit or find external resources to outsource this part of your plan.

Due to their specific technical needs, three commonly outsourced areas within internal audit are technology, human resources, and federal student aid.

As you develop and execute your plan, it is important to keep the board of directors in the loop. Your annual plan should be approved by the board or audit committee, and you should regularly report to them on your audit results. You should also have a direct line of communication to the board. This is one of the most important aspects of internal audit’s ability to remain independent of management.

Having an effective internal audit function requires a significant amount of planning and preparation. It is important to perform a skills inventory to understand your internal skill sets and where you may need to find external assistance. Effective internal audit departments help institutions reduce their susceptibility to loss due to fraud or error, and help organizations remain compliant with laws and regulations. Internal audit departments should be an important part of every higher education team.

Contact Lance Mann at lmann@deandorton.com or 502.566.1005.Endowment Management

Kelso Morrill, Managing Director at Commonfund, and Chris Miceika, Director of Multi-Asset Solutions at Commonfund, explained that in order to retain inter-generational equity for endowments, the endowment growth rate should be benchmarked at an annual rate of 5% greater than the consumer price index (CPI).

While endowments have performed well and exceeded the benchmark over the past year, their three- and 10-year performances have lagged. To have a better chance at achieving the benchmark, endowments should favor equities over other investment types, be highly diversified, and be actively managed. Endowments should also allocate more to alternative, illiquid investments such as hedge funds. This difficulty in maintaining the benchmark from year to year affects an entity’s ability to maintain its endowment spend rate, which has averaged between 4% and 4.5% over the past 10 years.

More Students, More Graduates, Better Outcomes

John Anderson, Senior Vice President of Partnership Management at The Learning House, discussed important trends in higher education and items to consider when evaluating these trends and how they may impact your institution.

Important trends include:

  1. Declining student enrollment
  2. Increasing discount rates
  3. Growing enrollment in online programs
  4. Convenience and price
  5. New and growing competition

Items to consider:

  1. Are you focusing on the “student first” mentality?
  2. What types of programs are you offering? Do these programs align with your brand? Are they what the students want? How likely are these programs to lead to employment?
  3. Are you priced competitively?
  4. How are you planning to reduce costs for students?
  5. How is your brand being portrayed in the market? Is your brand message clear, concise and differentiated?

The Learning House partners with colleges and universities to develop online programs to help students and institutions achieve their mission. With the use of online program management services and a university scorecard, The Learning House is focused on helping institutions determine where they are today with adult learners and what the best practices are in order to offer the best programs possible.

FASB/GASB Breakout Sessions

David Richard, Director of Assurance Services at Dean Dorton, presented the FASB breakout session. He discussed how institutions should go about the implementation of three new accounting standards updates (ASUs) that will be relevant to private colleges and universities:

  • ASU No. 2015-14, Revenue from Contracts with Customers
  • ASU No. 2016-02, Leases
  • ASU No. 2016-14, Presentation of Financial Statements of Not-for-Profit Entities

Contact David Richard at drichard@deandorton.com or 859.425.7662.

Simon Keemer, Director of Assurance Services at Dean Dorton, provided the GASB breakout attendees with an update on GASB statements that will be effective in the next few years, concentrating on the impact of GASB 75 for Other Post-Employment Benefits (OPEB). GASB Statement No. 75 will be effective for entities commencing with June 30, 2018 year ends. He also discussed current GASB projects, paying particular attention to the GASB project to re-examine the reporting model.

Contact Simon Keemer at skeemer@deandorton.com or 502.566.1036.Admissions and the Business Office

Scott McDonald, Dean of Undergraduate Admission at the University of Kentucky, discussed the role of the business office function in admissions.

One of the main points to consider in the operation of an institution of higher education is to constantly evaluate the underlying assumptions on the practices of the college or university. Assumptions to evaluate could include the assumed market power of the institution brand and name, that the hindrance of tuition cost can be overcome with increasing institutional aid, and that the competition is sticking to the same known strategies that they always have. These assumptions may or may not be valid in the current changing landscape of higher education, so it is important to challenge them and integrate learned lessons into future strategies.

As mentioned, this becomes more important in the ever-changing environment of the college and university industry. Challenges such as a decreasing number of high school graduates in areas of Kentucky, the increasing cost of attendance, budget cuts, and competitors finding ways to differentiate themselves could become a threat to the success of an institution if not monitored.

As colleges and universities navigate these industry-wide concerns, focusing on important variables such as the items listed below could help foster a strategy of success:

  1. Quality of academic programs
  2. Composition of the current and incoming classes of students (residency, diversity, etc.)
  3. Potential to focus on signature, high quality programs and potentially discontinue ineffective programs
  4. Analysis of the markets, target populations, and the statistics and activities of competitors
  5. Unmet financial need

Student Financial Aid

Megan Crane, Manager of Assurance Services at Dean Dorton, covered general updates, program reviews and top findings, the Gramm-Leach-Bliley Act (GLBA), and available trainings.

For general updates, Megan noted that the Perkins loan program is ending and Pell funding levels are staying flat, which means that students will have a bigger gap to fill in order to fund their education. Although total Pell and prescribed Pell award caps are staying flat, Pell can now be awarded year-round (i.e. for summer) so that students have more flexibility in using their aid. State funding is also decreasing for public institutions and the aid for private institutions’ students have not increased in a number of years.

Megan also discussed program reviews and top program and audit findings. The Department of Education takes a risk-based approach to determine who should be flagged for a program review. This can include input from other accrediting agencies or organizations, high default rates, whistleblowers, and student complaints. Program reviews focus on two main areas: institutional processes and data and student level information. The most notable item is that program reviews encompass multiple offices across campus who are all responsible for overall compliance with the various requirements. After a program review or audit, there are issued findings. A finding in and of itself is not necessarily a red flag; however, repeat findings—where an institution has not worked to correct an issue—are significant.

The Gramm-Leal-Bliley Act (GLBA) was discussed in full during a different session; however, it is important to note that the requirements under GLBA will fall within the single audit by 2019, if not before.

Megan discussed how each institution is staying informed and up-to-date on current federal student aid (FSA) issues. Are your FSA team members attending annual training? Additionally, each institution should consider if non-FSA team members should attend FSA-specific trainings. If an accounting team member handles all of the G5 drawdowns, reconciliations, and other financial duties related to FSA, it could be beneficial for them to attend specific training on these areas. The annual FSA (Federal Student Aid) conference is free to attend. The 2018 conference will be held in Atlanta on November 27-30, 2018.

Lastly, we know that compliance is complex and takes a team effort. Work together across campus to create an environment of compliance. We are happy to assist in any way we can.

Contact Megan Crane at mcrane@deandorton.com or 859.425.7643.Tax Reform Update

Allison Carter, Manager of Tax Services at Dean Dorton, covered the ins and outs of the Tax Cuts and Jobs Act (TCJA) and its implications for colleges and universities. Items covered included:

  • Bonds: The TCJA repealed the exclusion from income of interest on advanced refunding bonds and tax credit bonds. It also preserved private activity bonds, like 501(c)(3) bonds.
  • Separately compute unrelated business income tax (UBIT): The TCJA requires tax-exempt organizations to calculate UBIT separately for each trade or business, which prohibits deductions from one business from offsetting income derived from another business. It also allowed net operating losses from prior years to continue to be available to offset income, regardless of the source of the loss.
  • Increase unrelated business taxable income (UBTI) by certain fringe benefits: UBTI includes any expenses paid or incurred by a tax-exempt organization for qualified transportation benefits, a parking facility used in connection with qualified parking, or any on-premises athletic facility.
  • Excise tax on private colleges and universities: The TCJA imposed an excise tax of 1.4% of net investment income each taxable year on “applicable educational institutions.”
  • Excise tax on excess compensation in excess of $1 million: The TCJA imposed an excise tax of 21% on remuneration in excess of $1 million with respect to employment of a covered employee of an “applicable tax-exempt organization.”

Contact Allison Carter at alcarter@deandorton.com or 859.425.7645.

Filed Under: Higher Education, Industries Tagged With: Allison, Carter, college, crane, Education, higher, jason, megan, miller, Training Day, University

Article 04.4.2018 Dean Dorton

“No one would be interested in my data.” Nothing could be further from the truth! Announced in late March, the Department of Justice filed criminal charges and sanctions against nine Iranian hackers accused of compromising hundreds of universities, private companies, and government agencies.

It is estimated that some 320 universities, in the U.S. and abroad, have been compromised. Government agencies are also believed to have been breached. Also targeted were private sector law firms and consulting companies. The accused were focused on acquiring and selling science and engineering research information.

This incident brings further focus and attention on the growing threats and required attention for cybersecurity at all organizations. We find that there is no private, public, or nonprofit entity immune to the ever-growing and more sophisticated threats posed by cybercriminals. The amount of electronic information and communications used today only continues to grow. Our business and organizations rely on data and systems to function in nearly all aspects.

If your organization is not yet taking cybersecurity seriously, now is the time. More areas of compliance require organizations to formalize their attention on cyber risk. Financial institutions and higher education organizations have Gramm Leach Bliley Act (GLBA), healthcare has HIPAA, and companies with clients or constituents in the European Union will soon have GDPR, just to name a few.

Here are a few key areas that you should focus on:

  • Annual cyber risk assessment
  • User awareness training
  • Processes for monitoring and detecting incidents
  • Formal incident response plan
  • Adequate cyber insurance

If your organization needs help with any of these areas, Dean Dorton has a team of qualified consultants ready to help. Contact Jason Miller, Director of Business & Technology Consulting, at 859.425.7626 or jmiller@ddaftech.com. Don’t wait until it is too late.

Filed Under: Cybersecurity, Services, Technology Tagged With: Cyber, Cybersecurity, Data, Insurance, jason, miller, security

Article 04.2.2018 Dean Dorton

By: Jason Miller

Your business is succeeding and possibly growing, with more customers and increasing revenue streams. Congratulations! Life is good. Or is it?

A recent Aberdeen study found that 64 percent of business managers have seen their decision-making time shrink over the last year. Management information needs are now defined in terms of days and hours, not weeks and months. Does this sound like your business?

Your business is beginning to dread monthly and quarterly closings. Your accounting is inundated with decentralized payables and inter-entity transactions, turning consolidation into a nightmare. Processes you could once handle easily with spreadsheets are now slowing closings to a crawl, with inaccuracies and delays costing your company time and money. If your business has multiple locations, trying to consolidate your books can be a quagmire of multiple, complicated spreadsheets and endless headaches.

Take a step back and examine your business’ financial operations:

  • Are your team members spending hours manually manipulating data in Excel spreadsheets?
  • Is your A/R aging increasing?
  • Is your monthly financial information untimely?
  • Do you really know what your financials are telling you?
  • Is your current system taking up too much time and resources on back office accounting processes?

Everything about business is changing — how customers evaluate products, the volume of real-time data available to chart the course of your business, and the mobile access your employees have to critical systems. Whether businesses are ready for it or not, everything around you is changing fast and speeding up.

It’s time to get a competitive edge — or get left behind

As companies strive to cost-effectively scale their business, cloud-based accounting solutions are being recognized as viable and valuable solutions. The same technology driving this wave of change and challenge can also be the rising tide that propels your business forward.

It’s time to adopt financial technology designed for the digital age. Stay ahead of the competition by gaining deeper visibility into your business and accelerating processes that position your company to win today and in the future.

The time for action is nowAchieving a fast close is a change management initiative, because regardless of your approach it requires your people to have the right technology. Cloud-based applications such as Sage Intacct offer many concrete benefits that traditional on- premise solutions just can’t match. When you choose a cloud-based application you dramatically reduce – and can, in some cases – virtually eliminate many IT infrastructure costs. Not only do you eliminate the need to buy and operate servers, you can also reduce operational costs in your IT department. Suddenly, you no longer have to pay for the resources to maintain servers, conduct and secure backups, update and patch software, maintain databases, plan and execute migrations or new installations.

When evaluating your cybersecurity preparedness, there are several factors to consider. Let’s take a step back – right now, your priority is your business. You’re buying new technology, investing in new infrastructure and most likely trying to adapt to changing business models like cloud. It’s all good work but it takes time and effort.

Hackers desperately want access to your customer data, employee data, or intellectual property because it’s worth a lot. A single theft could cost your company severe financial damage. And sometimes, in the case of ransomware, all they have to do is lock it down and force you to pay to get it back as you’ve heard about in some of the latest attacks.

Why do you hear terms like “dynamic threat landscape” these days? Because you aren’t facing a group of hacktivists in a basement anymore – you are now facing professionals with a lot to gain.

Your business and the threat landscape around you are ever changing.  It is imperative that your organization conducts an annual cyber risk assessment. This allows the entire organization to consider current and future risks and put forth a plan to mitigate the identified risks.

Some businesses will run out and acquire every new solution they hear about for protecting their organization against cyber risks. While having a multi-layered approach to cybersecurity is important, it is also equally important to have an organized approach and to use tools that are designed to work together.  If your solution is designed properly, you could end up with what we call the security effectiveness gap. As you add more solutions that don’t work together, the complexity exponentially increases. So, every time you add another solution or another vendor, you add another gap – another vulnerability.

A robust cybersecurity solution will:

  1. Stop threats at the edge
  2. Protect users where they work (especially when team members are working remotely or on a personal device)
  3. Find and contain problems fast
  4. Control who gets on your network and from where
  5. Simplify network segmentation
  6. Provide compressive monitoring and detection

Streamline processing and harness the power of the cloud

Does moving to the cloud mean sacrificing functionality? Not at all. You can find the right cloud-based platform for you, like Sage Intacct which is the endorsed solution of the AICPA and designed to meet the financial accounting needs of your company. More powerful accounting; less internal resources required and lower costs; as well as anytime, anywhere access – cloud-based accounting is certainly worth a closer look.

If you or your business are looking to be successful as technologies continue to advance, your system should:

  • Provide access to data that is available anywhere, anytime (completely mobile-friendly)
  • Streamline processes so your financial statements are ready when you are, completely eliminating manual report preparation
  • Display the robust unique KPIs important to your business in a meaningful manner
  • Be completely scalable to your business size so you don’t have to invest in other IT infrastructure
  • Deliver real-time visibility into key operational metrics and streamlined processes, eliminating manual data entry and Excel-based financial reporting
  • Safeguard assets through comprehensive internal controls and segregation of duties
  • Make it easy to quickly compare performance across entities including multiple-locations
  • Let you easily switch between consolidated and local views for further insight into the figures

Whether you’re a small business, non-profit organization, mid-sized business with one or two offices in other states, or a large, global enterprise with diverse geography, it is important to contact a professional with cloud-based accounting systems expertise and experience to help you maximize your software investment by seamlessly integrating the elements and entities of your business into the right cloud-based accounting platform.

Learn more about Dean Dorton’s Cloud-based accounting solutions.

As originally featured in Louisville’s Business First

Filed Under: Accounting & Tax, Accounting Software, Sage Intacct, Services, Technology Tagged With: cloud, intacct, jason, miller, sage

Article 04.2.2018 Dean Dorton

By: Jason Miller

“Cybersecurity” has become a buzzword over the last couple of years, especially with more cybersecurity attacks against large companies or corporations that are recognizable by name, but have you really taken the time to sit down and assess your organization’s IT security position?

Many organizations quickly punt the topic of cybersecurity to the IT department. While IT plays a huge role in cybersecurity, it is the responsibility of those charged with organization governance to ensure compliance. Board members and senior leadership should be asking the questions and confirming that the organization is devoting the proper resources and attention to cybersecurity.

“One and done” doesn’t work here

It is critical to understand that cybersecurity is not a one-time project. It is a continual evolution and initiative.

Leadership needs to also recognize there can be substantial costs associated with cybersecurity activities and for some organizations such as colleges and universities, they are not optional. Across the public and private sectors, it is imperative that organizations continue to enhance cybersecurity in order to meet evolving threats to controlled unclassified information and challenges to the security of such organizations.

With the ongoing focus on your organization’s bottom line, it might be tempting to defer projects related to cybersecurity to reduce budgets. However, doing so could put your organization in a position where you are not prepared, or even worse, in noncompliance with certain regulations specific to your industry. Cutting corners on cybersecurity compliance could wind up costing your business more in the end.

The “I’m covered already” approach

When evaluating your cybersecurity preparedness, there are several factors to consider. Let’s take a step back – right now, your priority is your business. You’re buying new technology, investing in new infrastructure and most likely trying to adapt to changing business models like cloud. It’s all good work but it takes time and effort.

Hackers desperately want access to your customer data, employee data, or intellectual property because it’s worth a lot. A single theft could cost your company severe financial damage. And sometimes, in the case of ransomware, all they have to do is lock it down and force you to pay to get it back as you’ve heard about in some of the latest attacks.

Why do you hear terms like “dynamic threat landscape” these days? Because you aren’t facing a group of hacktivists in a basement anymore – you are now facing professionals with a lot to gain.

Your business and the threat landscape around you are ever changing.  It is imperative that your organization conducts an annual cyber risk assessment. This allows the entire organization to consider current and future risks and put forth a plan to mitigate the identified risks.

Some businesses will run out and acquire every new solution they hear about for protecting their organization against cyber risks. While having a multi-layered approach to cybersecurity is important, it is also equally important to have an organized approach and to use tools that are designed to work together.  If your solution is designed properly, you could end up with what we call the security effectiveness gap. As you add more solutions that don’t work together, the complexity exponentially increases. So, every time you add another solution or another vendor, you add another gap – another vulnerability.

A robust cybersecurity solution will:

  1. Stop threats at the edge
  2. Protect users where they work (especially when team members are working remotely or on a personal device)
  3. Find and contain problems fast
  4. Control who gets on your network and from where
  5. Simplify network segmentation
  6. Provide compressive monitoring and detection

…But I have cyber security insurance

That insurance probably doesn’t cover anywhere near what you think it does. Should you invest in cybersecurity insurance? That’s a topic for a different day.

Your business, no matter what size or type, needs to be prepared to handle a cyberattack at a moment’s notice. It is important to work with credentialed professionals with cybersecurity expertise and experience to help you maximize your investment and make sure you have all the appropriate measures in place to keep hackers at bay.

Learn more about Dean Dorton’s cyber security services and solutions for your organization.

As originally featured in Louisville’s Business First

Filed Under: Cybersecurity, Services, Technology Tagged With: attack, Cyber, Cybersecurity, Insurance, jason, Jason Miller, miller, Technology

Article 03.20.2018 Dean Dorton

Did you know that most higher education institutions will be required to meet new data protection standards starting May 25, 2018?

The European Union’s General Data Protection Regulation (GDPR) will affect institutions that recruit EU students, have alumni or donors residing in the EU, or offer study abroad programs there.  It is not yet clear how the regulations will be enforced and penalties assessed against U.S. institutions, but the maximum fine can be up to 20 million Euros based on severity and other factors.

Institutions are encouraged to get out in front of this regulation before it arrives at their doorstep!  Below are some of the specific data protection requirements that may be different than what you currently have in place:

  • Must obtain consent before collecting data from someone.
  • Must notify affected persons of a data breach within 72 hours.
  • Must provide data subjects a free electronic copy of their personal data when requested.
  • Data subjects have the right to be “forgotten”, meaning erasure of their personal data and cessation of its dissemination.
  • Must allow personal data to be portable in an electronic format for the subject’s own use.
  • Data systems must be built with privacy by design using appropriate technical security measures.
  • A qualified Data Protection Officer must be appointed by organizations that process personal data and have over 250 employees.

If you would like more information on these new standards or would like assistance in assessing your readiness for GDPR, please contact Jason Whitaker at jwhitaker@ddaftech.com or Megan Crane at mcrane@deandorton.com.

Filed Under: Higher Education, Industries Tagged With: breach, Data, data protection, EU, europe, european, GDPR, general data protection regulation, Higher Education, jason, whitaker

PAY INVOICE SUBMIT RFP
  • Services
    • Outsourced Accounting
    • Audit & Assurance
    • Tax
    • Consulting & Advisory
    • Technology & Cybersecurity
    • Family Office
    • Wealth Management
  • Industries
  • Company
  • Locations
  • Careers
  • Insights
  • Events
  • Contact Us
SUBSCRIBE TO INSIGHTS
email Dean Dorton - CPAs And Advisors On Email facebook Dean Dorton - CPAs And Advisors On Facebook twitter twitter linkedin Dean Dorton - CPAs And Advisors On LinkedIn youtube Dean Dorton - CPAs And Advisors On YouTube

The matters discussed on this website provide general information only. The information is neither tax nor legal advice. You should consult with a qualified professional advisor about your specific situation before undertaking any action.

© 2026 Dean Dorton Allen Ford, PLLC. All Rights Reserved

  • Privacy Policy
  • Terms Of Use
  • Accessibility