• Skip to primary navigation
  • Skip to main content
Dean Dorton – CPAs and Advisors
  • Services
    • Audit & Assurance
      • Audits, Reviews & Compilations
      • ESG Programs & Reporting
      • Internal Audit
      • International Financial Reporting
      • Lease Accounting Managed Services
      • Peer Review Services
      • SOC Reporting
    • Consulting & Advisory
      • Business Valuation Services
      • Forensic Accounting
      • Litigation Support
      • Matrimonial Dissolution
      • Merger & Acquisition
      • SEC Services
      • Succession Planning
      • Transaction Advisory Services
      • Whistleblower Hotline
    • Family Office
    • Healthcare Consulting
      • Finance
      • Health Systems Operational Transformation
      • Medical Billing and Credentialing
      • Risk Management & Compliance
      • Strategy and Strategy Implementation
      • Technology & Data Analytics
    • Outsourced Accounting
    • Private Wealth
    • Tax
      • Business Tax
      • Cost Segregation Studies
      • Credits and Incentives
      • Estates and Trusts
      • Individual Tax
      • International Tax
      • SEC Provision and Compliance
      • State and Local Tax
    • Technology & Cybersecurity
      • Accounting Software
      • Cybersecurity
        • Cybersecurity Assessments
        • Cybersecurity Scorecard Assessment
        • Security Awareness Training
        • Virtual Information Security Office
      • Data Analytics & AI
      • IT Audit & Compliance
        • Cybersecurity Maturity Model Certification (CMMC)
        • Data Privacy Laws
        • SOC Reporting
      • IT Infrastructure & Cloud Solutions
        • Automation
        • Backup and Disaster Recovery
        • Cloud Strategy
        • Data Center
        • Enterprise Network
        • Network Security
        • Phone and Video Conferencing
        • User Identity Management Solutions
        • Webex
      • Managed IT Services
  • Industries
    • Construction
    • Distilleries and Craft Breweries
    • Energy and Natural Resources
    • Equine
    • Financial Institutions
    • Healthcare
      • Finance
      • Health Systems Operational Transformation
      • Risk Management & Compliance
      • Medical Billing and Credentialing
      • Strategy and Strategy Implementation
      • Technology & Data Analytics
    • Higher Education
    • Life Sciences
    • Manufacturing and Distribution
    • Nonprofit and Government
    • Real Estate
  • Insights
    • Articles
    • Guides
    • Case Studies
  • Events
  • Company
    • News
    • Our Team
    • Experiences
    • Careers
      • College Students
      • Experienced Professionals
    • Locations
          • Looking for Services
          • Looking for a Job
            • Curious about Dean Dorton
            • An experienced professional
            • A college student or recent graduate
          • A Current Client
            • Contact Us
            • Making a payment
            • All Client Tools
            • Checking on the latest insights
          • Other…
            • Learn More about Dean Dorton
            • Find a contact
            • Request more information
  • Contact Us

Technology

Article 02.17.2025 Autumn Hines

Every nonprofit strives to make a difference. However, achieving efficiency and scalability often requires digital transformation—a journey that can be complex given the unique challenges nonprofits face, such as limited staffing and constrained budgets. With the right strategy, nonprofits can leverage technology to optimize operations and drive their mission forward.

Why Your Nonprofit Needs Digital Transformation

Technology is a powerful tool that can streamline operations, enhance donor engagement, and strengthen financial oversight. Digital transformation helps nonprofits:

  • Reduce manual workloads through automation
  • Improve data analysis for better decision-making
  • Enhance communication with stakeholders
  • Strengthen cybersecurity and compliance

Despite its clear benefits, digital transformation in the nonprofit sector trails behind other industries due to resource constraints and a lack of strategic guidance.

Overcoming Challenges

Nonprofits embarking on a digital transformation journey should focus on these key areas:

  1. Leadership Buy-In: Commitment from leadership is crucial. Executives and board members must champion digital initiatives, demonstrating their value to staff and stakeholders.
  2. Strategic Planning: Technology investments should align with the organization’s mission and long-term goals. Conducting an initial assessment helps prioritize technology adoption based on impact and feasibility.
  3. Training and Change Management: New tools often require training, which can be difficult for staff who are balancing existing responsibilities. Organizations should provide adequate support to ease transitions and increase adoption rates.
  4. Resource Allocation: Prioritizing investments with the highest impact ensure that nonprofits maximize their technology budgets. Cloud-based solutions, automation, and data analytics tools often provide cost-effective and scalable options.

Best Practices for a Successful Transition

To ensure a smooth and effective transition, nonprofits should adopt the following best practices:

  1. Assess Your Current State: Identify gaps and inefficiencies in current operations. A technology assessment can help determine which digital solutions align best with organizational needs.
  2. Engage Stakeholders: Involve team members at all levels in planning discussions. Their insights can guide decision-making and foster buy-in, ensuring smoother implementation.
  3. Set Measurable Goals: Establish clear objectives to track progress, such as improving donor retention, increasing operational efficiency, or enhancing financial transparency.
  4. Start Small, Scale Smart: Pilot new technology with a small group before rolling it out to the whole organization. This allows for feedback and adjustments, reducing disruption.

How Dean Dorton Technology Can Help

At Dean Dorton, we understand the unique challenges nonprofits face. Our technology consulting services provide:

  • Personalized consultations to evaluate existing infrastructure and identify opportunities for improvement
  • Cloud-based financial and ERP solutions, like Sage Intacct, enhance financial management
  • Cybersecurity and compliance support to protect donor and organizational data
  • Process automation and workflow optimization to increase efficiency
  • Data analytics and reporting solutions to drive informed decision-making

Our team works closely with nonprofits to develop tailored strategies that align with their missions while optimizing operations and engagement.

Looking Ahead

The nonprofit sector is evolving, and digital transformation is essential for long-term success. Organizations that embrace technology will be better positioned to achieve their goals, enhance stakeholder relationships, and navigate an increasingly digital landscape.

By leveraging best practices, nonprofits can successfully integrate digital solutions that drive meaningful change.

Filed Under: Nonprofit & Government Tagged With: Managed IT, nonprofit, Technology

Article 09.30.2024 Autumn Hines

Updating HIPAA regulations is a gradual process, starting with feedback requests from the Department of Health and Human Services (HHS) to address outdated or burdensome aspects of the law. Following this, a Notice of Proposed Rulemaking (NPRM) is issued, inviting industry comments before a Final Rule is released. Significant changes proposed for 2024 include changes to the HIPAA Privacy Rule and new requirements for patient access to their Protected Health Information (PHI).

Notably, the timeframe for responding to access requests is shortened, and mandates around electronic health records are clarified. Although these updates aim to streamline processes, they pose implementation challenges for healthcare organizations, including necessary training and policy adjustments. Additionally, the HHS plans to propose new cybersecurity regulations by the end of 2024 to bolster patient data protection amid rising cyber threats.

Recent and Proposed Changes

Proposed New HIPAA Privacy Rule Changes

  • Patients can inspect their PHI in person and take notes or photos.
  • Access to PHI must be provided within 15 days (reduced from 30).
  • Transfers of ePHI to third parties are limited to what’s in an EHR.
  • Individuals can request PHI transfers to personal health applications.
  • Individuals should receive ePHI at no cost in certain situations.
  • Covered entities must inform individuals of their rights regarding PHI summaries.
  • Estimated fee schedules for PHI access must be posted online.
  • Individualized fee estimates for PHI copies are required.
  • A pathway is created to direct the sharing of PHI among entities.
  • Providers must respond to records requests directed under the HIPAA Right of Access.
  • The requirement for written confirmation of privacy notice provision is removed.
  • PHI can be disclosed to prevent reasonably foreseeable threats to health or safety.
  • Certain uses of PHI can be made in good faith for the individual’s best interest.
  • A minimum necessary standard is established for care coordination disclosures.
  • The definition of healthcare operations now includes care coordination.
  • Armed Forces can use or disclose PHI to all uniformed services.
  • A definition for electronic health records is added.

Transaction Code Set Update Adds Three New Codes to enable electronic transmission of healthcare attachment transactions

HHS Healthcare Sector Cybersecurity Strategy Report

  1. Establish voluntary cybersecurity goals for the healthcare sector
  2. Provide resources to incentivize and implement cybersecurity practices
  3. Implement an HHS-wide strategy to support greater enforcement and accountability
  4. Expand and mature the one-stop shop within HHS for healthcare sector cybersecurity

In 2019, OCR maintained robust enforcement efforts, concluding the year with 10 settlements and civil monetary penalties amounting to $12,274,000. Toward the end of the year, OCR launched a new initiative to ensure compliance with the HIPAA Right of Access, which mandates that individuals receive timely access to their medical records for a reasonable, cost-based fee.

Penalty Structure for HIPAA Violations in 2024

Annual Penalty LimitAnnual Penalty LimitMinimum Penalty per ViolationMaximum Penalty per ViolationAnnual Penalty Cap
Tier 1Lack of knowledge$137
$34,464$34,464
Tier 2Reasonable cause$1,379$68,928$137,886
Tier 3Willful neglect$13,785$68,928$344,638
Tier 4Willful neglect (not corrected within 30 days)$68,928$68,928$2,067,813

Filed Under: Healthcare, IT Audit Tagged With: Cybersecurity, Healthcare, IT Audit, Technology

Article 09.17.2024 Autumn Hines

The Cybersecurity Maturity Model Certification 2.0 (CMMC 2.0) has been out since 2022 but is not in effect nor has a clear timetable. However, it has been clear that Department of Defense (DOD) contractors were supposed to prepare for the compliance requirements. CMMC 2.0 got a step closer to reality in August 2024, in which the DOD introduced a proposed rule in the Federal Register that outlines the enforcement of its updated cybersecurity standards under CMMC 2.0. This proposal, which amends the Defense Federal Acquisition Regulation Supplement (DFARS), aims to integrate CMMC 2.0 requirements across all DOD vendor contracts involving the following forms of information. 

The proposed rule does not appear to change anything we know about CMMC 2.0, but it clarifies some expectations and moves us closer to a finalized and effective date. 

This new proposal introduces enhanced requirements for contracting officers. They will be responsible for ensuring bidders meet CMMC compliance and must notify contractors when CMMC standards apply to a contract. 

CMMC 2.0 represents a significant overhaul of the original CMMC 1.0, launched in 2019, which faced criticism for its cost and restrictiveness. The updated model simplifies compliance by operating at three levels based on the type of information handled. Companies at Level 1 can conduct self-assessments, while some Level 2 entities can also self-assess, though others will need third-party certification from C3PAOs. Level 3 companies must obtain certification from the DOD. 

The proposed rule stipulates that contractors must present a current CMMC certificate or self-assessment at the contract award stage. This requirement extends to subcontractors, who must comply with CMMC standards if they handle sensitive information. 

Other notable provisions of the proposal: 

  • Contractors must maintain their CMMC level throughout the life of their contracts and affirm compliance annually or upon changes to their information systems. 
  • Contractors are required to submit unique DOD identifiers for each system processing, storing, or transmitting covered information. 
  • CMMC requirements must flow to subcontracts and other contractual instruments, extending compliance obligations broadly within the supply chain. 
  • Contractors must promptly notify contracting officers of any changes to their cyber systems or lapses in information security, with a 72-hour reporting window for significant changes. 

The rule outlines a three-year phase-in period, during which CMMC requirements will initially apply to a subset of DOD contracts. Following this period, CMMC compliance will be mandatory for all relevant contracts. The public comment period for the proposed rule will close on October 15, 2024. If approved, the phased implementation could commence in 2025. 

Filed Under: Cybersecurity, IT Audit Tagged With: Cybersecurity, Technology

Article 08.26.2024 Autumn Hines

In the digital age, where data drives much of our daily lives, protecting consumer privacy has become paramount. With the introduction of the Kentucky Consumer Data Privacy Act (KCDPA), the state takes a significant step towards safeguarding the personal information of its residents. This act, akin to similar legislation emerging across the United States, reflects a growing recognition of the importance of privacy in the digital economy. Let’s delve into the key aspects and implications of the KCDPA.

What is the Kentucky Consumer Data Privacy Act?

Enacted to enhance consumer privacy rights, the KCDPA empowers Kentucky residents with greater control over their personal data. Signed into law on April 4, 2024, and set to take effect on January 1, 2026, the act imposes obligations on businesses handling consumer data, outlining transparency requirements, data access provisions, and guidelines for data processing practices

Scope

  • control or process personal data of at least 100,000 Kentucky consumers; or
  • control or process personal data of at least 25,000 Kentucky consumers and derive over 50% of gross revenue
    from the “sale” of personal data

Exemptions in the KCDPA

  • Regulated Industries:
    • Certain industries are subject to existing federal or state privacy regulations that preempt the application of the KCDPA.
    • For example, healthcare providers or business associates governed by HIPAA or financial institutions regulated by GLBA are exempt from provisions of the KCDPA.
  • Entity Types:
    • Certain entity exemptions commonly seen in other state privacy laws exist.
    • For example, any city, state agency, or political subdivision of the state; nonprofit organizations; higher education institutions; certain entities collecting data for specific law enforcement activities; first responders in connection with catastrophic events; and small telephone or municipally owned utilities.
  • Data Types:
    • Certain data are exempt.
    • For example, protected health information and various other health-related data, certain types of consumer reporting data, data regulated by the Family Educational Rights and Privacy Act, and emergency contact information of an individual used for emergency contact purposes.

Key Provisions

  • Consumer Rights:
    • Under the KCDPA, consumers have the right to request disclosure of what personal data businesses collect about them.
    • Consumers have the right to request correction of inaccuracies in the consumer’s personal data.
    • Consumers are entitled to request deletion of their data.
    • Consumers may obtain a copy of their personal data in a readily usable format for transmission to another business.
    • Consumers may opt out of the processing of personal data for purposes of targeted advertising, the sale of personal data, or profiling in furtherance of decisions that produce legal or similarly significant effects concerning the consumer.
  • Transparency Requirements
    • Covered businesses must disclose their data collection and processing practices, including the purposes for
      which data is used.
    • They must notify consumers about their privacy rights and how to exercise them.
  • Data Processing Restrictions:
    • The act imposes limitations on how businesses handle sensitive personal information, such as health or financial
      data.
    • It prohibits businesses from processing data in ways that would discriminate against consumers.
  • Data Security Measures:
    • Covered businesses are required to implement reasonable security measures to safeguard consumer data from
      breaches or unauthorized access.
  • Enforcement and Compliance:
    • The Kentucky Attorney General is tasked with enforcing the KCDPA, with penalties for non-compliance.

Implications for Businesses

  • Compliance Burden:
    • Businesses must establish, implement, and maintain reasonable administrative, technical, and physical data security practices to protect the confidentiality, integrity, and accessibility of personal data.
    • Businesses must provide consumers with a reasonably accessible, clear, and meaningful privacy notice that includes the categories of personal data processed, the purpose for processing personal data, how consumers may exercise their consumer rights, the categories of personal data that the controller shares with third parties, and the categories of third parties, if any, with whom the controller shares personal data.
    • Consumer requests must be responded to within 45 days of the request. The act provides guidelines for extensions and refusal to respond.
    • Businesses must establish a process for consumers to submit requests and appeal refusals to respond. This process must be conspicuously available.
    • Information provided to a consumer must be free of charge, up to twice annually per consumer.
    • Businesses must conduct and document a data protection impact assessment of processing personal data for the following activities: targeted advertising, selling personal data, profiling, processing sensitive data, and any processing that presents a heightened risk of harm to consumers.
  • Data Responsibility:
    • Limit the collection of personal data to what is adequate, relevant, and reasonably necessary.
    • Do not process personal data for purposes that are neither reasonably necessary nor compatible with the disclosed purposes.
    • Do not process personal data in violation of state and federal laws that prohibit unlawful discrimination against consumers.
    • Do not process sensitive data concerning a consumer without obtaining the consumer’s consent.
  • Legal and Compliance Risks:
    • The Attorney General may request a data protection risk assessment to evaluate its effectiveness.
    • The Attorney General has exclusive authority to enforce violations of this Act. This can include prosecuting any violations.
    • The Attorney General may demand any information, documentary material, or physical evidence from any controller or processor believed to be engaged in or about to engage in any violation.
    • Businesses may receive a written notice from the Attorney General when a violation is noticed. If the violation is remediated within thirty days, no action for damages will be initiated.
    • If violations are not remediated within thirty days, The Attorney General may initiate an action to seek damages for up to $7,500 for each continued violation.
    • The Attorney General may recover reasonable expenses incurred in investigating and preparing the case, court costs, attorney’s fees, and any other relief ordered by the court of any action initiated

Implications for Compliance

  • Assessment and Documentation:
    • Businesses must carefully assess whether they fall within any of the exempt categories outlined in the KCDPA.
    • Documenting the basis for exemptions and ensuring compliance with other privacy laws are essential steps in the compliance process.
  • Risk Mitigation
    • While exemptions provide relief from certain compliance obligations, they also introduce potential risks, such as reputational harm or legal challenges.
    • Businesses should conduct thorough risk assessments to evaluate the implications of relying on exemptions and implement appropriate risk mitigation strategies.
  • Transparency and Consumer Communication:
    • Even when exemptions apply, businesses should maintain transparency and communicate clearly with consumers about their data processing practices.
    • Providing accessible privacy notices and mechanisms for consumers to exercise their rights remains essential for building trust and accountability.

Navigating Complexity

As businesses adapt to the evolving privacy landscape, proactive compliance efforts, robust risk management practices, and transparent communication with consumers are critical for success. By embracing privacy as a fundamental value and integrating it into their operations, businesses can navigate the complexities of the KCDPA while fostering trust and loyalty among their customer base.

Looking Ahead

The passage of the Kentucky Consumer Data Privacy Act reflects a broader trend toward enhanced consumer privacy protections at the state level. As more states consider similar legislation, businesses face a complex regulatory landscape that demands proactive compliance measures.
Moving forward, businesses must prioritize privacy as a fundamental aspect of their operations, integrating privacy by design principles into their products and services. By prioritizing transparency, accountability, and consumer empowerment, businesses can navigate the evolving privacy landscape while building trust and loyalty among their customer base.
In conclusion, the Kentucky Consumer Data Privacy Act represents a significant milestone in the journey toward empowering consumers and enhancing privacy protections in the digital age. By embracing the principles outlined in the act, businesses can not only comply with regulatory requirements but also foster a culture of privacy and trust in their interactions with consumers.

Filed Under: Cybersecurity Tagged With: Cybersecurity, Technology

Article 07.19.2024 Autumn Hines

Business email compromise (BEC) attacks are on the rise. In 2023, IC3, the Internet Crime Complaint Center, reported receiving approximately 21,000 reports of business email compromises from organizations. The organizations reported $2.9 billion in losses from these attacks. Business email compromises are big business for cyber-criminals, often resulting in hefty losses, whether reputational or financial. So, how are cyber-criminals getting to the business emails?

What to Know About AitM Attacks

A newer acronym has entered the chat in the acronym-happy landscape of cybersecurity: Adversary-in-the-middle, or AitM, for short. Adversary-in-the-middle attacks allow a threat actor to trick users into entering their credentials and multi-factor authentication into a site they control and relay that information to the legitimate email provider in real-time.

This allows the threat actor to steal the session token for the user and log in until that token expires (which is 90 days for refresh by default for Microsoft, by the way). From there, the threat actor can log in as the user and take any actions on behalf of the compromised user. The ease of this attack is compounded by the fact that there are publicly available tools on GitHub that allow a threat actor to quickly spin up the tooling to use. All they need at that point is a registered domain for the landing page.

Standard multi-factor authentication (MFA) implementations (SMS, push notification, number challenge, etc.) are also no match for this threat. If the user enters their password and accepts the push, for example, the threat actor will then have access to their account in real time. Microsoft has posted an excellent article regarding this threat, which can be found here.

How You Can Combat AitM Attacks

An organization can choose from several options to protect itself and its assets from these threats. This should be considered a layered model in which organizations attempt to use as many as possible to provide in-depth defense.

  1. Utilize phish-resistant MFA. Phish-resistant MFA utilizes certificates or hardware-based tokens (YubiKey, for example) to ensure that even if a threat actor convinced an end user to provide their password, they could not capture the multi-factor prompt and gain a session token for the user. See this article from our catalog for more information on why common MFA methods are not enough to cure all cyber ailments.
  2. If using Microsoft Entra, utilize conditional access policies to enforce trusted authentication. This means that users can only log in from Entra-joined devices. This ensures that if a threat actor gains access to the session token, they cannot use it because it does not originate from a joined device in the tenant. This is a very effective control to use.
  3. Leverage end-user awareness training to ensure users are aware of these threats. The biggest indicator is threat actors will often use standard phishing schemes, such as an invoice, to convince the user to click it and enter credentials. Educate users not to trust these emails by default and be mindful of the web page. If the URL appears off when prompting for your credentials, exit the web page and report it to your security team.
  4. Utilize strong email security filtering to prevent phishing emails from reaching the inbox. A strong email filter will recognize the attempt and, ideally, hold the email in quarantine.
  5. Utilize security monitoring. Monitor your tenant for suspicious sign-ins and set up alerts to notify people who can respond. Organizations should seek out solutions that can automate these steps. If the solution determines an account to be compromised, alert it, send notifications, and take proactive steps to disable it so that a threat actor cannot begin to conduct nefarious activities. Microsoft refers to this in their platform as Attack Disruption.

All of these steps will help protect your organization from threats. You are the first line of defense for your organization. Be cautious and be cyber-aware. For more information, contact Dean Dorton to help with your security needs.

Filed Under: Cybersecurity Tagged With: Cybersecurity, Technology

Article 05.6.2024 Autumn Hines

Data privacy and security have never been more important in a digital age where information flows freely. Despite warnings as recently as 2023 to enhance and bolster cybersecurity defenses, ransomware attacks continue resulting in significant operational impact to all sectors of healthcare.

Recently, two major healthcare providers, Kaiser Permanente and City of Hope, found themselves in the spotlight regarding data privacy concerns. Let’s delve into what transpired and how these organizations responded.

Kaiser Permanente

Kaiser Permanente apologized to its vast network of 13.4 million members after discovering that certain search information may have inadvertently been shared with external platforms, including Google and social media sites. The company attributed this data transmission to previous online technologies installed on its websites and apps. While the shared information did not include sensitive details like usernames or financial information, it did encompass IP addresses, usernames, indications of account activity, and health-related search terms.

Upon identifying the issue, Kaiser Permanente promptly removed the problematic technologies from its online platforms and assured members that there had been no reported instances of personal information misuse. Nevertheless, the organization took proactive measures by informing all affected members, both current and former, about the incident. Additionally, they expressed regret for the oversight and outlined steps, guided by experts, to prevent similar incidents in the future.

City of Hope

In a parallel scenario, City of Hope, another healthcare provider, faced a data breach affecting its members. The breach, which took place between September 19 and October 12, 2023, involved unauthorized access to a plethora of member information, ranging from email addresses to sensitive data like Social Security numbers and medical records.

City of Hope responded swiftly upon discovering the breach, implementing mitigation measures, and bolstering security protocols with the assistance of cybersecurity experts. Furthermore, they extended a gesture of goodwill to affected members by offering two years of free identity monitoring services. In tandem with this, they promptly notified relevant authorities, including law enforcement and regulatory bodies, and launched an internal investigation into the incident to ascertain its scope and impact.

Cybersecurity is an urgent issue in healthcare, but the risk is growing exponentially, and it’s poised to keep rising with no signs of stopping. Consequently, the expansive landscape of healthcare creates additional vulnerabilities where data attackers can outpace your organization, disrupting patient care. What steps is your organization taking to prepare?

Contact Dean Dorton for expertise in healthcare, cybersecurity, and the dynamic place where they intersect.

Filed Under: Cybersecurity, Healthcare, Technology Tagged With: Cybersecurity, Healthcare IT, Technology

  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 5
  • Go to Next Page »
PAY INVOICE SUBMIT RFP
  • Services
    • Outsourced Accounting
    • Audit & Assurance
    • Tax
    • Consulting & Advisory
    • Technology & Cybersecurity
    • Family Office
    • Wealth Management
  • Industries
  • Company
  • Locations
  • Careers
  • Insights
  • Events
  • Contact Us
SUBSCRIBE TO INSIGHTS
email Dean Dorton - CPAs And Advisors On Email facebook Dean Dorton - CPAs And Advisors On Facebook twitter twitter linkedin Dean Dorton - CPAs And Advisors On LinkedIn youtube Dean Dorton - CPAs And Advisors On YouTube

The matters discussed on this website provide general information only. The information is neither tax nor legal advice. You should consult with a qualified professional advisor about your specific situation before undertaking any action.

© 2025 Dean Dorton Allen Ford, PLLC. All Rights Reserved

  • Privacy Policy
  • Terms Of Use
  • Accessibility