This site uses cookies to store information on your computer. Some are essential to make our site work; others help us improve the user experience. By using the site, you consent to the placement of these cookies. Read our privacy policy to learn more.

Technical

Six cybersecurity basics Logo aicpa

  Ken Tysiac |   Free |   AICPA |   26 Mar 2014 |   Journal of Accountancy

This article discusses cybersecurity and tactics to deal with the associated risks.

Topics covered:
  • Management accounting: Technical: Risk management & internal control: Risk management policies & procedures, Advanced

2 Comments/Reflections

Bekithemba Hwalima

Bekithemba Hwalima Mar 2016

I have taken away good advice, including having a formal written plan for how to react to a data breach, as well as integrating information security with the company's risk management program. Lastly, to always be alert and to believe and expect that you are going to be attacked.

Nigel Welch

Nigel Welch Dec 2015

The article was a general top level warning for us all to be vigilant and aware of the risks of cyber security.

We have several filters within our systems but spam mail with potential threats can still get through. The final step is for the operator to delete odd items and not open them