Nonprofit

Guest Article: Outsourcing IT Services as Part of Your Cybersecurity Model

Most outsourced IT support companies can provide multiple services thereby allowing a company to focus on its business. It is important to understand what your outsourced IT company is or is not providing, especially with respect to security monitoring, threat...

Guest Article: 5 Tips for Cybersecurity – A Guide to Protecting your Business

Small and midsize businesses (SMBs) spend less on cybersecurity than larger organizations. SMBs collect data that cybercriminals want; customer, employee, and vendor names, addresses, social security numbers, dates of birth, driver’s licenses, and insurance...

A CYBERSECURITY PRIMER

Cybersecurity in a nutshell is the combination of knowledge about what information is valuable in your organization, who wants to exploit it, why they want to exploit it, what your organization is willing to do to prevent a breach of information, and how well your...

IT CONTROLS – BEST PRACTICES

First Point: It’s Everyone’s Problem COO Ultimately responsible for the operational viability of the firm. The COO must support the CIO and CTO. They must hold every employee to a high standard of protecting the firm’s interests through careful attention and vigilance...

Cerini Connection: Workplace Trends

May 2022 Cerini Connection Topic: Workplace Trends Since the start of the pandemic, many companies have adopted a hybrid model, meaning that it is time to revaluate your space and how it is used. Join us as we talk to Paul G. Wolf, Co-Founder & President, Denham...

THE BOOK FAIRIES & BRIGHTER TOMORROWS – JVC BROADCASTING

The Book Fairies and Brighter Tomorrows were featured on JVC Broadcasting on April 30, 2022!

Accounting for Lease – Cerini Short

Accounting for Lease Cerini Short In this Cerini Short, Ted Campbell, CPA, CGFM, CGMA, Manager, explains Lease Accounting. Several years ago, the Financial Accounting Standards Board (“FASB”) issued new lease accounting standards (“ASC 842”) to try to align some of...

Cerini Connection: Effective Leadership

March 2022 Cerini Connection Topic: Effective Leadership Now, more than ever, effective leadership is important. With the hybrid work environment we currently work under, people are experiencing less connection with their actual employer and more of a connection with...

What are Key Audit Matters (KAMs)? – Cerini Short

What are Key Audit Matters (KAMs)? Cerini Short In this Cerini Short, Mahnaz Cavalluzzi, CPA, Manager, explains Key Audit Matters. As part of audit engagements, auditors may be engaged to report on Key Audit Matters (KAMs). The purpose of communicating KAMs is to...

Key Audit Matters (KAMs)

As part of audit engagements, auditors may be engaged to report on Key Audit Matters (KAMs). The purpose of communicating KAMs is to provide greater transparency about the audit that was performed and to provide financial statement users with a basis to further engage...
Internal Controls: The 5 Components

Internal Controls: The 5 Components

What are internal controls? Why do we need them?
Internal controls are one of the most essential elements within any organization. Internal controls are put in place to enable organizations to achieve their goals and missions.

read more
Recommended IT Policies

Recommended IT Policies

Good governance and accountability require an organization to adopt policies and procedures related to IT to provide criteria and guidance for the company’s computer-related operations. To effectively protect computing resources and data, companies should have an...

read more
Guest Article: Cybersecurity – Legal Expert Analysis

Guest Article: Cybersecurity – Legal Expert Analysis

Navigating the ambiguous requirement of ‘Reasonable Security’ measures while protecting personal information. Over the last couple of years, cybersecurity laws have commonly required that sensitive information be protected through the use of “reasonable security.”...

read more
Guest Article: Disposing Technology

Guest Article: Disposing Technology

What businesses should know about electronic data destruction and e-recycling to maintain data compliance, avoid a catastrophic data breach, and protect the environment. IT Asset Disposition (ITAD) is the process of retiring computer equipment and other IT Hardware...

read more
Guest Article: Cybersecurity Insurance

Guest Article: Cybersecurity Insurance

Times have certainly changed with respect to cybersecurity controls. Regardless of industry or organizational size, companies should expect to see a continued disciplined underwriting approach that remains laser-focused on data security controls, with rates continuing...

read more
Guest Article: Incident Response Planning

Guest Article: Incident Response Planning

Imagine this: You’re the Executive Director of a $5 million dollar nonprofit organization. It’s 6:30 AM on Monday morning and even though you wish you were still sleeping; you are logging into your email to follow-up with some donors. You get a login error message,...

read more
Guest Article: Cybersecurity Audits and Assessments

Guest Article: Cybersecurity Audits and Assessments

How do you tell if your information technology environment is properly implemented? An audit is the best way to find out. Many organizations do not have sufficient staff or resources to be able to perform such an audit. Even if you do have a robust internal IT...

read more