How do you tell if your information technology environment is properly implemented? An audit is the best way to find out. Many organizations do not have sufficient staff or resources to be able to perform such an audit. Even if you do have a robust internal IT...
New Rules for Recognizing Nonprofit Revenue
Nonprofit organizations often receive financial support from donors, foundations, government agencies, and other entities in the form of contributions and grants. Accounting for these transactions can be challenging, as they may involve complex terms and conditions that affect the timing and amount of revenue recognition.
Beyond the Donation: Nonprofit Accounting and Board Governance Explained, an interview with Ken Cerini
Guest Article: 3 Donor Retention Strategies to Boost Engagement and Giving
Guest Article: Streamline Nonprofit Management by Automating These 5 Areas
The Role of Data Analytics in Nonprofit Decision-Making
How to Account for Joint Costs in Nonprofit Organizations
Inflation Reduction Act: Clean Energy Tax Credits for Tax-Exempt Entities
2024 Nonprofit Trends
Navigating Hiring, Compensation, Succession Planning, and Employee Retention Trends in Nonprofits: Insights for 2024
Nonprofit Technology Trends to Watch in 2024: Navigating the Digital Frontier
Guest Article: Vulnerability Assessments and Penetration Tests
Jun 7, 2022
There is some confusion between what a vulnerability assessment accomplishes versus a penetration test. While both are critical in reducing cybersecurity attacks, a vulnerability assessment encompasses scanning the environment for anomalies within your IT environment....
Guest Article: Outsourcing IT Services as Part of Your Cybersecurity Model
Jun 7, 2022
Most outsourced IT support companies can provide multiple services thereby allowing a company to focus on its business. It is important to understand what your outsourced IT company is or is not providing, especially with respect to security monitoring, threat...
Guest Article: 5 Tips for Cybersecurity – A Guide to Protecting your Business
Jun 7, 2022
Small and midsize businesses (SMBs) spend less on cybersecurity than larger organizations. SMBs collect data that cybercriminals want; customer, employee, and vendor names, addresses, social security numbers, dates of birth, driver’s licenses, and insurance...
A CYBERSECURITY PRIMER
Jun 7, 2022
Cybersecurity in a nutshell is the combination of knowledge about what information is valuable in your organization, who wants to exploit it, why they want to exploit it, what your organization is willing to do to prevent a breach of information, and how well your...
IT CONTROLS – BEST PRACTICES
Jun 6, 2022
First Point: It’s Everyone’s Problem COO Ultimately responsible for the operational viability of the firm. The COO must support the CIO and CTO. They must hold every employee to a high standard of protecting the firm’s interests through careful attention and vigilance...
Cerini Connection: Workplace Trends
May 13, 2022
May 2022 Cerini Connection Topic: Workplace Trends Since the start of the pandemic, many companies have adopted a hybrid model, meaning that it is time to revaluate your space and how it is used. Join us as we talk to Paul G. Wolf, Co-Founder & President, Denham...
THE BOOK FAIRIES & BRIGHTER TOMORROWS – JVC BROADCASTING
May 5, 2022
The Book Fairies and Brighter Tomorrows were featured on JVC Broadcasting on April 30, 2022!
Accounting for Lease – Cerini Short
Apr 20, 2022
Accounting for Lease Cerini Short In this Cerini Short, Ted Campbell, CPA, CGFM, CGMA, Manager, explains Lease Accounting. Several years ago, the Financial Accounting Standards Board (“FASB”) issued new lease accounting standards (“ASC 842”) to try to align some of...