Search Results
8402 result(s) for
-
What to Measure for ESG Reporting: 5 Tips
Jan 31, 2023
If you have clients, vendors or suppliers that are publicly-traded companies -- or if you want to do business with any, or with any government agency -- you’ll need to report your ESG footprint and risk analysis.
-
May 25, 2023
This article offers a look at how SCADA systems (supervisory control and data acquisition) can be leveraged to automate industrial processes by integrating hardware, analogical equipment and software on a computer system.
-
Aug 18, 2022
Privileged asset management, or PAM, is a protocol that consists of applying disciplined cybersecurity strategies and technologies to exert control over “privileged” or elevated access and permissions for users, accounts, processes, applications, and systems across an IT environment.
-
Best Practices for Securing Your IoT/SCADA Systems
Jul 19, 2023
This article focuses on the importance of the contrast between the security risks between IoT, Supervisory Control and Data Acquisition, and IT, and that a comprehensive security plan needs to be in place to protect these systems.
-
Tax Savings: Claiming Section 179 for Manufacturing and Distribution
Sep 12, 2024
Explore how manufacturing and distribution organizations can leverage Section 179 to optimize tax deductions for equipment, machinery, and other capital expenditures.
-
Disaster Recovery: Create a Disaster Plan Before You Need One
Oct 25, 2017
Creating a disaster plan before you need one helps identify the kinds of disasters and consequences your medical practice could face. This article reviews some proactive measures you can take to manage your practice during and after the event.
-
REIT Compliance Through Due Diligence of Strategic Acquisitions
Sep 18, 2024
As REITs look to grow their operations, one common form of expanding their investment mix is through the acquisition of real estate related assets. However, it is critical for REIT operators to perform proper due diligence prior to closing of an acquisition to ensure that no compliance issues will arise.
-
IRS Clarifies Student Loan Payment Matching Contributions for Employers
Sep 17, 2024
Learn how employers can offer matching contributions based on student loan payments under SECURE 2.0. Get insights from IRS guidance on eligibility, contribution limits, and administration for QSLP matching.
-
State Tax Impacts on Manufacturing & Distribution
Sep 24, 2024
Navigate the complex landscape of state taxes for manufacturers and distributors. Learn about nexus, apportionment, sales tax, and strategies to minimize your tax burden and maintain compliance with Wayfair and other recent regulations.
-
Hackers Are Dreaming About Manufacturers and Distributors
May 20, 2020
COVID-19 has opened a floodgate of “what-if” questions business executives must respond to; this article focuses on impact the pandemic is having on the planning and protocols of the manufacturing and distribution industry.
-
Business Continuity and Crisis Response: What Is Your Plan?
Feb 7, 2020
A discussion of the necessity for robust continuity and crisis response plans – reasons why, and steps to take.
-
CAPstone Webcast Series: Computing Security
Jun 9, 2020
This content features a recap of the discussion from EisnerAmper’s (CAP)Stone series webcast titled “Cyber Action Plan – Computing Security,” including topics based on working from home and recognizing trouble spots.
-
CAPstone Webcast Series: Disaster Recovery/Business Continuity with Cloud Security
May 28, 2020
This content features a recap of the discussion from EisnerAmper’s (CAP)Stone series webcast titled “Disaster Recovery/Business Continuity with Cloud Security.”
-
California Dreaming or Nightmare?
Nov 15, 2018
The world is focused on California as they raise the bar to protect an individual’s right to privacy. Many firms are struggling to understand their responsibilities under the new California rules under what has been called the “American GDPR.”
-
What To Do if an Enterprise Falls Victim to a Ransomware Attack
Feb 22, 2021
This article discusses steps an organization can take to minimize this risk of such an event, as well as a process to follow if a ransomware attack does occur.
-
Cybersecurity Is Everybody’s Problem
Jan 26, 2021
Cyberattacks have dramatically increased since the pandemic. Here is a list of the five most prevalent types of attacks and tips you can take to mitigate the threats.
-
CAPstone Webcast Series: Network Security Recap
May 14, 2020
The COVID-19 pandemic has mandated remote ‘work from home’ environments for many organizations. This article highlights a number of protocols companies can use to enhance network security, including ‘layered security.’
-
Should Your Family Office Be Concerned About Cybersecurity?
Nov 19, 2020
The first in a two-part series of articles focusing on cybersecurity threats to family offices and some of the steps to be taken to mitigate these threats.
-
Apr 13, 2021
This article looks at three trends we see emerging for IT departments as they embrace the new geographic challenges of employees and newly formed attacks from cyber bad actors: work from anywhere, new systems, and user education.
-
CAPstone Webcast Series: Physical Security
Jul 1, 2020
The nation slowly loosens social distancing and businesses begin to allow workers to trickle back to offices; physical security is looking very different. Rahul Mahna and Glenn Adari of Panasonic discuss the importance of -- and dangers addressed by -- physical security.