Skip to content

Search Results

8402 result(s) for


  • What to Measure for ESG Reporting: 5 Tips

    Jan 31, 2023

    If you have clients, vendors or suppliers that are publicly-traded companies -- or if you want to do business with any, or with any government agency -- you’ll need to report your ESG footprint and risk analysis.

  • SCADA in 2023

    May 25, 2023

    This article offers a look at how SCADA systems (supervisory control and data acquisition) can be leveraged to automate industrial processes by integrating hardware, analogical equipment and software on a computer system.

  • Privileged Access Management: Why Organizations Need to Consider a Strategy to Enhance Data Protection

    Aug 18, 2022

    Privileged asset management, or PAM, is a protocol that consists of applying disciplined cybersecurity strategies and technologies to exert control over “privileged” or elevated access and permissions for users, accounts, processes, applications, and systems across an IT environment.

  • Best Practices for Securing Your IoT/SCADA Systems

    Jul 19, 2023

    This article focuses on the importance of the contrast between the security risks between IoT, Supervisory Control and Data Acquisition, and IT,  and that a comprehensive security plan needs to be in place to protect these systems.

  • Tax Savings: Claiming Section 179 for Manufacturing and Distribution

    Sep 12, 2024

    Explore how manufacturing and distribution organizations can leverage Section 179 to optimize tax deductions for equipment, machinery, and other capital expenditures. 

  • Disaster Recovery: Create a Disaster Plan Before You Need One

    Oct 25, 2017

    Creating a disaster plan before you need one helps identify the kinds of disasters and consequences your medical practice could face. This article reviews some proactive measures you can take to manage your practice during and after the event.

  • REIT Compliance Through Due Diligence of Strategic Acquisitions

    Sep 18, 2024

    As REITs look to grow their operations, one common form of expanding their investment mix is through the acquisition of real estate related assets. However, it is critical for REIT operators to perform proper due diligence prior to closing of an acquisition to ensure that no compliance issues will arise.

  • IRS Clarifies Student Loan Payment Matching Contributions for Employers

    Sep 17, 2024

    Learn how employers can offer matching contributions based on student loan payments under SECURE 2.0. Get insights from IRS guidance on eligibility, contribution limits, and administration for QSLP matching.

  • State Tax Impacts on Manufacturing & Distribution

    Sep 24, 2024

    Navigate the complex landscape of state taxes for manufacturers and distributors. Learn about nexus, apportionment, sales tax, and strategies to minimize your tax burden and maintain compliance with Wayfair and other recent regulations.

  • Hackers Are Dreaming About Manufacturers and Distributors

    May 20, 2020

    COVID-19 has opened a floodgate of “what-if” questions business executives must respond to; this article focuses on impact the pandemic is having on the planning and protocols of the manufacturing and distribution industry.

  • Business Continuity and Crisis Response: What Is Your Plan?

    Feb 7, 2020

    A discussion of the necessity for robust continuity and crisis response plans – reasons why, and steps to take.

  • CAPstone Webcast Series: Computing Security

    Jun 9, 2020

    This content features a recap of the discussion from EisnerAmper’s (CAP)Stone series webcast titled “Cyber Action Plan – Computing Security,” including topics based on working from home and recognizing trouble spots.

  • CAPstone Webcast Series: Disaster Recovery/Business Continuity with Cloud Security

    May 28, 2020

    This content features a recap of the discussion from EisnerAmper’s (CAP)Stone series webcast titled “Disaster Recovery/Business Continuity with Cloud Security.”

  • California Dreaming or Nightmare?

    Nov 15, 2018

    The world is focused on California as they raise the bar to protect an individual’s right to privacy. Many firms are struggling to understand their responsibilities under the new California rules under what has been called the “American GDPR.”

  • What To Do if an Enterprise Falls Victim to a Ransomware Attack

    Feb 22, 2021

    This article discusses steps an organization can take to minimize this risk of such an event, as well as a process to follow if a ransomware attack does occur.

  • Cybersecurity Is Everybody’s Problem

    Jan 26, 2021

    Cyberattacks have dramatically increased since the pandemic. Here is a list of the five most prevalent types of attacks and tips you can take to mitigate the threats.

  • CAPstone Webcast Series: Network Security Recap

    May 14, 2020

    The COVID-19 pandemic has mandated remote ‘work from home’ environments for many organizations. This article highlights a number of protocols companies can use to enhance network security, including ‘layered security.’

  • Should Your Family Office Be Concerned About Cybersecurity?

    Nov 19, 2020

    The first in a two-part series of articles focusing on cybersecurity threats to family offices and some of the steps to be taken to mitigate these threats.

  • 3 Cyber Trends in 2021

    Apr 13, 2021

    This article looks at three trends we see emerging for IT departments as they embrace the new geographic challenges of employees and newly formed attacks from cyber bad actors: work from anywhere, new systems, and user education.

  • CAPstone Webcast Series: Physical Security

    Jul 1, 2020

    The nation slowly loosens social distancing and businesses begin to allow workers to trickle back to offices; physical security is looking very different. Rahul Mahna and Glenn Adari of Panasonic discuss the importance of -- and dangers addressed by -- physical security.