Search Results
8403 result(s) for
-
REIT Compliance Through Due Diligence of Strategic Acquisitions
Sep 18, 2024
As REITs look to grow their operations, one common form of expanding their investment mix is through the acquisition of real estate related assets. However, it is critical for REIT operators to perform proper due diligence prior to closing of an acquisition to ensure that no compliance issues will arise.
-
IRS Clarifies Student Loan Payment Matching Contributions for Employers
Sep 17, 2024
Learn how employers can offer matching contributions based on student loan payments under SECURE 2.0. Get insights from IRS guidance on eligibility, contribution limits, and administration for QSLP matching.
-
State Tax Impacts on Manufacturing & Distribution
Sep 24, 2024
Navigate the complex landscape of state taxes for manufacturers and distributors. Learn about nexus, apportionment, sales tax, and strategies to minimize your tax burden and maintain compliance with Wayfair and other recent regulations.
-
Data Privacy Exposure at Law Firms in the News – Are You at Risk?
Aug 9, 2018
How firms protect their data is becoming critical as hackers target more valuable information. This is particularly challenging for law firms involved in transactions of publicly traded companies but solutions are available for law firms of any size.
-
Four Reasons Why Passphrases Are Better Than Passwords
Sep 3, 2019
An information technology security update this month featuring the concept of using passphrases over passwords for better data security, malicious files being delivered via Microsoft OneDrive, and lessons you can learn from the recent Capital One data breach
-
California Dreaming or Nightmare?
Nov 15, 2018
The world is focused on California as they raise the bar to protect an individual’s right to privacy. Many firms are struggling to understand their responsibilities under the new California rules under what has been called the “American GDPR.”
-
CAPstone Webcast Series: Network Security Recap
May 14, 2020
The COVID-19 pandemic has mandated remote ‘work from home’ environments for many organizations. This article highlights a number of protocols companies can use to enhance network security, including ‘layered security.’
-
Hackers Are Dreaming About Manufacturers and Distributors
May 20, 2020
COVID-19 has opened a floodgate of “what-if” questions business executives must respond to; this article focuses on impact the pandemic is having on the planning and protocols of the manufacturing and distribution industry.
-
Business Continuity and Crisis Response: What Is Your Plan?
Feb 7, 2020
A discussion of the necessity for robust continuity and crisis response plans – reasons why, and steps to take.
-
CAPstone Webcast Series: Disaster Recovery/Business Continuity with Cloud Security
May 28, 2020
This content features a recap of the discussion from EisnerAmper’s (CAP)Stone series webcast titled “Disaster Recovery/Business Continuity with Cloud Security.”
-
What To Do if an Enterprise Falls Victim to a Ransomware Attack
Feb 22, 2021
This article discusses steps an organization can take to minimize this risk of such an event, as well as a process to follow if a ransomware attack does occur.
-
Cybersecurity Is Everybody’s Problem
Jan 26, 2021
Cyberattacks have dramatically increased since the pandemic. Here is a list of the five most prevalent types of attacks and tips you can take to mitigate the threats.
-
CAPstone Webcast Series: Computing Security
Jun 9, 2020
This content features a recap of the discussion from EisnerAmper’s (CAP)Stone series webcast titled “Cyber Action Plan – Computing Security,” including topics based on working from home and recognizing trouble spots.
-
Should Your Family Office Be Concerned About Cybersecurity?
Nov 19, 2020
The first in a two-part series of articles focusing on cybersecurity threats to family offices and some of the steps to be taken to mitigate these threats.
-
Apr 13, 2021
This article looks at three trends we see emerging for IT departments as they embrace the new geographic challenges of employees and newly formed attacks from cyber bad actors: work from anywhere, new systems, and user education.
-
CAPstone Webcast Series: Physical Security
Jul 1, 2020
The nation slowly loosens social distancing and businesses begin to allow workers to trickle back to offices; physical security is looking very different. Rahul Mahna and Glenn Adari of Panasonic discuss the importance of -- and dangers addressed by -- physical security.
-
Transitioning Cybersecurity Compliance from NIST 800-171
Jul 20, 2021
The Cybersecurity Maturity Model Certification (“CMMC”) will soon replace existing NIST 800-171 requirements, which means there are major security compliance changes of which you need to be aware.
-
Dark Web: The Basics of Cyber Attacks
Aug 26, 2021
This article takes a look at a breeding ground for cybercrime: the dark web, and how organizations can protect themselves.
-
California’s ESG/Climate Risk Reporting Requirements
Oct 9, 2024
Discover the latest updates to California’s climate disclosure laws with Senate Bill No. 219. Learn how the bill enhances SB 253 and SB 261 through mandating emission reports and climate- related financial risks.
-
Asset Management Intelligence - February 2015 - Cyber Security: A Brave New World
Feb 6, 2015
The SEC has proposed new regulations and provided guidance on what financial services firms can do to address cyber security threats. The SEC stated that advisory firms should adopt the NIST controls outlined in their Framework for Improving Critical Infrastructure Cybersecurity whitepaper.