“Bring your own device,” or “B.Y.O.D,” is a concept that an increasing number of companies are implementing. B.Y.O.D allows employees to use their personally-owned devices in the work place. These devices can range from laptops and tablets to cell phones and flash drives. While B.Y.O.D may be a good plan in theory – employees can work with devices they are comfortable using - It is important for employers to thoroughly consider the implications and potential pitfalls before implementing a B.Y.O.D policy. Consider, for example, the following key areas regarding the security of corporate information and infrastructure:
As accountants, we know the significance of numbers. But in the process of balancing our debits and credits, it is easy to forget the significance of words. Although it’s important to develop and maintain our skills in spreadsheets, calculations, and analysis, our writing skills are just as important.
There’s no denying it: social media has changed the way we interact with each other. People are tweeting live from events, “checking in” on Facebook, posting pictures to Instagram and commenting on, liking or sharing just about everything. The amount of personal information that social media users willingly put “out there” is staggering.
CPA’s have close relationships with their clients (especially in smaller accounting practices) and rightfully so. Who else is better to understand their client’s financial and business affairs than their trusted CPA? And the relationship generally remains close…
Employers, if you use QuickBooks for your company’s accounting needs, you have a built-in tool for fraud prevention and detection at no additional cost to you: the QuickBooks Audit Trail.
Increasingly, the answers to the most fundamental litigation questions – the “who, what, where, when, and why” – are contained in electronically stored information (ESI), which can be retrieved through electronic discovery (e-discovery) and/or computer forensics.
In our case study, gas station owner, Morris, has alleged that Green Fuel, a small gasoline distributor, overcharged him. Both parties had inadequate and unsophisticated documentation, making determining losses very difficult.
You might not think that a small business would have useful or accessible electronically stored information (ESI). Consider this example of identifying and obtaining relevant forensic evidence to determine lost profit damages with this particular small business.
Think twice before you assume that an unsophisticated small business cannot possibly have any useful or accessible electronically stored information (ESI).
Events may happen in a person's life that can lead to an act of desperation. And desperate people may take irrational actions.
I am talking about bad economic times, the failure of a business, the loss of a job, divorce, a family member on ...
Regardless of the time of year, employees will always have reasons to come and go in the office. Vacations, conferences and meetings are a regular part of most employees' daily schedules. So rather than worrying about the empty chair they ...
As we discussed in last week’s blog post, there can be more fraud during the holiday season for a variety of reasons. A few quick steps you can take to reduce your vulnerability to fraud include:
Be present – The perception of detection is ...