Blog Placeholder Image

Understanding SOC Reporting: A Beginner’s Guide

Written by Corbin Parker, CISA, Abacus Technologies Organizations are increasingly relying on third parties to handle financial transactions, customer data, and IT services. This reliance introduces the need for trust

Read More

Cybersecurity Protects Profits

By Jonathan Perz, Senior Security Analyst, Abacus Technologies Rarely do companies get to see the actual bottom-line value of cybersecurity. It always manifests as a cost or expense on the

Read More

IRS Announces Transition Away from Use of Third-party Verification Involving Facial Recognition

In our Beyond the Bottom Line Newsletter dated January 12, 2022, we described the updated identity verification and sign-in process for several IRS online tools. As they say about not

Read More

Cybercrime & Fidelity Bonds: Protecting Your Business

Written by Johnny Prewitt, The Prewitt Group Along with the wonderful advantages and conveniences technology has provided for us, unfortunately there also exists a dark side that comes along with

Read More

Local Firm. National Knowledge. Global Reach.

Get In Touch