Workplace Culture in “the New Normal”

The COVID-19 pandemic has forced most of us into isolation and redefined “normal conditions” in both our personal and work lives. Most of us are not working from the office right now, which brings new challenges in keeping our work lives distinct from our personal lives. There is, of course, a natural overlap between work […]

Disbursements: Internal Controls in a Remote Environment

As tasks and routines are increasingly being completed remotely due to the COVID-19 emergency, there are some individuals looking to take advantage of the situation. One of the more common fraud schemes to emerge over the past two years, and one that will no doubt increase during this pandemic, is attempted fraud on ACH debits […]

Top 5 Reasons to Use Cloud-based Data Backup

Data loss often happens when you least expect it. Human error, malicious actors and even natural disasters can wipe out – or hijack – your company’s data at any time. Recent studies show that a staggering 93% of organizations that lose data because of a disaster go out of business within two years. Still, many […]

Not-for-profits and cybersecurity

We recently held a lunch and learn for nonprofits about why cybersecurity matters, and how to decrease cyber risk at their organization. Did you know cybersecurity spending will exceed $133 billion by 2022? This is just one of the many compelling stats Carly Devlin, cybersecurity expert, shared at our lunch and learn. Even if you […]

Proven Methods to Straighten Up Your Security Posture

Is it time to take another look at your security posture? Understanding the resources and strategies available to protect against modern attacks makes IT security less foe and more friend. In terms of strategies, IT audits are always a good place to start. As stressful as a data breach can be, however, an IT security […]

Overcoming Cybersecurity Obstacles Within Your Organization

It’s in the news nearly every week: another company falls victim to a security breach. From Equifax to Marriott to DoorDash, breaches are happening across industries and affecting millions of consumers. Retail, healthcare, financial services, and manufacturing industries are especially vulnerable, but smaller organizations like government municipalities and hospitals are also common targets. As someone with access to your organization’s most sensitive data, you have a responsibility to actively protect your customers and employees. We’ve seen […]

Top 5 Controls for Securing your Environment

Approximately 85% of cyberattacks can be prevented by implementing the Center for Internet Security (CIS) Top 5 Controls framework. The entire CIS Top 20 Controls framework helps organizations combat the most pervasive and dangerous cyberattacks, but the first five can help prevent a high percentage of those. The CIS Top 5 Controls include the following: […]

Cybersecurity Questions All Executives Should Be Asking

Cyber threats constantly evolve with increasing intensity and complexity; and the ability to achieve mission objectives and deliver business functions is becoming more reliant on information systems and the Internet. Organizations will face a host of cyber threats, some with severe impacts that will require security measures that extend beyond compliance. According to a 2019 […]

Fighting Cybercrime with Detection & Prevention

Cybercrime is surging amid the COVID-19 pandemic. Fortunately, our advisors have been helping clients protect their data for years. While we may be facing a new crisis, the foundation of cybersecurity remains the same. CSH presents this encore of our cybercrime webinar from Cybersecurity Awareness Month. Technology usage is commonplace in today’s business environment. Consequently, […]

6 tips for designing a data security plan

Over the past few years, there have been dozens of high-profile cyberattacks on major U.S. corporations. Cyber thieves have stolen sensitive customer and corporate information enabling them to hack into customers’ financial accounts and businesses’ computer systems to commit fraud and theft. Your dealership could present an especially attractive target for hackers because of the […]

Get in Touch.

What service are you looking for? We'll match you with an experienced advisor, who will help you find an effective and sustainable solution.

  • Hidden
  • This field is for validation purposes and should be left unchanged.