Many accountants use social media for their business as a way to be present online where the like-minded linger. Social media can start and nurture conversations between you and clients, prospects, and other business partners.
Information security is a 24-7, year-round job. Failing to properly monitor and respond in real time to threats exposes organizations, clients, and business partners to risks that could do significant harm to their companies.
IMPORTANT ALERT: Computer security sites across the Internet lit up last week with the news that hackers are actively exploiting vulnerabilities in the ubiquitous Java software that resides on many computers.
In his forward-thinking book "Technopoly: The Surrender of Culture to Technology," the late Dr. Neil Postman of New York University observed that the introduction of the automobile at the start of the twentieth century had a dramatic impact on society.
Cybersecurity experts at Deloitte are warning that when it comes to cyberattacks, it's not a question of "if" but "when." A new study shows 88 percent of technology, media, and telecommunications companies don't think they're vulnerable.
Internet-based tools have become so varied and easy to use that almost all firms can take advantage of them to build a professional presence using their websites, e-mail, social media, blogs, videos, and SEO.
High Impact Excel: Pivot Table Edition
Following up on the success of his popular High Impact Excel session, this time around David H. Ringstrom, CPA turns his attention to pivot tables. In one hour you'll learn how to whip unwieldy data into shape, and then quickly build meaningful reports by dragging and dropping with your mouse. David will also discuss techniques for improving pivot table data integrity. Detailed handouts with numbered steps will be provided for a variety of Excel versions.