{"id":111722,"date":"2023-05-30t11:58:10","date_gmt":"2023-05-30t15:58:10","guid":{"rendered":"\/\/www.g005e.com\/?p=111722"},"modified":"2024-08-27t17:02:17","modified_gmt":"2024-08-27t21:02:17","slug":"make-cybersecurity-a-client-service-option","status":"publish","type":"post","link":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/","title":{"rendered":"make cybersecurity a client service option"},"content":{"rendered":"

\"illustration<\/a>check your own system first, then help others.<\/strong><\/p>\n

by penny breslin<\/i>
\n
it\u2019s not just the numbers<\/i><\/a><\/p>\n

in 2020, like many businesses, we went remote. my remote team of excellent ladies in chennai, india, had to go even more remote than they already were. when india shut down, i figured i was out of business. we promise our cybersecurity is job number one to our accounting and financial firms. we have a highly controlled work environment, except for the day care and under 3\u2019s occasionally looking for mum. i did not think sending our employees home would work.<\/p>\n

more: <\/b>how to safeguard client information<\/a> | how to create effective communication systems<\/a> | set expectations with an anticipatory set<\/a> | four steps for controlling source documents<\/a> | how to use onenote to create a firm playbook<\/a> | how to develop procedures for bos<\/a> | top tech tools for building your new bos business<\/a>
\n\"goprocpa.com\"exclusively for pro members. <\/span><\/strong>
log in here<\/a> or 2022世界杯足球排名 today<\/a>.<\/span><\/p><\/blockquote>\n

but thank the universe, many of our clients had no problem as long as we could figure out the security. they had been working with the same team of ladies. they saw them on zoom and communicated daily on slack. so, in 48 hours we went through an internal change to allow that to happen.
\n
\nbut what of our security?\u00a0 did i do it correctly?\u00a0 was everyone going to be as safe from the standpoint of data as we were making them safe from covid-19?\u00a0 i had faith in my long-term relationship with our hosting company, coaxis, but this was something i needed to have checked from one end to another and coaxis was just part of the whole.<\/p>\n

we hired rush tech for a third-party test of our systems, process and procedures for keeping client data safe. whew, we passed and coaxis got a aaa rating from rush tech. getting our office opened back up has been nice but those months in the late winter, spring and summer of 2020, well, we made it. thank you rush tech, coaxis and our clients.<\/p>\n

i wondered how many of the clients \u2013 whose data we made sure was secure \u2013 were secure themselves. that led to many conversations with our own firm clients. and in turn they with their clients. another service offering that was helpful and timely for the small business owner.<\/p>\n

here are some of the salient points my friend andrew lassise at tech 4 accountants<\/a> has graciously offered. he and tech 4 accountants have been named one of the top 100 value-added resellers by accounting today and is a member of the aicpa.<\/p>\n

cybersecurity<\/h3>\n

by andrew lassise, chief dorkestrator at tech 4 accountants<\/em><\/p>\n

\u201chacking\u201d once started out as a sport among nerds. it was just a badge of honor and a way to show who could get into things they weren\u2019t supposed to. it wasn\u2019t used for nefarious reasons; it was just nerds being nerds. fast forward to this day and age, and cybercrime is projected to have $6 trillion in damages by 2021.<\/p>\n

\"portrait<\/a>
lassise<\/figcaption><\/figure>\n

the main targets of cybercrime are those who handle financial information: accountants, banks and people in the financial industry. once they have infiltrated the system, it is open season for whatever information they want from whomever they want. the information found on a 1040 alone is enough to open bank accounts and credit cards, and commit identity theft, and that is what they are after.<\/p>\n

so often when rush tech does it audits for accountants, we see instances of people having way too much access for their job and not enough barriers to protect financial data. there have been times where we type in the search box \u201cpasswords\u201d and can immediately have access to a word document without password protection giving access to every location in the company and their clients\u2019 data. there are tons of free password managers, like lastpass, which will manage the data for you in a central secured spot. you can then set up a fort knox security on that one single spot to make sure that everything is protected instead of trying to remember where everything is.<\/p>\n

another way around this, for the less tech-savvy, is simply using a cryptic name for your passwords document. simply changing the name to any non-identifying word makes accessing the sensitive information that much better. so instead of \u201cpasswords\u201d or \u201cpws\u201d or some variation, use something bland that you\u2019ll remember like \u201carticles from 2015\u201d where nobody would actually guess that the contents of the document is something of interest. be sure to password-protect that document, regardless of the naming convention. security by obscurity is not a silver bullet.<\/p>\n

we also see a lot of the network equipment using default passwords that one can simply google \u201cnetgear default login\u201d and the snippet will actually give access to the company\u2019s internet. from here, you can change passwords, open ports and put the company in a really bad spot. you could also simply turn off the internet, and there are very few companies that can operate without the internet being on. most troubleshooting steps would also miss this as it would require someone willingly turning it off.<\/p>\n

one of the easiest things to do is to change the password on the networking equipment and not use default logins when possible. so instead of user \u201cadmin\u201d with password \u201cpassword,\u201d you use user alassise (the name of your network administrator) and a strong password like getout0fhere12#@ and disable the admin\/password original login so nobody can get access.<\/p>\n

covid-19 and the work-from-home movement has made the mobile workforce a normal part of most businesses\u2019 infrastructure. where in the past, a company could get away with having an on-premises server and the computers in the office would be on lockdown, we are in a new era. with an ever-increasing number of saas products, many people think that having a strong password and a personal computer is adequate protection because <saas vendor> handles all the security and we just use the platform, which is not accurate.<\/p>\n

security awareness training is paramount these days. the best defense is the knowledge to not get tricked by the bad guys and knowing what methods are used to get your passwords. if an employee opens a phishing email, and gets their passwords stolen, or if they reuse a password that appears on the dark web in your company, you now have put the entire database in jeopardy. with the simple policy of \u201ctrust nobody unless i asked for it,\u201d accounting firms can avoid some of the issues that have happened in the past few years.<\/p>\n

set up a virtual office instead of individual logins to saas products<\/strong><\/p>\n

this begs the question of company-owned or employee-owned computers, which is better? the answer is \u2013 it depends. if your work force already has computers that are sufficient in power, then it may make sense to let them use a personal computer that can remote into a virtual office. this way, your company doesn\u2019t depend on the employee taking care of your equipment and you can make sure that they have the proper access and restrictions. this is very different from letting them log into saas products on their own computers, which is a disaster waiting to happen. setting up cloud offices and virtual environments is a common practice these days and a great way to not have to hunt down employee devices, ship out, reconfigure and maintain an effective mobile workforce.<\/p>\n

this strategy also scales very well because you can effectively \u201ccopy \/ paste\u201d the startup configuration from an employee’s computer and not have to reinvent the wheel every time you hire someone new. the new employee simply logs into the computer you want them to have and you\u2019re good to go. this saves hours of administrative and tech time and ensures that the proper protection and protocol is on every single computer, without an endless checklist or trying to remember what every computer needs.<\/p>\n

this strategy also works in the reverse, as many firms are seasonal, so owning 20 computers when only 10 get used for most of the year isn\u2019t necessary anymore. with cloud infrastructure, an organization can change computers from capital expenditures to operational expenditures and get billed similar to electricity, so you pay for what you use. then when you need to downsize after busy season, you don\u2019t have wasted expenses on computers that were only used for a few months; your usage goes down, and so does your bill.<\/p>\n

this also makes firing employees and removing access literally the click of a button. if they need to log in to the cloud server in order to access all client data, and you suspend that account \u2013 the end. there isn\u2019t the lingering fear of what if they do <insert malicious thing> because they can\u2019t. gone are the days of removing every single account and having to remember who has access to what, it\u2019s just one spot to turn off \u2013 and access is gone!<\/p>\n

a holistic approach is best<\/strong><\/p>\n

when it comes to products around cybersecurity, there isn\u2019t a \u201cbuy this and you\u2019re safe forever\u201d solution. it needs to be a holistic approach. at a minimum, you need employee awareness training, restricted permissions on an as-needed basis, antivirus, vpn, complex passwords, two-factor authentication and encryption. that is just scratching the surface.<\/p>\n

working with a company that understands and puts cybersecurity into a whole package is always going to be the best route for small business owners. with the data breaches happening every single day and the millions of dollars in lawsuits, fines and penalties being dished out, now it is more important than ever to make sure that your company has the proper protection. just because you haven\u2019t been hacked or had a data breach yet<\/strong> doesn\u2019t mean you are immune; it just means you are lucky.<\/p>\n

besides the obvious threats of viruses, malware and the like, many do not know how to tell if they have had a data breach because they aren\u2019t involved in technology. it\u2019s like asking a plumber to audit his tax return for any discrepancies; while he may be familiar with what is happening, he will not know the nuances that an expert would recognize. this lack of understanding may end up costing him his entire business if taxes are done incorrectly. same goes with cybersecurity, if it is done incorrectly, you will only find out after it is too late!<\/p>\n

data breaches can set off a chain reaction<\/strong><\/p>\n

a cpa firm in ny had a data breach. one of their clients was a medical center that got hacked as well through the cpa firm, which resulted in exposure of confidential patient information. the patients of the medical center filed a class action lawsuit against the cpa firm that had the initial data breach, not the medical center. unfortunately, what people miss in this story is that the cpa firm was a victim. that firm lost tons of revenue and reputation as a result of being a victim of a cybercrime.<\/p>\n

bundle cybersecurity with your services<\/strong><\/p>\n

firms can add to their portfolio products that ensure cybersecurity for their clients as well. they can use products like shared encrypted portals instead of using regular email. they can use multifactor authentication to make sure that even if a reused password appears on the dark web, the hacker can\u2019t get into someone\u2019s financials because it has an extra layer of protection. having extra security like this can be bundled in as part of your package. this lets your clients know that you take cybersecurity seriously and that it isn\u2019t just smoke and mirrors.<\/p>\n

one bad email is all it takes<\/strong><\/p>\n

you do not want to ever be in a position where it is convenient for someone to hack you. many cybercriminals are looking for low-hanging fruit, and a phishing email, just like the name implies, is similar to fishing in a lake. the fisherman puts bait on the line, drops it in the water and waits for a bite. the phishing campaign is also sent to the masses and waits for a bite. it can appear to be from a fortune 500 or from a solopreneur. simply clicking a bad link is enough for the bad guys to do serious damage \u2013 damage that no antivirus, firewall or any sort of software can protect against because the human is the one electing to perform these actions. once they are in, there can be a ransom put on your information. municipalities have ended up paying hundreds of thousands of dollars to get their data decrypted.<\/p>\n","protected":false},"excerpt":{"rendered":"

check your own system first, then help others.<\/strong>
\n
\"\"<\/a>
\nby penny breslin<\/i>
\n
it\u2019s not just the numbers<\/i><\/a><\/p>\n","protected":false},"author":4581,"featured_media":98562,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[3184,3120,3002,2306],"tags":[3084,3085,3089],"class_list":["post-111722","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advisory","category-pro-member-exclusive","category-special","category-tech-and-fintech","tag-coronavirus","tag-covid-19","tag-wfh"],"acf":[],"yoast_head":"\nmake cybersecurity a client service option - 卡塔尔世界杯常规比赛时间<\/title>\n<meta name=\"description\" content=\"actionable intelligence for tax, accounting, and financial professionals\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/\" \/>\n<meta property=\"og:locale\" content=\"en_us\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"make cybersecurity a client service option - 卡塔尔世界杯常规比赛时间\" \/>\n<meta property=\"og:description\" content=\"actionable intelligence for tax, accounting, and financial professionals\" \/>\n<meta property=\"og:url\" content=\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/\" \/>\n<meta property=\"og:site_name\" content=\"卡塔尔世界杯常规比赛时间\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cpatrendlines\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-30t15:58:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-27t21:02:17+00:00\" \/>\n<meta property=\"og:image\" content=\"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273.png\" \/>\n\t<meta property=\"og:image:width\" content=\"677\" \/>\n\t<meta property=\"og:image:height\" content=\"787\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"penny breslin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cpa_trendlines\" \/>\n<meta name=\"twitter:site\" content=\"@cpa_trendlines\" \/>\n<meta name=\"twitter:label1\" content=\"written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"penny breslin\" \/>\n\t<meta name=\"twitter:label2\" content=\"est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"article\",\"@id\":\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#article\",\"ispartof\":{\"@id\":\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/\"},\"author\":{\"name\":\"penny breslin\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/9e32c6275908c527f050fb8067e37699\"},\"headline\":\"make cybersecurity a client service option\",\"datepublished\":\"2023-05-30t15:58:10+00:00\",\"datemodified\":\"2024-08-27t21:02:17+00:00\",\"mainentityofpage\":{\"@id\":\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/\"},\"wordcount\":2122,\"commentcount\":0,\"publisher\":{\"@id\":\"\/\/www.g005e.com\/#organization\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#primaryimage\"},\"thumbnailurl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273.png\",\"keywords\":[\"coronavirus\",\"covid-19\",\"wfh\"],\"articlesection\":[\"advisory & consulting\",\"pro member exclusive\",\"special\",\"tech and fintech\"],\"inlanguage\":\"en-us\",\"potentialaction\":[{\"@type\":\"commentaction\",\"name\":\"comment\",\"target\":[\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#respond\"]}]},{\"@type\":\"webpage\",\"@id\":\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/\",\"url\":\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/\",\"name\":\"make cybersecurity a client service option - 卡塔尔世界杯常规比赛时间\",\"ispartof\":{\"@id\":\"\/\/www.g005e.com\/#website\"},\"primaryimageofpage\":{\"@id\":\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#primaryimage\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#primaryimage\"},\"thumbnailurl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273.png\",\"datepublished\":\"2023-05-30t15:58:10+00:00\",\"datemodified\":\"2024-08-27t21:02:17+00:00\",\"description\":\"actionable intelligence for tax, accounting, and financial professionals\",\"breadcrumb\":{\"@id\":\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#breadcrumb\"},\"inlanguage\":\"en-us\",\"potentialaction\":[{\"@type\":\"readaction\",\"target\":[\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/\"]}]},{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#primaryimage\",\"url\":\"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273.png\",\"contenturl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273.png\",\"width\":677,\"height\":787,\"caption\":\"breslin\"},{\"@type\":\"breadcrumblist\",\"@id\":\"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#breadcrumb\",\"itemlistelement\":[{\"@type\":\"listitem\",\"position\":1,\"name\":\"home\",\"item\":\"\/\/www.g005e.com\/\"},{\"@type\":\"listitem\",\"position\":2,\"name\":\"tech and fintech\",\"item\":\"\/\/www.g005e.com\/category\/tech-and-fintech\/\"},{\"@type\":\"listitem\",\"position\":3,\"name\":\"make cybersecurity a client service option\"}]},{\"@type\":\"website\",\"@id\":\"\/\/www.g005e.com\/#website\",\"url\":\"\/\/www.g005e.com\/\",\"name\":\"卡塔尔世界杯常规比赛时间\",\"description\":\"actionable intelligence for the tax, accounting and finance community\",\"publisher\":{\"@id\":\"\/\/www.g005e.com\/#organization\"},\"potentialaction\":[{\"@type\":\"searchaction\",\"target\":{\"@type\":\"entrypoint\",\"urltemplate\":\"\/\/www.g005e.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"propertyvaluespecification\",\"valuerequired\":true,\"valuename\":\"search_term_string\"}}],\"inlanguage\":\"en-us\"},{\"@type\":\"organization\",\"@id\":\"\/\/www.g005e.com\/#organization\",\"name\":\"卡塔尔世界杯常规比赛时间 research\",\"alternatename\":\"cpatrendlines\",\"url\":\"\/\/www.g005e.com\/\",\"logo\":{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg\",\"width\":1600,\"height\":350,\"caption\":\"卡塔尔世界杯常规比赛时间 research\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/#\/schema\/logo\/image\/\"},\"sameas\":[\"https:\/\/www.facebook.com\/cpatrendlines\",\"https:\/\/x.com\/cpa_trendlines\",\"https:\/\/www.linkedin.com\/groups\/115382\/\",\"https:\/\/www.youtube.com\/cpatrendlines\"]},{\"@type\":\"person\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/9e32c6275908c527f050fb8067e37699\",\"name\":\"penny breslin\",\"image\":{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/image\/\",\"url\":\"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273-96x96.png\",\"contenturl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273-96x96.png\",\"caption\":\"penny breslin\"},\"description\":\"penny breslin is co-author with damien greathead of it's not just the numbers, published by 卡塔尔世界杯常规比赛时间. she is the founder of moneypenny, a consulting firm specializing in helping accounting firms and other businesses embrace the power of technology to simplify their operations and increase their profit margins.\",\"url\":\"\/\/www.g005e.com\/author\/penny-breslin\/\"}]}<\/script>\n<!-- \/ yoast seo plugin. -->","yoast_head_json":{"title":"make cybersecurity a client service option - 卡塔尔世界杯常规比赛时间","description":"actionable intelligence for tax, accounting, and financial professionals","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/","og_locale":"en_us","og_type":"article","og_title":"make cybersecurity a client service option - 卡塔尔世界杯常规比赛时间","og_description":"actionable intelligence for tax, accounting, and financial professionals","og_url":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/","og_site_name":"卡塔尔世界杯常规比赛时间","article_publisher":"https:\/\/www.facebook.com\/cpatrendlines","article_published_time":"2023-05-30t15:58:10+00:00","article_modified_time":"2024-08-27t21:02:17+00:00","og_image":[{"width":677,"height":787,"url":"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273.png","type":"image\/png"}],"author":"penny breslin","twitter_card":"summary_large_image","twitter_creator":"@cpa_trendlines","twitter_site":"@cpa_trendlines","twitter_misc":{"written by":"penny breslin","est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"article","@id":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#article","ispartof":{"@id":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/"},"author":{"name":"penny breslin","@id":"\/\/www.g005e.com\/#\/schema\/person\/9e32c6275908c527f050fb8067e37699"},"headline":"make cybersecurity a client service option","datepublished":"2023-05-30t15:58:10+00:00","datemodified":"2024-08-27t21:02:17+00:00","mainentityofpage":{"@id":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/"},"wordcount":2122,"commentcount":0,"publisher":{"@id":"\/\/www.g005e.com\/#organization"},"image":{"@id":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#primaryimage"},"thumbnailurl":"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273.png","keywords":["coronavirus","covid-19","wfh"],"articlesection":["advisory & consulting","pro member exclusive","special","tech and fintech"],"inlanguage":"en-us","potentialaction":[{"@type":"commentaction","name":"comment","target":["\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#respond"]}]},{"@type":"webpage","@id":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/","url":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/","name":"make cybersecurity a client service option - 卡塔尔世界杯常规比赛时间","ispartof":{"@id":"\/\/www.g005e.com\/#website"},"primaryimageofpage":{"@id":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#primaryimage"},"image":{"@id":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#primaryimage"},"thumbnailurl":"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273.png","datepublished":"2023-05-30t15:58:10+00:00","datemodified":"2024-08-27t21:02:17+00:00","description":"actionable intelligence for tax, accounting, and financial professionals","breadcrumb":{"@id":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#breadcrumb"},"inlanguage":"en-us","potentialaction":[{"@type":"readaction","target":["\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/"]}]},{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#primaryimage","url":"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273.png","contenturl":"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273.png","width":677,"height":787,"caption":"breslin"},{"@type":"breadcrumblist","@id":"\/\/www.g005e.com\/2023\/05\/30\/make-cybersecurity-a-client-service-option\/#breadcrumb","itemlistelement":[{"@type":"listitem","position":1,"name":"home","item":"\/\/www.g005e.com\/"},{"@type":"listitem","position":2,"name":"tech and fintech","item":"\/\/www.g005e.com\/category\/tech-and-fintech\/"},{"@type":"listitem","position":3,"name":"make cybersecurity a client service option"}]},{"@type":"website","@id":"\/\/www.g005e.com\/#website","url":"\/\/www.g005e.com\/","name":"卡塔尔世界杯常规比赛时间","description":"actionable intelligence for the tax, accounting and finance community","publisher":{"@id":"\/\/www.g005e.com\/#organization"},"potentialaction":[{"@type":"searchaction","target":{"@type":"entrypoint","urltemplate":"\/\/www.g005e.com\/?s={search_term_string}"},"query-input":{"@type":"propertyvaluespecification","valuerequired":true,"valuename":"search_term_string"}}],"inlanguage":"en-us"},{"@type":"organization","@id":"\/\/www.g005e.com\/#organization","name":"卡塔尔世界杯常规比赛时间 research","alternatename":"cpatrendlines","url":"\/\/www.g005e.com\/","logo":{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/#\/schema\/logo\/image\/","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg","width":1600,"height":350,"caption":"卡塔尔世界杯常规比赛时间 research"},"image":{"@id":"\/\/www.g005e.com\/#\/schema\/logo\/image\/"},"sameas":["https:\/\/www.facebook.com\/cpatrendlines","https:\/\/x.com\/cpa_trendlines","https:\/\/www.linkedin.com\/groups\/115382\/","https:\/\/www.youtube.com\/cpatrendlines"]},{"@type":"person","@id":"\/\/www.g005e.com\/#\/schema\/person\/9e32c6275908c527f050fb8067e37699","name":"penny breslin","image":{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/#\/schema\/person\/image\/","url":"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273-96x96.png","contenturl":"\/\/www.g005e.com\/wp-content\/uploads\/2022\/06\/pb_2021-09-10-e1668819345273-96x96.png","caption":"penny breslin"},"description":"penny breslin is co-author with damien greathead of it's not just the numbers, published by 卡塔尔世界杯常规比赛时间. she is the founder of moneypenny, a consulting firm specializing in helping accounting firms and other businesses embrace the power of technology to simplify their operations and increase their profit margins.","url":"\/\/www.g005e.com\/author\/penny-breslin\/"}]}},"_links":{"self":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/111722","targethints":{"allow":["get"]}}],"collection":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/users\/4581"}],"replies":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/comments?post=111722"}],"version-history":[{"count":7,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/111722\/revisions"}],"predecessor-version":[{"id":111998,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/111722\/revisions\/111998"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/media\/98562"}],"wp:attachment":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/media?parent=111722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/categories?post=111722"},{"taxonomy":"post_tag","embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/tags?post=111722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}