{"id":112247,"date":"2023-07-23t09:15:09","date_gmt":"2023-07-23t13:15:09","guid":{"rendered":"\/\/www.g005e.com\/?p=112247"},"modified":"2024-08-27t17:01:51","modified_gmt":"2024-08-27t21:01:51","slug":"hy-tax-practitioners-became-cybersecurity-risks","status":"publish","type":"post","link":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/","title":{"rendered":"how tax practitioners became cybersecurity risks"},"content":{"rendered":"

tax professionals are a hacker’s dream. \"\"\u00a0<\/strong><\/p>\n

by donny shimamoto, cpa, citp, cgma<\/em>
\non cybersecurity for accountants<\/em><\/a>
\n
center for accounting transformation<\/em><\/a><\/p>\n

in 2015 the u.s. internal revenue service (irs) held its first security summit[i]<\/a>. by creating a public-private partnership via the summit, the irs is seeking to protect more taxpayers and more tax dollars from tax-related identity theft.<\/p>\n

more:\u00a0<\/strong>how hacker-proof is your firm?<\/a> |\u00a0donny shimamoto: future firm growth requires a mindshift<\/a>\u00a0|\u00a0ai, ocr, nlp & cpas: oh my!<\/a> \u00a0\u00a0| \u00a0accounting nerds, unlock your super powers<\/a> \u00a0| early adopters gain an edge in audit<\/a> | dustin wheeler: for serious cas success, hire tech teams<\/a> | csr for cpas: the missing ingredient<\/a> | donny shimamoto explains how ‘agile’ applies to cpa firms<\/a> |\u00a0 staff retention for remote workers<\/a> | why the future is in risk advisory<\/a> | \u00a0ready for non-cpa “cpa” firms?<\/a>
\n\"goprocpa.com\"\u00a0exclusively for pro members.\u00a0
log in here<\/a>\u00a0or\u00a02022世界杯足球排名 today<\/a>.<\/p><\/blockquote>\n

partners in the summit included the irs, state tax agencies and the private sector tax industry\u2014for example, financial institutions, cybersecurity practitioners and tax practitioners.<\/p>\n

the summit brought together people from the full value chain of tax compliance. taxpayers submit information to tax practitioners, who prepare the returns and submit them to the tax authorities.<\/p>\n

<\/p>\n

the tax authorities process the returns and pay out refunds, as appropriate, via the financial institutions. the financial institutions deliver the funds to the taxpayer completing the chain. cybersecurity practitioners and solution providers help protect the entire value chain, whether it be personal cybersecurity software (e.g., antivirus for mobile phones or other personal devices), defining cybersecurity standards and practices for the businesses or governmental agencies involved, and providing the cybersecurity intelligence and software to protect these entities from the threats. by working together in a coordinated fashion, we should be able to better identify the gaps in the value chain that fraudsters are taking advantage of and fill the gaps from both sides.<\/p>\n

remember that cybersecurity is only as effective as its weakest link. we often focus on the links within our own organization. but it takes a consortium, like the summit partners, to strengthen the links among organizations and further reduce the risk for all.<\/p>\n

initially, taxpayers were the target.
\n<\/strong>in the early years of the summit, most of the risk that was seen was directed at taxpayers themselves. an example of this that we\u2019re hearing is still going around, is an email telling taxpayers their refund is ready, but the irs needs their bank account information verified to send out their payment. the taxpayer is instructed to click on a link that takes them to a website that looks like an official irs website and prompts them to enter their bank routing and account numbers. once the taxpayer does this, they receive a confirmation that their refund will be processed. instead, the fraudsters use the bank information to pull money from the taxpayer\u2019s bank account.<\/p>\n

the threat quickly shifted to tax practitioners.
\n<\/strong>in 2017, fraudsters changed their tactics and started targeting tax practitioners, stealing their clients\u2019 tax information and the preparers\u2019 own efin numbers.<\/p>\n

in an evolution of the first tactic described above, fraudsters would submit a fraudulent return and have the refund deposited into the bank account of a taxpayer whose bank account they already knew. then they would send an email from a supposed debt collector telling the taxpayer that a tax refund was incorrectly deposited to their bank account ending in the last four digits of a person\u2019s bank account and that they had to forward the money lest they become liable for the money. the taxpayer would check their bank account, see that the funds were indeed there and that it didn\u2019t match their tax refund amount, so they would comply with the fraudster sending them the money. using this scheme, the number of potential taxpayer victims jumped from a few hundred to several thousand in just days.[ii]<\/a><\/p>\n

your gut reaction may be, \u201cthat\u2019s truly sad for the taxpayer, but it doesn\u2019t really affect me.\u201d well, if that taxpayer was your client, it does impact you because if the fraudster got the refund issued by submitting a false return, then you\u2019ll have to fix it for your client. you\u2019ll usually only find out about the issue when you try to submit the real return, and it gets rejected, saying that a return has already been filed and the refund has been paid out.<\/p>\n

so how does the fraudster get the taxpayer information in the first place? by stealing information from tax firms.<\/p>\n

during a december 2020 cybersecurity panel for the washington society of cpas that i moderated, irs representative, matthew gamble, senior tax analyst for the rics business performance lab, shared how this worked. fraudsters would steal the client list, and information from a tax practitioner and also potentially steal the preparer\u2019s efin. then they submit fraudulent returns for the clients under another tax practitioner\u2019s efin so that the true preparer isn\u2019t alerted to any issues until they try to file a return. because the fraudulent return isn\u2019t tied to their efin, it makes it difficult for them to obtain information about the return, buying the fraudster more time to stay undetected.<\/p>\n

make no mistake, even if the money was stolen from taxpayers, the tax preparer is in just as much jeopardy. having the right cybersecurity measures in place is, therefore, that much more critical.<\/p>\n

 <\/p>\n

[i]<\/a> ir-2018-27, february 13, 2018\u00a0 |\u00a0 <\/em><\/span>[ii]<\/a> ir-2019-66, april 8, 2019, https:\/\/www.irs.gov\/newsroom\/irs-security-summit-partners-mark-significant-progress-against-identity-theft-key-taxpayer-protection-trends-continue<\/em><\/span><\/h6>\n","protected":false},"excerpt":{"rendered":"

taxpayers were the initial targets, but tax practitioners quickly became a hacker’s dream.\u00a0<\/strong>
\n
\"\"<\/a>
\nby donny shimamoto
\ncyber security for accountants
\nthe center for accounting transformation<\/em><\/p>\n","protected":false},"author":1382,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[3120,3002,1906,2246,2306],"tags":[3652],"class_list":["post-112247","post","type-post","status-publish","format-standard","hentry","category-pro-member-exclusive","category-special","category-tax-practice","category-busy-season","category-tech-and-fintech","tag-cybersecurity"],"acf":[],"yoast_head":"\nhow tax practitioners became cybersecurity risks - 卡塔尔世界杯常规比赛时间<\/title>\n<meta name=\"description\" content=\"actionable intelligence for tax, accounting, and financial professionals\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_us\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"how tax practitioners became cybersecurity risks - 卡塔尔世界杯常规比赛时间\" \/>\n<meta property=\"og:description\" content=\"actionable intelligence for tax, accounting, and financial professionals\" \/>\n<meta property=\"og:url\" content=\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"卡塔尔世界杯常规比赛时间\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cpatrendlines\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/donnyitk\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-23t13:15:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-27t21:01:51+00:00\" \/>\n<meta property=\"og:image\" content=\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/06\/hackedsmall_adobestock_159926885.jpg\" \/>\n<meta name=\"author\" content=\"donny shimamoto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cpa_trendlines\" \/>\n<meta name=\"twitter:site\" content=\"@cpa_trendlines\" \/>\n<meta name=\"twitter:label1\" content=\"written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"donny shimamoto\" \/>\n\t<meta name=\"twitter:label2\" content=\"est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"article\",\"@id\":\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#article\",\"ispartof\":{\"@id\":\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/\"},\"author\":{\"name\":\"donny shimamoto\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff\"},\"headline\":\"how tax practitioners became cybersecurity risks\",\"datepublished\":\"2023-07-23t13:15:09+00:00\",\"datemodified\":\"2024-08-27t21:01:51+00:00\",\"mainentityofpage\":{\"@id\":\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/\"},\"wordcount\":925,\"commentcount\":0,\"publisher\":{\"@id\":\"\/\/www.g005e.com\/#organization\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#primaryimage\"},\"thumbnailurl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/06\/hackedsmall_adobestock_159926885.jpg\",\"keywords\":[\"cybersecurity\"],\"articlesection\":[\"pro member exclusive\",\"special\",\"tax practice\",\"tax season\",\"tech and fintech\"],\"inlanguage\":\"en-us\",\"potentialaction\":[{\"@type\":\"commentaction\",\"name\":\"comment\",\"target\":[\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#respond\"]}]},{\"@type\":\"webpage\",\"@id\":\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/\",\"url\":\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/\",\"name\":\"how tax practitioners became cybersecurity risks - 卡塔尔世界杯常规比赛时间\",\"ispartof\":{\"@id\":\"\/\/www.g005e.com\/#website\"},\"primaryimageofpage\":{\"@id\":\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#primaryimage\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#primaryimage\"},\"thumbnailurl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/06\/hackedsmall_adobestock_159926885.jpg\",\"datepublished\":\"2023-07-23t13:15:09+00:00\",\"datemodified\":\"2024-08-27t21:01:51+00:00\",\"description\":\"actionable intelligence for tax, accounting, and financial professionals\",\"breadcrumb\":{\"@id\":\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#breadcrumb\"},\"inlanguage\":\"en-us\",\"potentialaction\":[{\"@type\":\"readaction\",\"target\":[\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/\"]}]},{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#primaryimage\",\"url\":\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/06\/hackedsmall_adobestock_159926885.jpg\",\"contenturl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/06\/hackedsmall_adobestock_159926885.jpg\",\"width\":1600,\"height\":1067},{\"@type\":\"breadcrumblist\",\"@id\":\"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#breadcrumb\",\"itemlistelement\":[{\"@type\":\"listitem\",\"position\":1,\"name\":\"home\",\"item\":\"\/\/www.g005e.com\/\"},{\"@type\":\"listitem\",\"position\":2,\"name\":\"tech and fintech\",\"item\":\"\/\/www.g005e.com\/category\/tech-and-fintech\/\"},{\"@type\":\"listitem\",\"position\":3,\"name\":\"how tax practitioners became cybersecurity risks\"}]},{\"@type\":\"website\",\"@id\":\"\/\/www.g005e.com\/#website\",\"url\":\"\/\/www.g005e.com\/\",\"name\":\"卡塔尔世界杯常规比赛时间\",\"description\":\"actionable intelligence for the tax, accounting and finance community\",\"publisher\":{\"@id\":\"\/\/www.g005e.com\/#organization\"},\"potentialaction\":[{\"@type\":\"searchaction\",\"target\":{\"@type\":\"entrypoint\",\"urltemplate\":\"\/\/www.g005e.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"propertyvaluespecification\",\"valuerequired\":true,\"valuename\":\"search_term_string\"}}],\"inlanguage\":\"en-us\"},{\"@type\":\"organization\",\"@id\":\"\/\/www.g005e.com\/#organization\",\"name\":\"卡塔尔世界杯常规比赛时间 research\",\"alternatename\":\"cpatrendlines\",\"url\":\"\/\/www.g005e.com\/\",\"logo\":{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg\",\"width\":1600,\"height\":350,\"caption\":\"卡塔尔世界杯常规比赛时间 research\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/#\/schema\/logo\/image\/\"},\"sameas\":[\"https:\/\/www.facebook.com\/cpatrendlines\",\"https:\/\/x.com\/cpa_trendlines\",\"https:\/\/www.linkedin.com\/groups\/115382\/\",\"https:\/\/www.youtube.com\/cpatrendlines\"]},{\"@type\":\"person\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff\",\"name\":\"donny shimamoto\",\"image\":{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png\",\"caption\":\"donny shimamoto\"},\"description\":\"donny c. shimamoto, cpa.citp, cgma, is the founder and managing director of intraprisetechknowlogies llc, a specialized cpa firm dedicated to helping small businesses and middle market organizations leverage strategic technologies, proactively manage their business and technical risks, and enable balanced organizational growth and development.\",\"sameas\":[\"http:\/\/intraprisetechknowlogies.com\",\"https:\/\/www.facebook.com\/donnyitk\/\",\"https:\/\/www.linkedin.com\/in\/donnyitk\/\"],\"url\":\"\/\/www.g005e.com\/author\/donny-shimamoto\/\"}]}<\/script>\n<!-- \/ yoast seo plugin. -->","yoast_head_json":{"title":"how tax practitioners became cybersecurity risks - 卡塔尔世界杯常规比赛时间","description":"actionable intelligence for tax, accounting, and financial professionals","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/","og_locale":"en_us","og_type":"article","og_title":"how tax practitioners became cybersecurity risks - 卡塔尔世界杯常规比赛时间","og_description":"actionable intelligence for tax, accounting, and financial professionals","og_url":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/","og_site_name":"卡塔尔世界杯常规比赛时间","article_publisher":"https:\/\/www.facebook.com\/cpatrendlines","article_author":"https:\/\/www.facebook.com\/donnyitk\/","article_published_time":"2023-07-23t13:15:09+00:00","article_modified_time":"2024-08-27t21:01:51+00:00","og_image":[{"url":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/06\/hackedsmall_adobestock_159926885.jpg","type":"","width":"","height":""}],"author":"donny shimamoto","twitter_card":"summary_large_image","twitter_creator":"@cpa_trendlines","twitter_site":"@cpa_trendlines","twitter_misc":{"written by":"donny shimamoto","est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"article","@id":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#article","ispartof":{"@id":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/"},"author":{"name":"donny shimamoto","@id":"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff"},"headline":"how tax practitioners became cybersecurity risks","datepublished":"2023-07-23t13:15:09+00:00","datemodified":"2024-08-27t21:01:51+00:00","mainentityofpage":{"@id":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/"},"wordcount":925,"commentcount":0,"publisher":{"@id":"\/\/www.g005e.com\/#organization"},"image":{"@id":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#primaryimage"},"thumbnailurl":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/06\/hackedsmall_adobestock_159926885.jpg","keywords":["cybersecurity"],"articlesection":["pro member exclusive","special","tax practice","tax season","tech and fintech"],"inlanguage":"en-us","potentialaction":[{"@type":"commentaction","name":"comment","target":["\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#respond"]}]},{"@type":"webpage","@id":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/","url":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/","name":"how tax practitioners became cybersecurity risks - 卡塔尔世界杯常规比赛时间","ispartof":{"@id":"\/\/www.g005e.com\/#website"},"primaryimageofpage":{"@id":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#primaryimage"},"image":{"@id":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#primaryimage"},"thumbnailurl":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/06\/hackedsmall_adobestock_159926885.jpg","datepublished":"2023-07-23t13:15:09+00:00","datemodified":"2024-08-27t21:01:51+00:00","description":"actionable intelligence for tax, accounting, and financial professionals","breadcrumb":{"@id":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#breadcrumb"},"inlanguage":"en-us","potentialaction":[{"@type":"readaction","target":["\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/"]}]},{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#primaryimage","url":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/06\/hackedsmall_adobestock_159926885.jpg","contenturl":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/06\/hackedsmall_adobestock_159926885.jpg","width":1600,"height":1067},{"@type":"breadcrumblist","@id":"\/\/www.g005e.com\/2023\/07\/23\/hy-tax-practitioners-became-cybersecurity-risks\/#breadcrumb","itemlistelement":[{"@type":"listitem","position":1,"name":"home","item":"\/\/www.g005e.com\/"},{"@type":"listitem","position":2,"name":"tech and fintech","item":"\/\/www.g005e.com\/category\/tech-and-fintech\/"},{"@type":"listitem","position":3,"name":"how tax practitioners became cybersecurity risks"}]},{"@type":"website","@id":"\/\/www.g005e.com\/#website","url":"\/\/www.g005e.com\/","name":"卡塔尔世界杯常规比赛时间","description":"actionable intelligence for the tax, accounting and finance community","publisher":{"@id":"\/\/www.g005e.com\/#organization"},"potentialaction":[{"@type":"searchaction","target":{"@type":"entrypoint","urltemplate":"\/\/www.g005e.com\/?s={search_term_string}"},"query-input":{"@type":"propertyvaluespecification","valuerequired":true,"valuename":"search_term_string"}}],"inlanguage":"en-us"},{"@type":"organization","@id":"\/\/www.g005e.com\/#organization","name":"卡塔尔世界杯常规比赛时间 research","alternatename":"cpatrendlines","url":"\/\/www.g005e.com\/","logo":{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/#\/schema\/logo\/image\/","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg","width":1600,"height":350,"caption":"卡塔尔世界杯常规比赛时间 research"},"image":{"@id":"\/\/www.g005e.com\/#\/schema\/logo\/image\/"},"sameas":["https:\/\/www.facebook.com\/cpatrendlines","https:\/\/x.com\/cpa_trendlines","https:\/\/www.linkedin.com\/groups\/115382\/","https:\/\/www.youtube.com\/cpatrendlines"]},{"@type":"person","@id":"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff","name":"donny shimamoto","image":{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/#\/schema\/person\/image\/","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png","caption":"donny shimamoto"},"description":"donny c. shimamoto, cpa.citp, cgma, is the founder and managing director of intraprisetechknowlogies llc, a specialized cpa firm dedicated to helping small businesses and middle market organizations leverage strategic technologies, proactively manage their business and technical risks, and enable balanced organizational growth and development.","sameas":["http:\/\/intraprisetechknowlogies.com","https:\/\/www.facebook.com\/donnyitk\/","https:\/\/www.linkedin.com\/in\/donnyitk\/"],"url":"\/\/www.g005e.com\/author\/donny-shimamoto\/"}]}},"_links":{"self":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/112247","targethints":{"allow":["get"]}}],"collection":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/users\/1382"}],"replies":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/comments?post=112247"}],"version-history":[{"count":18,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/112247\/revisions"}],"predecessor-version":[{"id":112314,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/112247\/revisions\/112314"}],"wp:attachment":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/media?parent=112247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/categories?post=112247"},{"taxonomy":"post_tag","embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/tags?post=112247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}