{"id":116674,"date":"2023-09-14t12:00:20","date_gmt":"2023-09-14t16:00:20","guid":{"rendered":"\/\/www.g005e.com\/?p=116674"},"modified":"2024-08-27t17:01:13","modified_gmt":"2024-08-27t21:01:13","slug":"donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need","status":"publish","type":"post","link":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/","title":{"rendered":"the 7 categories of cybersecurity solutions firms need"},"content":{"rendered":"

\"\"how important are wisp and employee awareness? just ask the irs or the ftc.\u00a0<\/strong><\/p>\n

by donny shimamoto, cpa, citp, cgma<\/em>
\non cybersecurity for accountants<\/em><\/a>
\n
center for accounting transformation<\/em><\/a><\/p>\n

historically, finding cybersecurity solutions \u201cright-sized\u201d for the small and mid-sized business space was difficult. most of the technologies were expensive and difficult to implement, and their price points weren\u2019t reasonable for organizations with under 25 people. it\u2019s only been within the last five years that we\u2019ve seen solutions mature and evolve enough to be delivered via the cloud at a price point that makes sense for smaller organizations.<\/p>\n

more:\u00a0<\/strong>how hacker-proof is your firm?<\/a> |\u00a0donny shimamoto: future firm growth requires a mindshift<\/a>\u00a0|\u00a0ai, ocr, nlp & cpas: oh my!<\/a> \u00a0\u00a0| \u00a0accounting nerds, unlock your super powers<\/a> \u00a0| early adopters gain an edge in audit<\/a> | dustin wheeler: for serious cas success, hire tech teams<\/a> | csr for cpas: the missing ingredient<\/a> | donny shimamoto explains how ‘agile’ applies to cpa firms<\/a> |\u00a0 staff retention for remote workers<\/a> | why the future is in risk advisory<\/a> | \u00a0ready for non-cpa “cpa” firms?<\/a>
\n\"goprocpa.com\"\u00a0exclusively for pro members.\u00a0
log in here<\/a>\u00a0or\u00a02022世界杯足球排名 today<\/a>.<\/p>\n

to check if your policy addresses all of the requirements, <\/strong>take our cybersecurity compliance self-assessment for tax practitioners at: improvetheworld.net\/cyberselfassessfortaxbook<\/a><\/p><\/blockquote>\n

with the covid-19 pandemic and the adoption of remote work increased cybersecurity threats, the cybersecurity industry has stepped up and made solutions much more affordable and easier to implement. these solutions still require some technical knowledge to install, but there is much less maintenance, and they now make economic sense even for sole practitioners.<\/p>\n

there are seven categories of solutions that most small firms will need:<\/strong><\/p>\n

    \n
  1. written information security policies<\/li>\n
  2. employee awareness<\/li>\n
  3. email protection<\/li>\n
  4. workstation protection<\/li>\n
  5. server & network protection<\/li>\n
  6. data backup & business continuity plan<\/li>\n
  7. cybersecurity risk advice<\/li>\n<\/ol>\n

    each of these helps to address a segment of tax practitioners\u2019 compliance requirements. i\u2019ll explain two of them below in non-techie language, and we’ll look at the others in future articles.<\/p>\n

    written information security policies
    \n<\/strong><\/p>\n

    both the irs and ftc require that there be written information security policies that demonstrate a tax practitioner\u2019s understanding of their compliance requirements as well as identify the controls they are putting in place to address the expectation from irs publication 4557 and the ftc\u2019s safeguards rule.<\/p>\n

    while there are a number of these templates floating around the internet, many don\u2019t address the specific needs of tax practitioners. policies prepared by managed service providers and other it professionals without the proper cybersecurity risk management background often don\u2019t address all of the irs and ftc requirements.<\/p>\n

    employee awareness
    \n<\/strong><\/p>\n

    you\u2019ll often hear cybersecurity experts say that the weakest link in cybersecurity is people. to mitigate this risk, you must take proactive action to keep everyone\u2019s cybersecurity threat awareness high and also to ensure that you and your staff know how to recognize attempted attacks. one way to accomplish this is by sharing relevant examples of cybersecurity attacks and providing training on how to recognize and report cybersecurity incidences to management.<\/p>\n

    the best practices in this area include initial information security policy training upon onboarding a new staff member, plus an annual refresher training on cybersecurity policies and incident reporting. to keep cybersecurity at top of mind, i also recommend at least monthly awareness activities like mini-trainings, newsletters that share examples of cyber breaches and attacks, and phishing testing.<\/p>\n

    phishing testing is using software that sends emails to staff that are structured similarly to phishing attacks. you configure the emails to look like legitimate emails but include the telltale signs of phishing, like minor misspellings and suspicious urls. if someone clicks on the link in the email or opens an attachment without scanning it, the phishing testing software detects it and reports it back to a central console so that you know who poses a potential risk and can have them take additional training. in fact, some phishing software will actually do remedial training for the person right after they fall for the attack. it basically tells them that they failed the phishing test and then shows them how they could have detected that it was a phishing attack.<\/p>\n

    really proactive firms will even do weekly awareness and phishing testing during tax season. you may be thinking: \u201cthat\u2019s our busiest time of year! why would they do that? we don\u2019t have time for that!\u201d the reason is exactly that\u2026you\u2019re busy trying to push through and not paying attention to these potential threats. so, tax season is when it is even more important to keep awareness high. plus, imagine if you had a malware attack during busy season. you\u2019d have to stop all your return preparation work to deal with a data breach or ransomware attack. wouldn\u2019t that be worse than just having to check one additional email each week?<\/p>\n

    it’s important to ensure that you and your staff stay vigilant to cybersecurity threats, and employee awareness solutions help to automate information distribution, monitor who is completing training, and test that people are actually applying what they learned.<\/p>\n

    email protection
    \n<\/strong><\/p>\n

    email is the most common malware attack vector we see today. these are often called phishing attacks, but they\u2019ve also gotten more complex, and there is a slew of derivative attacks like spear-phishing, vishing, and other \u201c–ishing\u201d attacks that we are hearing about. these attacks normally try to get someone to click on a link or open an attachment containing malware.<\/p>\n

    email protection solutions help mitigate these attacks by scanning incoming emails for known malicious senders, links, and malware. some solutions replace the original links with surrogate links. when you click on a surrogate link, you are taken back to the email protection solution, which then opens the link for you and checks if it is a known malware site or if it starts to act suspiciously (e.g., invokes the download of malware or opening of another browser window to a suspicious site). some of them take the surrogate approach with attachments, too.<\/p>\n

    email protection solutions help prevent malicious emails and attachments from getting to your inbox, or use the surrogate method to help protect you in real time. they are often the first line of defense in cybersecurity protection. the good news is that these are now often very affordable, compared to ten years ago when we\u2019d only really see these used by big companies. i recommend that all tax practitioners have email protection in place. it is one of the most effective ways to prevent malware attacks, and the price-for-value proposition should be a no-brainer.<\/p>\n

    workstation protection
    \n<\/strong><\/p>\n

    workstation protection includes device management, anti-virus, and zero-trust solutions. device management solutions ensure that your computers are kept updated and enable more proactive computer performance monitoring. the anti-virus options we\u2019ve identified include those with centralized management\u2014so that if you or someone from your firm has a virus incident, it is reported, and you can be proactive in your response to ensure that there isn\u2019t a data breach or ransomware incident that needs to be addressed.<\/p>\n

    zero-trust solutions help to mitigate an insider threat where someone has accidentally (or maliciously) installed malware that uses their credentials to try and explore your data, files, and network. zero-trust only allows recognized software interactions to occur. for example, if you accidentally open a microsoft word document with a trojan virus that tries to access your tax software, the zero-trust solution knows that word doesn\u2019t normally interact with your tax software and stops the virus from accessing the tax software. additionally, it reports this attempted interaction to you so that you can investigate the situation and get help if needed to remove the virus.<\/p>\n

    workstation protection solutions provide both preventative technical controls and detective mechanisms that enable you to identify potential threats before they become problems.<\/p>\n

    server & network protection
    \n<\/strong><\/p>\n

    server protection is exactly the same as workstation protection, but it is applied to your servers instead of workstations. as you know, servers are more complex than workstations, so these solutions are usually a little more costly than the workstation protection ones, but if you are using a server-centric data storage strategy (e.g., save all your data on the server), then the server is also your biggest consolidated risk area, so you should ensure that it is highly protected.<\/p>\n

    sometimes, people then say, \u201cwell, if i store everything on my server, why do i need to protect my workstations?\u201d the answer is that workstations are the gateway to your server and network. one of the common malware attack vectors that we see is where the malware first goes onto a staff member\u2019s laptop (often while they are working outside of the office in a less protected environment) and then when they connect to the office via vpn or come into the office, the malware tries to move to the server. thus, you need workstation protection to prevent the first stage of this type of attack from occurring.<\/p>\n

    if you have an in-office or even if you are using a hosted desktop environment, then you\u2019ll also need network protection. for small firms, this usually takes the form of a network firewall. a good network firewall (whether physically in-office or as part of a hosted desktop environment) will include virus protection, intrusion detection and prevention, content filtering, and attack detection notification.<\/p>\n

    if you want to be even more proactive, there are additional services that you can purchase like endpoint detection and response (edr), security operations center (soc, not to be confused with service organization controls audit reports), and other cybersecurity monitoring and response services. while i encourage small firms to consider these, the cost versus value for additional risk mitigation is often not there\u2014or at least is not there based on current pricing. hopefully, that will change as service providers figure out how to automate these types of services better, as i do believe in the increased effectiveness of these types of services in preventing and detecting cybersecurity attacks.<\/p>\n

    data backup & business continuity plan
    \n<\/strong><\/p>\n

    the biggest impact of ransomware is that it makes your data inaccessible\u2014and thus the need to pay the ransom to get access to your data. imagine if this happened the day before a tax deadline. what would you do? well, if you have a good data backup, then you could restore your data from the backup instead of paying the ransom.<\/p>\n

    this starts to bridge into the concept of business continuity planning or having a plan and procedures ready to execute in the event of a ransomware attack. many people confuse disaster recovery with business continuity. a simplified way to understand the difference is that disaster recovery is designed to get your computers back up and running after a disaster (which could include a ransomware attack), but business continuity looks at your broader business operations.<\/p>\n

    again, take, for example, a ransomware attack just before a tax deadline. a business continuity plan may include a list of unfiled and un-exttended tax returns kept outside of your it environment. if you are hit by a ransomware attack on a tax deadline day, you can invoke the procedure to take the list and start processing manual extensions so that you can get them all filed that day. otherwise, with only a disaster recovery plan, you\u2019d be waiting for your it service provider to restore the environment so that you can figure out what is unfiled and hasn\u2019t been extended yet. depending on how fast your it service provider works and how many of their clients are dealing with this type of issue, getting your environment restored can take a day or two\u2014or sometimes weeks, as we\u2019ve seen with previous attacks upon hosted desktop vendors who serve a lot of firms. having the business continuity plan in place enables you to not be at the service provider\u2019s mercy.<\/p>\n

    i\u2019m also seeing and hearing of more comprehensive malware attacks where the malware will destroy online backups before locking down data. in cases like this, having a good business continuity plan that addresses this potential scenario is even more important.<\/p>\n

    a good data backup solution paired with a well-thought-out business continuity plan is key to mitigating your risk in the event that you do get hit by ransomware, and it\u2019s an area where we regularly see a false sense of security because it service providers often say, \u201cdon\u2019t worry we have all your data backed up, and we have a disaster recovery plan for you.\u201d they may truly have both things in place, but you\u2019re still at their mercy if you don\u2019t have a good business continuity plan in place, too\u2014and that is something you can do on your own.<\/p>\n

    cybersecurity risk assessment & advice
    \n<\/strong><\/p>\n

    part of the irs and ftc requirements is conducting a cybersecurity risk assessment to ensure you understand your risk areas, the effectiveness of mitigation actions you\u2019ve taken, and the residual risk for a cybersecurity incident. many it service providers and cybersecurity consultants will do a \u201ccybersecurity audit\u201d for free. the thing to keep in mind with these are (1) they often only focus on technical controls and don\u2019t address policy and business continuity requirements, and (2) be wary of free audits or vulnerability scans designed to identify weaknesses and then sell you solutions. a good risk assessment will address all of the risk areas described and include identifying the risks and solutions to mitigate those risks.<\/p>\n

    a cybersecurity risk assessment is only a point-in-time view of your cybersecurity threats and risks. to effectively manage your firm\u2019s cybersecurity risk, you (or someone you trust) need to monitor all the notifications from the centrally managed solutions and respond accordingly in the event of a cybersecurity incident.<\/p>\n

    additionally, any time you are considering changing or upgrading any of your software or hardware, you should consider the impact of the change or upgrade to your cybersecurity risks. this is where having a cybersecurity advisor will be helpful. this individual should understand cybersecurity compliance requirements, be familiar with your firm\u2019s operations, understand your firm\u2019s it environment, and understand the controls you\u2019ve put in place to mitigate your risks. if this person didn\u2019t conduct your initial cybersecurity risk assessment, be sure to share that information with them, as it should provide a good summary of where you were at that point in time.<\/p>\n

    a good advisor will translate any cybersecurity risks into business risks and help you determine the potential impact of changes. this will enable you to be proactive in building cybersecurity considerations into how a new software or change is implemented. this is important because retrofitting cybersecurity requirements after implementation will cost more or may not even be possible in the worst case. it\u2019s important to do your due diligence on vendors upfront and proactively design cybersecurity concerns as part of the implementation.<\/p>\n

    a good advisor will also help keep you aware of emerging cybersecurity threats, improvements to solutions, and changes to compliance requirements. just as your clients expect you to help them navigate the complexities of tax compliance, financial planning solutions, and proactive planning to minimize tax exposures, a good cybersecurity advisor will help you do the same in the cyber area.<\/p>\n

     <\/p>\n","protected":false},"excerpt":{"rendered":"

    how important are wisp and employee awareness? just ask the irs or the ftc.<\/strong>
    \n
    \"\"<\/a>
    \nby donny shimamoto<\/em>
    \n
    on cybersecurity for accountants<\/em><\/a>
    \n
    center for accounting transformation<\/em><\/a><\/p>\n","protected":false},"author":1382,"featured_media":116675,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1905,1908,3120,2458,3002,2306],"tags":[3652],"class_list":["post-116674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-clients-and-service","category-management","category-pro-member-exclusive","category-risk-management","category-special","category-tech-and-fintech","tag-cybersecurity"],"acf":[],"yoast_head":"\nthe 7 categories of cybersecurity solutions firms need - 卡塔尔世界杯常规比赛时间<\/title>\n<meta name=\"description\" content=\"actionable intelligence for tax, accounting, and financial professionals\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/\" \/>\n<meta property=\"og:locale\" content=\"en_us\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"the 7 categories of cybersecurity solutions firms need - 卡塔尔世界杯常规比赛时间\" \/>\n<meta property=\"og:description\" content=\"actionable intelligence for tax, accounting, and financial professionals\" \/>\n<meta property=\"og:url\" content=\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/\" \/>\n<meta property=\"og:site_name\" content=\"卡塔尔世界杯常规比赛时间\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cpatrendlines\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/donnyitk\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-14t16:00:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-27t21:01:13+00:00\" \/>\n<meta property=\"og:image\" content=\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/09\/phishing_adobestock_583273206.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"donny shimamoto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cpa_trendlines\" \/>\n<meta name=\"twitter:site\" content=\"@cpa_trendlines\" \/>\n<meta name=\"twitter:label1\" content=\"written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"donny shimamoto\" \/>\n\t<meta name=\"twitter:label2\" content=\"est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"article\",\"@id\":\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#article\",\"ispartof\":{\"@id\":\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/\"},\"author\":{\"name\":\"donny shimamoto\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff\"},\"headline\":\"the 7 categories of cybersecurity solutions firms need\",\"datepublished\":\"2023-09-14t16:00:20+00:00\",\"datemodified\":\"2024-08-27t21:01:13+00:00\",\"mainentityofpage\":{\"@id\":\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/\"},\"wordcount\":2563,\"commentcount\":0,\"publisher\":{\"@id\":\"\/\/www.g005e.com\/#organization\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#primaryimage\"},\"thumbnailurl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/09\/phishing_adobestock_583273206.jpeg\",\"keywords\":[\"cybersecurity\"],\"articlesection\":[\"client service opportunities\",\"management\",\"pro member exclusive\",\"risk management\",\"special\",\"tech and fintech\"],\"inlanguage\":\"en-us\",\"potentialaction\":[{\"@type\":\"commentaction\",\"name\":\"comment\",\"target\":[\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#respond\"]}]},{\"@type\":\"webpage\",\"@id\":\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/\",\"url\":\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/\",\"name\":\"the 7 categories of cybersecurity solutions firms need - 卡塔尔世界杯常规比赛时间\",\"ispartof\":{\"@id\":\"\/\/www.g005e.com\/#website\"},\"primaryimageofpage\":{\"@id\":\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#primaryimage\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#primaryimage\"},\"thumbnailurl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/09\/phishing_adobestock_583273206.jpeg\",\"datepublished\":\"2023-09-14t16:00:20+00:00\",\"datemodified\":\"2024-08-27t21:01:13+00:00\",\"description\":\"actionable intelligence for tax, accounting, and financial professionals\",\"breadcrumb\":{\"@id\":\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#breadcrumb\"},\"inlanguage\":\"en-us\",\"potentialaction\":[{\"@type\":\"readaction\",\"target\":[\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/\"]}]},{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#primaryimage\",\"url\":\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/09\/phishing_adobestock_583273206.jpeg\",\"contenturl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/09\/phishing_adobestock_583273206.jpeg\",\"width\":1600,\"height\":1067,\"caption\":\"seen from behind modern woman with laptop in modern office discovered a computer virus.\"},{\"@type\":\"breadcrumblist\",\"@id\":\"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#breadcrumb\",\"itemlistelement\":[{\"@type\":\"listitem\",\"position\":1,\"name\":\"home\",\"item\":\"\/\/www.g005e.com\/\"},{\"@type\":\"listitem\",\"position\":2,\"name\":\"growth strategies\",\"item\":\"\/\/www.g005e.com\/category\/growth\/\"},{\"@type\":\"listitem\",\"position\":3,\"name\":\"client service opportunities\",\"item\":\"\/\/www.g005e.com\/category\/growth\/clients-and-service\/\"},{\"@type\":\"listitem\",\"position\":4,\"name\":\"the 7 categories of cybersecurity solutions firms need\"}]},{\"@type\":\"website\",\"@id\":\"\/\/www.g005e.com\/#website\",\"url\":\"\/\/www.g005e.com\/\",\"name\":\"卡塔尔世界杯常规比赛时间\",\"description\":\"actionable intelligence for the tax, accounting and finance community\",\"publisher\":{\"@id\":\"\/\/www.g005e.com\/#organization\"},\"potentialaction\":[{\"@type\":\"searchaction\",\"target\":{\"@type\":\"entrypoint\",\"urltemplate\":\"\/\/www.g005e.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"propertyvaluespecification\",\"valuerequired\":true,\"valuename\":\"search_term_string\"}}],\"inlanguage\":\"en-us\"},{\"@type\":\"organization\",\"@id\":\"\/\/www.g005e.com\/#organization\",\"name\":\"卡塔尔世界杯常规比赛时间 research\",\"alternatename\":\"cpatrendlines\",\"url\":\"\/\/www.g005e.com\/\",\"logo\":{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg\",\"width\":1600,\"height\":350,\"caption\":\"卡塔尔世界杯常规比赛时间 research\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/#\/schema\/logo\/image\/\"},\"sameas\":[\"https:\/\/www.facebook.com\/cpatrendlines\",\"https:\/\/x.com\/cpa_trendlines\",\"https:\/\/www.linkedin.com\/groups\/115382\/\",\"https:\/\/www.youtube.com\/cpatrendlines\"]},{\"@type\":\"person\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff\",\"name\":\"donny shimamoto\",\"image\":{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png\",\"caption\":\"donny shimamoto\"},\"description\":\"donny c. shimamoto, cpa.citp, cgma, is the founder and managing director of intraprisetechknowlogies llc, a specialized cpa firm dedicated to helping small businesses and middle market organizations leverage strategic technologies, proactively manage their business and technical risks, and enable balanced organizational growth and development.\",\"sameas\":[\"http:\/\/intraprisetechknowlogies.com\",\"https:\/\/www.facebook.com\/donnyitk\/\",\"https:\/\/www.linkedin.com\/in\/donnyitk\/\"],\"url\":\"\/\/www.g005e.com\/author\/donny-shimamoto\/\"}]}<\/script>\n<!-- \/ yoast seo plugin. -->","yoast_head_json":{"title":"the 7 categories of cybersecurity solutions firms need - 卡塔尔世界杯常规比赛时间","description":"actionable intelligence for tax, accounting, and financial professionals","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/","og_locale":"en_us","og_type":"article","og_title":"the 7 categories of cybersecurity solutions firms need - 卡塔尔世界杯常规比赛时间","og_description":"actionable intelligence for tax, accounting, and financial professionals","og_url":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/","og_site_name":"卡塔尔世界杯常规比赛时间","article_publisher":"https:\/\/www.facebook.com\/cpatrendlines","article_author":"https:\/\/www.facebook.com\/donnyitk\/","article_published_time":"2023-09-14t16:00:20+00:00","article_modified_time":"2024-08-27t21:01:13+00:00","og_image":[{"width":1600,"height":1067,"url":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/09\/phishing_adobestock_583273206.jpeg","type":"image\/jpeg"}],"author":"donny shimamoto","twitter_card":"summary_large_image","twitter_creator":"@cpa_trendlines","twitter_site":"@cpa_trendlines","twitter_misc":{"written by":"donny shimamoto","est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"article","@id":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#article","ispartof":{"@id":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/"},"author":{"name":"donny shimamoto","@id":"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff"},"headline":"the 7 categories of cybersecurity solutions firms need","datepublished":"2023-09-14t16:00:20+00:00","datemodified":"2024-08-27t21:01:13+00:00","mainentityofpage":{"@id":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/"},"wordcount":2563,"commentcount":0,"publisher":{"@id":"\/\/www.g005e.com\/#organization"},"image":{"@id":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#primaryimage"},"thumbnailurl":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/09\/phishing_adobestock_583273206.jpeg","keywords":["cybersecurity"],"articlesection":["client service opportunities","management","pro member exclusive","risk management","special","tech and fintech"],"inlanguage":"en-us","potentialaction":[{"@type":"commentaction","name":"comment","target":["\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#respond"]}]},{"@type":"webpage","@id":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/","url":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/","name":"the 7 categories of cybersecurity solutions firms need - 卡塔尔世界杯常规比赛时间","ispartof":{"@id":"\/\/www.g005e.com\/#website"},"primaryimageofpage":{"@id":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#primaryimage"},"image":{"@id":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#primaryimage"},"thumbnailurl":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/09\/phishing_adobestock_583273206.jpeg","datepublished":"2023-09-14t16:00:20+00:00","datemodified":"2024-08-27t21:01:13+00:00","description":"actionable intelligence for tax, accounting, and financial professionals","breadcrumb":{"@id":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#breadcrumb"},"inlanguage":"en-us","potentialaction":[{"@type":"readaction","target":["\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/"]}]},{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#primaryimage","url":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/09\/phishing_adobestock_583273206.jpeg","contenturl":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/09\/phishing_adobestock_583273206.jpeg","width":1600,"height":1067,"caption":"seen from behind modern woman with laptop in modern office discovered a computer virus."},{"@type":"breadcrumblist","@id":"\/\/www.g005e.com\/2023\/09\/14\/donny-shimamoto-the-7-categories-of-cybersecurity-solutions-firms-need\/#breadcrumb","itemlistelement":[{"@type":"listitem","position":1,"name":"home","item":"\/\/www.g005e.com\/"},{"@type":"listitem","position":2,"name":"growth strategies","item":"\/\/www.g005e.com\/category\/growth\/"},{"@type":"listitem","position":3,"name":"client service opportunities","item":"\/\/www.g005e.com\/category\/growth\/clients-and-service\/"},{"@type":"listitem","position":4,"name":"the 7 categories of cybersecurity solutions firms need"}]},{"@type":"website","@id":"\/\/www.g005e.com\/#website","url":"\/\/www.g005e.com\/","name":"卡塔尔世界杯常规比赛时间","description":"actionable intelligence for the tax, accounting and finance community","publisher":{"@id":"\/\/www.g005e.com\/#organization"},"potentialaction":[{"@type":"searchaction","target":{"@type":"entrypoint","urltemplate":"\/\/www.g005e.com\/?s={search_term_string}"},"query-input":{"@type":"propertyvaluespecification","valuerequired":true,"valuename":"search_term_string"}}],"inlanguage":"en-us"},{"@type":"organization","@id":"\/\/www.g005e.com\/#organization","name":"卡塔尔世界杯常规比赛时间 research","alternatename":"cpatrendlines","url":"\/\/www.g005e.com\/","logo":{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/#\/schema\/logo\/image\/","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg","width":1600,"height":350,"caption":"卡塔尔世界杯常规比赛时间 research"},"image":{"@id":"\/\/www.g005e.com\/#\/schema\/logo\/image\/"},"sameas":["https:\/\/www.facebook.com\/cpatrendlines","https:\/\/x.com\/cpa_trendlines","https:\/\/www.linkedin.com\/groups\/115382\/","https:\/\/www.youtube.com\/cpatrendlines"]},{"@type":"person","@id":"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff","name":"donny shimamoto","image":{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/#\/schema\/person\/image\/","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png","caption":"donny shimamoto"},"description":"donny c. shimamoto, cpa.citp, cgma, is the founder and managing director of intraprisetechknowlogies llc, a specialized cpa firm dedicated to helping small businesses and middle market organizations leverage strategic technologies, proactively manage their business and technical risks, and enable balanced organizational growth and development.","sameas":["http:\/\/intraprisetechknowlogies.com","https:\/\/www.facebook.com\/donnyitk\/","https:\/\/www.linkedin.com\/in\/donnyitk\/"],"url":"\/\/www.g005e.com\/author\/donny-shimamoto\/"}]}},"_links":{"self":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/116674","targethints":{"allow":["get"]}}],"collection":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/users\/1382"}],"replies":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/comments?post=116674"}],"version-history":[{"count":9,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/116674\/revisions"}],"predecessor-version":[{"id":116904,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/116674\/revisions\/116904"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/media\/116675"}],"wp:attachment":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/media?parent=116674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/categories?post=116674"},{"taxonomy":"post_tag","embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/tags?post=116674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}