{"id":118110,"date":"2024-03-13t00:00:29","date_gmt":"2024-03-13t04:00:29","guid":{"rendered":"\/\/www.g005e.com\/?p=118110"},"modified":"2024-08-29t23:53:39","modified_gmt":"2024-08-30t03:53:39","slug":"by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny","status":"publish","type":"post","link":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/","title":{"rendered":"six steps to battle cybersecurity risks"},"content":{"rendered":"

\"\"what cost or time investment would you pay to protect your firm and your clients?<\/strong><\/p>\n

by donny shimamoto
\ncybersecurity for accountants<\/em><\/p>\n

when it comes to cybersecurity, one risk aspect to consider is whether or not the steps you\u2019ve taken to protect clients\u2019 pii will stand up in court in the event of litigation related to a data breach or damages to a client because of a cybersecurity issue caused by your firm. during litigation, opposing counsel will often bring in cybersecurity experts to describe cybersecurity best practices\u2014which are often a higher level of controls than just compliance.<\/p>\n

more: <\/strong>understanding the full cost of a data breach<\/a> |\u00a0the 7 categories of of cybersecurity solutions firms need<\/a> |\u00a0future firm growth requires a mindshift<\/a> | donny shimamoto explains how ‘agile’ applies to cpa firms<\/a> | ai, ocr, nlp & cpas: oh my!<\/a> \u00a0\u00a0| \u00a0accounting nerds, unlock your super powers<\/a> \u00a0| early adopters gain an edge in audit<\/a> | dustin wheeler: for serious cas success, hire tech teams<\/a> | csr for cpas: the missing ingredient<\/a> | donny shimamoto explains how ‘agile’ applies to cpa firms<\/a> |\u00a0 staff retention for remote workers<\/a> | why the future is in risk advisory<\/a> | \u00a0ready for non-cpa “cpa” firms?<\/a>
\n\"goprocpa.com\"\u00a0exclusively for pro members.\u00a0
log in here<\/a>\u00a0or\u00a02022世界杯足球排名 today<\/a>.<\/span><\/p><\/blockquote>\n

be sure to consult with both your cybersecurity advisor and legal counsel to determine which controls you may still want to implement even if you qualify for some of the exemptions. many controls, like the ones identified in the ftc<\/a> exception, do not cost much to implement and can demonstrate that you still fulfilled your professional obligation to protect clients\u2019 data\u2014reducing your litigation risk.<\/p>\n

read more →<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

\"\"what cost or time investment would you pay to protect your firm and your clients?<\/strong><\/p>\n

by donny shimamoto
\ncybersecurity for accountants<\/em><\/p>\n

when it comes to cybersecurity, one risk aspect to consider is whether or not the steps you\u2019ve taken to protect clients\u2019 pii will stand up in court in the event of litigation related to a data breach or damages to a client because of a cybersecurity issue caused by your firm. during litigation, opposing counsel will often bring in cybersecurity experts to describe cybersecurity best practices\u2014which are often a higher level of controls than just compliance.<\/p>\n

\n

more: <\/strong>understanding the full cost of a data breach<\/a> |\u00a0the 7 categories of of cybersecurity solutions firms need<\/a> |\u00a0future firm growth requires a mindshift<\/a> | donny shimamoto explains how ‘agile’ applies to cpa firms<\/a> | ai, ocr, nlp & cpas: oh my!<\/a> \u00a0\u00a0| \u00a0accounting nerds, unlock your super powers<\/a> \u00a0| early adopters gain an edge in audit<\/a> | dustin wheeler: for serious cas success, hire tech teams<\/a> | csr for cpas: the missing ingredient<\/a> | donny shimamoto explains how ‘agile’ applies to cpa firms<\/a> |\u00a0 staff retention for remote workers<\/a> | why the future is in risk advisory<\/a> | \u00a0ready for non-cpa “cpa” firms?<\/a>
\n\"goprocpa.com\"\u00a0exclusively for pro members.\u00a0
log in here<\/a>\u00a0or\u00a02022世界杯足球排名 today<\/a>.<\/span><\/p>\n<\/blockquote>\n

be sure to consult with both your cybersecurity advisor and legal counsel to determine which controls you may still want to implement even if you qualify for some of the exemptions. many controls, like the ones identified in the ftc<\/a> exception, do not cost much to implement and can demonstrate that you still fulfilled your professional obligation to protect clients\u2019 data\u2014reducing your litigation risk.<\/p>\n

read more →<\/a><\/p>\n","protected":false},"author":1382,"featured_media":118125,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"129943,136367,135058,130835,130455,133407","_relevanssi_noindex_reason":"","footnotes":""},"categories":[3184,2327,1908,3120,2458,2306],"tags":[3652],"class_list":["post-118110","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-advisory","category-innovation","category-management","category-pro-member-exclusive","category-risk-management","category-tech-and-fintech","tag-cybersecurity","membership-content","access-restricted"],"acf":[],"yoast_head":"\nsix steps to battle cybersecurity risks - 卡塔尔世界杯常规比赛时间<\/title>\n<meta name=\"description\" content=\"actionable intelligence for tax, accounting, and financial professionals\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/\" \/>\n<meta property=\"og:locale\" content=\"en_us\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"six steps to battle cybersecurity risks - 卡塔尔世界杯常规比赛时间\" \/>\n<meta property=\"og:description\" content=\"actionable intelligence for tax, accounting, and financial professionals\" \/>\n<meta property=\"og:url\" content=\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/\" \/>\n<meta property=\"og:site_name\" content=\"卡塔尔世界杯常规比赛时间\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cpatrendlines\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/donnyitk\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-13t04:00:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-30t03:53:39+00:00\" \/>\n<meta property=\"og:image\" content=\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/10\/cybersecuritychecklist_adobestock_602385731-e1698685193417.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1216\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"donny shimamoto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cpa_trendlines\" \/>\n<meta name=\"twitter:site\" content=\"@cpa_trendlines\" \/>\n<meta name=\"twitter:label1\" content=\"written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"donny shimamoto\" \/>\n\t<meta name=\"twitter:label2\" content=\"est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"article\",\"@id\":\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#article\",\"ispartof\":{\"@id\":\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/\"},\"author\":{\"name\":\"donny shimamoto\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff\"},\"headline\":\"six steps to battle cybersecurity risks\",\"datepublished\":\"2024-03-13t04:00:29+00:00\",\"datemodified\":\"2024-08-30t03:53:39+00:00\",\"mainentityofpage\":{\"@id\":\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/\"},\"wordcount\":832,\"commentcount\":0,\"publisher\":{\"@id\":\"\/\/www.g005e.com\/#organization\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#primaryimage\"},\"thumbnailurl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/10\/cybersecuritychecklist_adobestock_602385731-e1698685193417.jpeg\",\"keywords\":[\"cybersecurity\"],\"articlesection\":[\"advisory & consulting\",\"innovation & change management\",\"management\",\"pro member exclusive\",\"risk management\",\"tech and fintech\"],\"inlanguage\":\"en-us\",\"potentialaction\":[{\"@type\":\"commentaction\",\"name\":\"comment\",\"target\":[\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#respond\"]}]},{\"@type\":\"webpage\",\"@id\":\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/\",\"url\":\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/\",\"name\":\"six steps to battle cybersecurity risks - 卡塔尔世界杯常规比赛时间\",\"ispartof\":{\"@id\":\"\/\/www.g005e.com\/#website\"},\"primaryimageofpage\":{\"@id\":\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#primaryimage\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#primaryimage\"},\"thumbnailurl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/10\/cybersecuritychecklist_adobestock_602385731-e1698685193417.jpeg\",\"datepublished\":\"2024-03-13t04:00:29+00:00\",\"datemodified\":\"2024-08-30t03:53:39+00:00\",\"description\":\"actionable intelligence for tax, accounting, and financial professionals\",\"breadcrumb\":{\"@id\":\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#breadcrumb\"},\"inlanguage\":\"en-us\",\"potentialaction\":[{\"@type\":\"readaction\",\"target\":[\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/\"]}]},{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#primaryimage\",\"url\":\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/10\/cybersecuritychecklist_adobestock_602385731-e1698685193417.jpeg\",\"contenturl\":\"\/\/www.g005e.com\/wp-content\/uploads\/2023\/10\/cybersecuritychecklist_adobestock_602385731-e1698685193417.jpeg\",\"width\":1216,\"height\":506},{\"@type\":\"breadcrumblist\",\"@id\":\"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#breadcrumb\",\"itemlistelement\":[{\"@type\":\"listitem\",\"position\":1,\"name\":\"home\",\"item\":\"\/\/www.g005e.com\/\"},{\"@type\":\"listitem\",\"position\":2,\"name\":\"advisory & consulting\",\"item\":\"\/\/www.g005e.com\/category\/advisory\/\"},{\"@type\":\"listitem\",\"position\":3,\"name\":\"six steps to battle cybersecurity risks\"}]},{\"@type\":\"website\",\"@id\":\"\/\/www.g005e.com\/#website\",\"url\":\"\/\/www.g005e.com\/\",\"name\":\"卡塔尔世界杯常规比赛时间\",\"description\":\"actionable intelligence for the tax, accounting and finance community\",\"publisher\":{\"@id\":\"\/\/www.g005e.com\/#organization\"},\"potentialaction\":[{\"@type\":\"searchaction\",\"target\":{\"@type\":\"entrypoint\",\"urltemplate\":\"\/\/www.g005e.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"propertyvaluespecification\",\"valuerequired\":true,\"valuename\":\"search_term_string\"}}],\"inlanguage\":\"en-us\"},{\"@type\":\"organization\",\"@id\":\"\/\/www.g005e.com\/#organization\",\"name\":\"卡塔尔世界杯常规比赛时间 research\",\"alternatename\":\"cpatrendlines\",\"url\":\"\/\/www.g005e.com\/\",\"logo\":{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg\",\"width\":1600,\"height\":350,\"caption\":\"卡塔尔世界杯常规比赛时间 research\"},\"image\":{\"@id\":\"\/\/www.g005e.com\/#\/schema\/logo\/image\/\"},\"sameas\":[\"https:\/\/www.facebook.com\/cpatrendlines\",\"https:\/\/x.com\/cpa_trendlines\",\"https:\/\/www.linkedin.com\/groups\/115382\/\",\"https:\/\/www.youtube.com\/cpatrendlines\"]},{\"@type\":\"person\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff\",\"name\":\"donny shimamoto\",\"image\":{\"@type\":\"imageobject\",\"inlanguage\":\"en-us\",\"@id\":\"\/\/www.g005e.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png\",\"contenturl\":\"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png\",\"caption\":\"donny shimamoto\"},\"description\":\"donny c. shimamoto, cpa.citp, cgma, is the founder and managing director of intraprisetechknowlogies llc, a specialized cpa firm dedicated to helping small businesses and middle market organizations leverage strategic technologies, proactively manage their business and technical risks, and enable balanced organizational growth and development.\",\"sameas\":[\"http:\/\/intraprisetechknowlogies.com\",\"https:\/\/www.facebook.com\/donnyitk\/\",\"https:\/\/www.linkedin.com\/in\/donnyitk\/\"],\"url\":\"\/\/www.g005e.com\/author\/donny-shimamoto\/\"}]}<\/script>\n<!-- \/ yoast seo plugin. -->","yoast_head_json":{"title":"six steps to battle cybersecurity risks - 卡塔尔世界杯常规比赛时间","description":"actionable intelligence for tax, accounting, and financial professionals","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/","og_locale":"en_us","og_type":"article","og_title":"six steps to battle cybersecurity risks - 卡塔尔世界杯常规比赛时间","og_description":"actionable intelligence for tax, accounting, and financial professionals","og_url":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/","og_site_name":"卡塔尔世界杯常规比赛时间","article_publisher":"https:\/\/www.facebook.com\/cpatrendlines","article_author":"https:\/\/www.facebook.com\/donnyitk\/","article_published_time":"2024-03-13t04:00:29+00:00","article_modified_time":"2024-08-30t03:53:39+00:00","og_image":[{"width":1216,"height":506,"url":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/10\/cybersecuritychecklist_adobestock_602385731-e1698685193417.jpeg","type":"image\/jpeg"}],"author":"donny shimamoto","twitter_card":"summary_large_image","twitter_creator":"@cpa_trendlines","twitter_site":"@cpa_trendlines","twitter_misc":{"written by":"donny shimamoto","est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"article","@id":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#article","ispartof":{"@id":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/"},"author":{"name":"donny shimamoto","@id":"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff"},"headline":"six steps to battle cybersecurity risks","datepublished":"2024-03-13t04:00:29+00:00","datemodified":"2024-08-30t03:53:39+00:00","mainentityofpage":{"@id":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/"},"wordcount":832,"commentcount":0,"publisher":{"@id":"\/\/www.g005e.com\/#organization"},"image":{"@id":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#primaryimage"},"thumbnailurl":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/10\/cybersecuritychecklist_adobestock_602385731-e1698685193417.jpeg","keywords":["cybersecurity"],"articlesection":["advisory & consulting","innovation & change management","management","pro member exclusive","risk management","tech and fintech"],"inlanguage":"en-us","potentialaction":[{"@type":"commentaction","name":"comment","target":["\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#respond"]}]},{"@type":"webpage","@id":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/","url":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/","name":"six steps to battle cybersecurity risks - 卡塔尔世界杯常规比赛时间","ispartof":{"@id":"\/\/www.g005e.com\/#website"},"primaryimageofpage":{"@id":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#primaryimage"},"image":{"@id":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#primaryimage"},"thumbnailurl":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/10\/cybersecuritychecklist_adobestock_602385731-e1698685193417.jpeg","datepublished":"2024-03-13t04:00:29+00:00","datemodified":"2024-08-30t03:53:39+00:00","description":"actionable intelligence for tax, accounting, and financial professionals","breadcrumb":{"@id":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#breadcrumb"},"inlanguage":"en-us","potentialaction":[{"@type":"readaction","target":["\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/"]}]},{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#primaryimage","url":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/10\/cybersecuritychecklist_adobestock_602385731-e1698685193417.jpeg","contenturl":"\/\/www.g005e.com\/wp-content\/uploads\/2023\/10\/cybersecuritychecklist_adobestock_602385731-e1698685193417.jpeg","width":1216,"height":506},{"@type":"breadcrumblist","@id":"\/\/www.g005e.com\/2024\/03\/13\/by-donny-shimamoto-cybersecurity-for-accountants-six-action-steps-to-mitigate-cybersecurity-risks-donny\/#breadcrumb","itemlistelement":[{"@type":"listitem","position":1,"name":"home","item":"\/\/www.g005e.com\/"},{"@type":"listitem","position":2,"name":"advisory & consulting","item":"\/\/www.g005e.com\/category\/advisory\/"},{"@type":"listitem","position":3,"name":"six steps to battle cybersecurity risks"}]},{"@type":"website","@id":"\/\/www.g005e.com\/#website","url":"\/\/www.g005e.com\/","name":"卡塔尔世界杯常规比赛时间","description":"actionable intelligence for the tax, accounting and finance community","publisher":{"@id":"\/\/www.g005e.com\/#organization"},"potentialaction":[{"@type":"searchaction","target":{"@type":"entrypoint","urltemplate":"\/\/www.g005e.com\/?s={search_term_string}"},"query-input":{"@type":"propertyvaluespecification","valuerequired":true,"valuename":"search_term_string"}}],"inlanguage":"en-us"},{"@type":"organization","@id":"\/\/www.g005e.com\/#organization","name":"卡塔尔世界杯常规比赛时间 research","alternatename":"cpatrendlines","url":"\/\/www.g005e.com\/","logo":{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/#\/schema\/logo\/image\/","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2018\/08\/cpat-header-logo-with-blurb-7118_cpat_masthead-copy.jpg","width":1600,"height":350,"caption":"卡塔尔世界杯常规比赛时间 research"},"image":{"@id":"\/\/www.g005e.com\/#\/schema\/logo\/image\/"},"sameas":["https:\/\/www.facebook.com\/cpatrendlines","https:\/\/x.com\/cpa_trendlines","https:\/\/www.linkedin.com\/groups\/115382\/","https:\/\/www.youtube.com\/cpatrendlines"]},{"@type":"person","@id":"\/\/www.g005e.com\/#\/schema\/person\/9c1852e4cca93231de8e24626f145aff","name":"donny shimamoto","image":{"@type":"imageobject","inlanguage":"en-us","@id":"\/\/www.g005e.com\/#\/schema\/person\/image\/","url":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png","contenturl":"https:\/\/cpatwpe.s3.amazonaws.com\/cpatrendlines\/wp-content\/uploads\/2020\/09\/donny-shimamoto-2020-larger-96x96.png","caption":"donny shimamoto"},"description":"donny c. shimamoto, cpa.citp, cgma, is the founder and managing director of intraprisetechknowlogies llc, a specialized cpa firm dedicated to helping small businesses and middle market organizations leverage strategic technologies, proactively manage their business and technical risks, and enable balanced organizational growth and development.","sameas":["http:\/\/intraprisetechknowlogies.com","https:\/\/www.facebook.com\/donnyitk\/","https:\/\/www.linkedin.com\/in\/donnyitk\/"],"url":"\/\/www.g005e.com\/author\/donny-shimamoto\/"}]}},"_links":{"self":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/118110","targethints":{"allow":["get"]}}],"collection":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/users\/1382"}],"replies":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/comments?post=118110"}],"version-history":[{"count":7,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/118110\/revisions"}],"predecessor-version":[{"id":118830,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/posts\/118110\/revisions\/118830"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/media\/118125"}],"wp:attachment":[{"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/media?parent=118110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/categories?post=118110"},{"taxonomy":"post_tag","embeddable":true,"href":"\/\/www.g005e.com\/wp-json\/wp\/v2\/tags?post=118110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}