Articles

How to Keep Up With Constantly Changing Cybersecurity Threats

Technology is a consistently evolving field. While this is certainly great for end users who are constantly having their problems solved, those actually working with these tools very often find that it’s difficult to keep up with the latest changes. This is nowhere more apparent than within cybersecurity. Much like other technological fields, hacking innovations don’t come out of nowhere. They build upon previous iterations, trying to improve what worked before and leaving behind what didn’t. In this way, many of today’s threats are both extremely familiar and yet entirely new. Regardless, those working in cybersecurity have a duty to […]

Four ways a business degree can prepare entrepreneurs for economic volatility

Economic volatility is a fact of life – and an omnipresent one for business leaders and managers. With forces like globalization, shifting regulations, evolving tariff and tax laws, surges in supply and demand and technological disruption routinely upending the conventional wisdom that guides many business owners, the reality of economic instability means that all new entrepreneurs are assuming a significant risk by stepping into the fray. The key factor that separates economic volatility from some of the other risk factors that businesses face is that economic volatility takes place on a significantly larger scale and involves drivers that the individual […]

Ethical Hacking and Morality: The Gray Area

Ethical hacking, sometimes known as penetration testing, involves purposeful hacking into a computer network by a qualified data security expert to test for vulnerabilities within a system’s critical infrastructure. A certified penetration tester with the full knowledge of all parties involved is typically under contract to perform the audit. Business, commerce, financial transactions, records, and communication are almost all web- or cloud-based now. Hackers utilize their skills to bypass safety protocols and enter secure networks to install malicious software or steal money, goods, and sensitive information. They can change records, exploit weaknesses, and otherwise wreak havoc on businesses, computer users, […]

Wearable Devices and Securing Your Personal Health Information

Wearable health technology has become wildly popular over the past few years. Fitbit®, Apple®, Samsung®, and Garmin® are a few the 55 different companies that have capitalized on the wearable health device craze. According to ABI Research, a division of Advanced Telematic Systems, by the end of 2018, some 780 million wearable devices will be on the market. People look to these devices to learn about their sleep patterns, calorie intake, blood pressure, heart rate, and glucose levels – while companies such as IBM® and Medtronic® have developed platforms that enable healthcare staffers to get a more comprehensive picture of […]

The Keys to a Successful Audit From Start to Finish

If you’re on the path to obtaining your master’s in accounting, you have likely learned the theories, steps and facts associated with performing audits. However, you may be feeling anxious when it comes time to venture into your first real audit. Read on to learn more about making your first solo audit as productive and stress-free as possible: Step #1: Identify the scope and purpose In many cases, you will be provided with the reason behind an audit, whether to ensure compliance with new IRS regulations or to prepare a business for sale. However, part of being a valuable asset in accounting is the ability to pinpoint and […]

Chip Cards and Security: Technology to Fight Fraud

Credit card fraud is a problem worldwide, but especially in the United States. In 2015, according to research from Barclays, the U.S. accounted for 24% of total worldwide credit/debit card volume, but a whopping 47% of payment card fraud. The reason for the discrepancy, security experts maintain, is that the U.S. was the last major world economy to transition to the latest in payment card technology: EMV or chip cards. Common in the rest of the world, EMV (which stands for Europay, MasterCard, and Visa, the three companies that originally developed the technology) has been responsible for a dramatic decrease […]

The Possible Implications of a Blockchain Consortium

A blockchain consortium has the potential to change the way accounting is done forever. Although a lot of it is already being discussed and collaborated on, the application of a blockchain consortium may still be a few years out. It will likely impact the future of accounting, which is so many accountants and business professionals have begun to study and prepare for its growth. Disruptions for the Better A blockchain consortium has the potential to make disruptive technology much more manageable and effective, meaning a great potential for new revenue and much more operative efficiency. With a competent blockchain consortium, […]

Protecting Your Identity and Credit Information During The Holidays

The holiday shopping season is an annual bonanza for consumers, businesses, and the national bottom line. In 2020, shoppers spent a record $14 billion on Thanksgiving and Black Friday, according to Forbes. Data from Adobe Digital Index, which reports on digital marketing trends for senior executives, indicates that Cyber Monday injected close to $11 billion into the economy, a 15.1% increase over the year before. Some 37% of cyber sales originated from mobile devices. As pleased as shoppers and retailers may have been, another group also made out like bandits on the biggest shopping days of the year: hackers and […]

What We Can Learn from Three Accounting Debacles

The Enron and Arthur Andersen scandal in 2001 led to the biggest accounting debacle in recent history. The collapse of Enron, though scandalous, holds unique lessons for today’s students and sheds light on how important it is for every company to maintain good accounting practices. As time passes, more debacles arise that perpetuate this lesson. Two recent scandals highlight that there is still much to be learned and applied in the corporate world in terms of accounting best practices. Hewlett-Packard and Autonomy Debacle In 2013, tech giant Hewlett-Packard (HP) took an $8.8 billion hit thanks to its purchase of British […]

The Best-Educated Educators: What You Can Do as a Doctor of Education

Experienced educators like yourself have many choices as to how to grow your career in an industry that continues to evolve with new challenges and rewards. Innovative, collaborative leaders are in high demand, particularly as today’s administrative executives begin to age out of full-time roles and make the transition into retirement. Taking the opportunity to invest in your own education with a terminal degree can make all the difference in reaching your greatest goals for success. Doctor of Education versus Doctor of Philosophy The difference between a Doctor of Education (EdD) and a Doctor of Philosophy (PhD) degree has everything […]