sikich logo
  • Services
    • Services
    • Technology Solutions
      • Technology Solutions
      • HEADSTART℠ Implementations
      • Modern Workplace
      • ERP Services
      • CRM Services
      • Cybersecurity
      • IT and Security Managed Services
      • Cloud Services
      • Digital Transformation
      • CRM and ERP Products
      • Spend Management
    • Accounting, Audit, Tax & Consulting
      • Accounting, Audit, Tax & Consulting
      • Outsourced Accounting
      • Audit & Assurance
      • Tax
      • Consulting Services
    • Advisory
      • Advisory
      • Business Succession Plan
      • Business Transformation
      • Forensic & Valuation
      • Human Capital Management & Payroll
      • Insurance Services
      • Regulatory, Quality & Compliance
      • Site Selection & Incentives
      • Transaction Advisory
      • Wealth Management
      • Investment Banking
      • Supply Chain
      • Marketing & Communications
      • Retirement Plan Services
      • Governance, Risk and Compliance Services
      • Workforce Risk Management
  • Industries
    • Industries
        • Manufacturing
          • Discrete Manufacturing
          • Industrial Equipment Manufacturing
          • Manufacturing
        • Life Sciences
        • Agriculture
        • Government Contractors
        • Financial Services
        • Construction & Real Estate
        • Not-For-Profit
        • Government
          • Federal Government
          • State & Local Government
          • Government
        • Distribution & Supply Chain
        • Professional Services
        • Title IV Audit & Consulting
  • Insights
    • Insights
    • COVID-19 Resources
    • Blog & Resources
    • News
    • Events
    • Lessons From Leadership
  • About
    • About
    • Our Company
    • Our People
    • Locations
    • Awards
    • Partnerships
  • Careers
  • Contact

Security

View All Sikich Insights
Many business people meeting standing in row with arms crossed and confident. Company organization employee unity and support. Concept of corporate partnership and human resources growth management.

All-in-One Vendor Relationship: How to Choose a Preferred Partner for Your Next Transaction

Reading Time: 6 minutes
  • September 21, 2021
  • Human Resources | Marketing & Communications | Public Relations | Security | Tax | Technology | Transaction Advisory Services
Ready for the understatement of the year? Mergers and acquisitions can get really complicated really fast. Think of something between solving a Rubik’s Cube…
Read More
Understanding Vulnerability management

Understanding Vulnerability Management

Reading Time: 7 minutes
  • August 6, 2021
  • Security | Technology
There are some common themes that you pick up on after a few years of doing consulting with organizations, one of them is just…
Read More
PCI DSS Version 4.0

PCI DSS Version 4.0 – Updated Release Schedule

Reading Time: 2 minutes
  • July 19, 2021
  • Security | Technology
The Payment Card Industry Security Standards Council (PCI SSC) recently announced an updated release schedule for version 4.0 for the PCI Data Security Standard…
Read More
wireless mouse and keyboard attack

Ahhh! My Mouse and Keyboard Were Hacked!

Reading Time: 4 minutes
  • June 23, 2021
  • Security | Technology
The concept of manipulating and compromising wireless devices is nothing new. Most wireless attacks that are conducted today are geared toward specific devices, such…
Read More
Kevin-Bong-Featured-in-BizTimes-Milwaukee

Kevin Bong Featured in BizTimes Milwaukee

Reading Time: 1 minute
  • May 26, 2021
  • Distribution | M&D Report | Manufacturing | News | Security
Kevin Bong was featured in a BizTimes Milwaukee article, “Shop talk: Constructing a cybersecurity strategy.” The article also cites cybersecurity findings from the Sikich…
Read More
on-premises Exchange Server attack

Yet Another On-Premises Exchange Server Hack Reported

Reading Time: 2 minutes
  • May 12, 2021
  • Office 365 | Security | Technology
You’ve most likely heard that Colonial Pipeline out of North Carolina fell victim to ransomware last week, which forced the company to take down…
Read More
M&D-Pulse-Results-featured-in-manufacturing-publications

M&D Pulse Results Featured in Manufacturing Publications

Reading Time: 1 minute
  • May 10, 2021
  • Accounting | COVID-19 | Distribution | Equipment manufacturing | M&D Report | Manufacturing | News | Security | Tax | Technology
The Manufacturing & Distribution Industry Pulse results were featured in manufacturing publications, including DC Velocity, Supply and Demand Chain Executive and Supply Chain Quarterly….
Read More
moving Microsoft MFA app data to new phone

New Phone – Time to Update your MFA

Reading Time: 4 minutes
  • April 29, 2021
  • Security | Technology
I’ve written previous blogs on why you need MFA enabled on your accounts and an update to the user experience from Microsoft. So, now…
Read More
group of professional manufacturers reviewing a white board together

Mary O’Connor Featured in IndustryWeek

Reading Time: 1 minute
  • April 23, 2021
  • Distribution | Forensic & Valuation | Manufacturing | News | Security | Technology
Mary O’Connor’s article about fraud and cybersecurity challenges facing manufacturers was featured in IndustryWeek. Mary, ASA, CFE, has worked exclusively in the field of…
Read More

Passwordless Authentication in Azure and Microsoft 365 – In Public Preview Now

Reading Time: 4 minutes
  • April 23, 2021
  • Azure | Security | Technology
As people still work from home, IT still needs to manage security. The holy grail of high security and convenience is passwordless authentication. Passwordless…
Read More
Close up businessman hand typing or working on laptop for programming about cyber security , advance future technology concept

Cybersecurity guidance for plan sponsors and participants released by the DOL

Reading Time: 1 minute
  • April 20, 2021
  • Accounting | Security | Technology
On April 14, the Department of Labor’s (DOL) Employee Benefits Security Administration released its first official cybersecurity guidance. This guidance, which includes best practices…
Read More
PAN PCI DSS compliance

The Eight-Digit BIN Mandate and How It Impacts PAN PCI DSS Compliance

Reading Time: 4 minutes
  • April 16, 2021
  • Security | Technology
The International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), jointly referred to as ISO/IEC JTC1, released standard ISO/IEC 7812-1, “Identification cards –…
Read More
protection from kerberoasting attacks

Protecting Your Network from Kerberoasting Attacks

Reading Time: 3 minutes
  • April 14, 2021
  • Security | Technology
Kerberoasting is a common attack used by malicious actors once access is gained to a organization’s internal network and a domain account is compromised….
Read More
Salesforce multifactor authentication

Salesforce Announces New Security Requirements for Organizations

Reading Time: 3 minutes
  • April 7, 2021
  • Salesforce | Security | Technology
Earlier this year, Salesforce made an announcement that there will be a new requirement for all organizations using Salesforce. Beginning on February 1, 2022,…
Read More
HR security

Security Awareness Tips for the Hiring Uptrend

Reading Time: 5 minutes
  • March 24, 2021
  • Human Resources | Security | Technology
Forbes recently released an article predicting that employment trends may move up. Moving to COVID-19-free life, new COVID support plans, and the coming seasonal…
Read More
IoT devices security

Securing IoT Devices

Reading Time: 4 minutes
  • February 1, 2021
  • Industry 4.0 | Information Technology | Security | Technology
Internet of things or IoT devices have become very popular in the last few years, and that has many security implications. The convenience of…
Read More
farmer plowing his fields at sunset

Why Are Hackers Suddenly Targeting the Agriculture Industry?

Reading Time: 3 minutes
  • January 29, 2021
  • Security | Technology
Feed mills, commercial farms, and other agriculture industry businesses have for a long time enjoyed a relatively low risk from cyberattacks, storing minimal sensitive…
Read More
cybersecurity requirements

Evolving Security

Reading Time: 5 minutes
  • January 21, 2021
  • Security | Technology
“Change is the only constant.” That is an idea we accept in both our own lives and the world of technology. Within the technology…
Read More
Cheryl-Aschenbrener-Featured-in-WICPA-On-Balance

Cheryl Aschenbrener Featured in WICPA’s On Balance Publication

Reading Time: 1 minute
  • January 15, 2021
  • Accounting | COVID-19 | Distribution | Manufacturing | News | Security | Tax | Technology
Cheryl Aschenbrener’s article, “Top Trends and Topics for Manufacturers” was featured in the Wisconsin Institute of CPAs’ (WICPA) publication, On Balance. This article provides…
Read More
single sign-on

How to Keep Single Sign-on Secure

Reading Time: 3 minutes
  • December 22, 2020
  • Information Technology | Security | Technology
Single Sign-on or SSO is an IT buzzword that you probably have seen or heard over the past few years, especially when dealing with…
Read More
« Previous Page1 Page2 Page3 Page4 Page5 … Page9 Next »

Accounting, Audit, Tax & Consulting

  • Outsourced Accounting
  • Audit
  • Tax
  • Consulting

Technology

  • Products
  • ERP & CRM Services
  • Business Intelligence
  • Office 365
  • Cloud & Infrastructure
  • Security & Compliance

Advisory

  • Business Succession Planning
  • Forensic & Valuation
  • Human Capital Management
  • Marketing & Communications
  • Retirement Plan Services
  • Investment Banking
  • Supply Chain
  • Insurance
  • Wealth Management
  • Transaction Advisory Services
  • Site Selection and Incentives
  • Regulatory, Quality & Compliance
  • Corporate Governance, Risk and Compliance
  • Workforce Risk Management

Company

  • About Sikich LLP
  • Corporate Development
  • Locations
  • Partners
  • Careers
  • News
  • Events
  • Blog
  • Client Login
  • Make a Payment

Connect With Us

Facebook-f Twitter Youtube Linkedin-in

©2023 All Rights Reserved.   Privacy Policy   Disclaimer

white sikich logo

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in settings.

Sikich LLP
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.