Reading Time: 4 minutes The private equity (PE) market is booming driven by the continued influx of capital and record-high multiples. Deal volumes have reached a five-year high and recovery post-COVID is astonishingly better than in the years after similar downturns....
Reading Time: 4 minutes Cybersecurity is typically a topic that arises when a high-profile incident has occurred. Most businesses maintain a basic level of security but do not implement more comprehensive controls because the potential damages are often unknown....
Reading Time: 3 minutes Many businesses rely on service organizations to provide needed services that require access to personally identifiable information (PII) of employees, customers, and suppliers. This often includes payroll providers, financial institutions,...
Reading Time: 3 minutes Managing an employee benefit plan is a challenging task that often requires the services of third-party providers. For many, this may include investment advisors, Third Party Administrators (TPA), plan custodians, and recordkeeping. While they...
Reading Time: 3 minutes Many companies manage their cybersecurity risk with a ‘hide, watch, and react if necessary’ approach. Unfortunately, many fall victim to cyberattacks due to this mentality. They falsely believe if they haven’t yet had a cyber incident, they can...
Reading Time: 5 minutes Data loss happens as a result of a variety of events including accidental damage, deletion, or modification of data, hardware malfunction or failure, local disasters such as fire, flood, or a spilled drink on a computer, lost or stolen devices,...
Reading Time: 3 minutes Calvetti Ferguson co-hosted a webinar focused on cybersecurity challenges in the COVID environment with Dean & Draper Tuesday, August 18, 2020, at 10 – 11 a.m. CDT. Our experts discussed best practices and risks for employees working...
Reading Time: 6 minutes We often get questions from our clients asking about common security issues that we find during engagements. In this article, we want to share with you the top five common issues we encounter and recommendations to help secure your environment....
Reading Time: 5 minutes How much are you willing to pay to get your data back from a ransomware attack? Did you know the average cost for a company to ‘recover’ from a ransomware attack is over $84,000? Keep in mind this average was prior to the global pandemic which...
Reading Time: 5 minutes Managing your vendors can be a time-consuming process. Some larger organizations employ FTEs dedicated solely to vendor oversight and management; others may engage a third-party to execute this function on the organization’s behalf. No matter...
Reading Time: 6 minutes Anyone who has ever been responsible for an organizations’ IT knows of the Catch-22 paradox, those situations with conflicting key requirements that can appear to be at odds with one another. A prime example of this is the balancing act that IT...
Reading Time: 6 minutes In a recent article, we referenced the term “human layer” to describe the employees of an organization and described the importance of remaining vigilant when it comes to providing security training, and then testing whether that training is...