Filter by Service
- Audit and Assurance
- Business Development Incentives
- Client Accounting Services
- Cost Reports
- Cost Segregation
- Forensic Accounting, Litigation, and Valuation
- Information Technology Audits
- Investment Management
- Nonprofit Technology Solutions
- Tax Services
- Trusts and Estates
Lumsden McCormick provides resources to assist you as you plan for your business and personal success. Articles published by our accountants, resources available through our affiliation with the BDO Alliance USA and our industry-specific newsletters from our eNewsletter, Numbers First, are listed below. Click here to learn more about our affiliation with the BDO Alliance USA.
To subscribe to our free eNewsletter you may do so online or by contacting Maria Gambacorta.
Click here to download Adobe .pdf reader.
Wednesday, March 22, 2017
A chain is only as strong as its weakest link. When it comes to cybersecurity, the weakest link could be any one of your employees — which is why establishing cybersecurity policies and staff training are critical.
Friday, February 24, 2017
Most people would likely find the idea of fraud against a nonprofit organization abhorrent, but no entity is immune.
Monday, February 6, 2017
New technology breeds new ways for hackers to commit fraud. As businesses increasingly use quick response (QR) codes to connect with customers using smart devices, opportunistic cybercriminals may use them to steal personal information and incur unauthorized charges. Find out … more
Monday, January 2, 2017
It is sometimes said there are two kinds of companies — those that have been hacked and know it, and those that have been hacked but don't know it. Perhaps it's an exaggeration, but the truth is your employees may inadvertently invite cyber criminals into your company's computer systems. … more
Monday, November 14, 2016
Auditors consider all kinds of risks when they prepare financial statements. Here’s how they specifically tackle the issue of IT security in an audit.
Thursday, November 10, 2016
Your cybersecurity "chain" is only as strong as its weakest link. Typically that weakest link is not your network systems, but your employees. Cybercriminals know employees are busy and may not be trained in the warning signs of fraudulent activity. The threat is serious. … more
Wednesday, October 5, 2016
The deadline for the Department of Labor's (DOL's) new final overtime rule is December 1, 2016. While CFOs at most large U.S. companies have been working overtime themselves to prepare for the changes, many small and midsize firms haven't been as quick to react.
Thursday, August 18, 2016
This edition of Nonprofit Standard, available through our affiliation with the BDO Alliance USA, discusses cybersecurity in nonprofits, new GASB pronouncements, considerations for mergers and more.
Thursday, August 18, 2016
If it’s been a few years since you’ve checked in with your third-party vendor, it might be time to evaluate the relationship to make sure that you’re using the best team for the job.
Monday, July 11, 2016
Physical security is one of many considerations when performing an information technology audit; here are nine tips to keep your data safe.