This eBook outlines 20 different cybersecurity risk categories that can impact your organization, detailing how to identify and address them.
By Paul Calabrese, Principal It may surprise you, but even government agencies get confused when it comes to which cost principles apply to a commercial government contractor (GovCon) versus a nonprofit organization. Typically, GovCons obtain federal procurement contracts while nonprofits receive financial assistance awards as grants or cooperative agreements. So, what happens when the agency…
Audit Partner, Amy Boland, CPA has been named the new Director of Audit at GRF CPAs & Advisors (GRF). Effective June 1, 2022, Ms. Boland succeeds Terri M. McKnight who has led the audit department at GRF since 2022.
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Your organization’s reputation can be influenced by a variety of factors including brand image, online reviews, social media presence, customer experience, and more. Each of these elements factors into the overall image of the organization. When it comes to your internet reputation, important elements are different…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Have you ever wondered how end users view your company? Is your domain seen as safe and trusted? Is your website optimized? These are just some of the areas that business analytics tools assess to evaluate your brand. Every organization is adapting to the changing digital…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series While web ranking is not necessarily a security concern, having insight into the popularity of your website helps measure the success of ad campaigns, assess visitor engagement with your content, and identify opportunities for growth. Web ranking sites include Alexa, Cisco, and Majestic, and each site…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series When downloading a new app, be sure it’s from a credible source. Hackers can create fraudulent applications that look very similar in name or appearance to well-known apps. To make matters worse, these fake apps can sometimes be found on trusted sites like the Apple or…
GRF Cybersecurity Risk Assessment and Scorecard Blog Series Fraudulent domains look very similar to your organization’s domain name and are used to fool people into thinking they are interacting with you. These domains are often used in phishing attacks, which according to CSO Online, account for more than 80% of all reported security incidents….