Recent studies reveal scary data about data security and small business. According to a report from Nationwide Insurance 65 percent of business owners surveyed said they've been hit by a cyber-attack, with virus attacks the leading type at 33 percent, followed by phishing at 29 percent. And even though 86 percent of business owners believe that digital risk will continue to grow, only 4 percent of U.S. small business owners have implemented all the cyber security best practices and recommendations from the U.S. Small Business Administration.
Small business owners lose billions of dollars a year as a result of data security lapses. So what can be done to protect your business and your data?
Join us for a 60-minute discussion with our expert panel that will help you better understand the different types of security threats could affect your business as well as the best practices you need to take to ensure that you're doing everything you can defend yourself and minimize the cost of business interruptions, data loss and potential lawsuits from your customers.
Gene Marks is a CRM consultant and the author of six books on business management. Gene bi-weekly Forbes column On CRM is read by tens of thousands of readers. He also writes regularly on business, technology and public policy topics for The Guardian, The Hill, The Philadelphia Inquirer, Forbes, and Entrepreneur and Inc. Magazines. Gene runs a ten person financial and technology management consulting firm near Philadelphia.
Roman H. Kepczyk, CPA is Director of Firm Technology Strategy for Right Networks. His primary focus is helping firms throughout North America effectively use information technology and accounting applications by optimizing their tax, audit and administrative production workflows.
He has spent the past twenty-two years consulting exclusively with CPA firms and prior to that, ten years with the CPA firm of Henry & Horne, (Arizona’s largest regional firm) where he was the partner in charge of the firm's Management Advisory Services and Consulting practices. Roman also served as the firm’s Administrative partner where he oversaw Internal Accounting, Marketing, Human Resources, and was responsible for the creation and implementation of the firm's technology plan and budget.
He is member of AICPA Council, a former member of the AICPA PCPS Executive Committee and a former Chairman of the AICPA's Information Technology Executive Committee. He has served as a member of other AICPA initiatives, including the Special Committee on Enhanced Business Reporting, eBusiness Task Force, IT Best Practices, IT Research, IT Practices Committees, and Group of 100 projects. In addition, he is a former Chairman of the AICPA Top Technologies Task Force
Roman was named by INSIDE Public Accounting as one of the profession’s Most Recommended Consultants for each of the years from 2005 through 2017, CPA Practice Advisors Top 25 Thought Leaders from 2011 through 2019, and Accounting Today’s Most Influential People in Accounting thirteen times.
Roman is also an Advisory Board Member to the CPA Firm Management Association (formerly the Association for Accounting Administration) and has served on the Board of Directors of the Arizona Society of CPAs.
He also authored “Quantum of Paperless: Partners Guide to CPA Firm Optimization” which outlines 32 key CPA best practices.
On a technical level, Roman is an AICPA Certified Information Technology Professional (CITP) and a Certified Lean Six Sigma Black Belt (LSS BB). He authored technology chapters for the PPC MAP Handbook, PPC Guide to Paperless Engagements, and sections of the AICPA MAP Handbook. He is also a regular contributor of articles to the AICPA PCPS, CPA Practice Advisor, Thomson Reuters Audit and Accounting publications and the CPA Firm Management Association’s newsletters.
Eric is the CEO and Chief Security Architect with The McMillen Group, LLC in Plano, Texas. He has been providing consulting services for clients in a wide variety of industries for the last 18 years. Eric’s primary responsibilities are leading risk assessments, IT control reviews, information security assessments, penetration testing, and vulnerability assessments using both cutting-edge technologies and old school techniques for clients in various industries.