Blog

Deregulation in Healthcare Industry Results in New Opportunities

The healthcare industry continues to evolve at a rapid pace…. Read more »

Blog

Tax Break for Commercial Real Estate Investors

COVID-19 impacted the economy dramatically and commercial real estate was… Read more »

Blog

Phishing: How to recognize an email scam and protect yourself

In this technological age, phishing — a form of hacking… Read more »

Blog

How to Find AWS and Azure Open Cloud Storage Areas

Many of us have periodically seen news stories involving the… Read more »

Blog

Growing Complexities of Contingent Consideration

Contingent consideration is a tool being used more commonly in transactions that requires sellers to “prove their worth” by tying a portion of the purchase price post-close to certain metrics or hurdles

Blog

How Social Security Benefits Are Affected by Earned Income

Thanks to the Great Resignation trend over the past year,… Read more »

Blog

Three Tenets of Information Security

The CIA triad of confidentiality, integrity, and availability is at the heart of information security.

Blog

Security Controls: 3 Categories You Need to Know

There are three primary areas that security controls fall under. These areas are management security, operational security and physical security controls.

Blog

Why You Should Not Use an Admin Account

An account with administrative access has the power to make major changes to a system, good and bad. While an administrator would hopefully not do anything nefarious to his/her company’s systems purposefully, the act of using administrative accounts for daily activities can lead to just that.

Blog

Spotlight on fraud in the manufacturing industry

This blog covers questions like: How much does fraud cost? Which schemes are most common? How can we fight fraud? How should victims handle allegations?