Skip to content
sikich logo

Sikich LLP

Services to Strengthen Your Business

  • Services
    • Services
    • Technology Solutions
      • Technology Solutions
      • Enable Your Workforce
      • Modernize Your ERP
      • Protect Your Data
      • Engage Your Customers
      • Digitally Transform Your Business
      • Manage Your IT
      • Migrate Your IT to the Cloud
      • Products
      • Watch Livestreams
    • Accounting, Tax & Audit
      • Accounting, Tax & Audit
      • Accounting
      • Tax
      • Audit & Assurance
      • Title IV
    • Advisory
      • Advisory
      • Business Succession Plan
      • Forensic & Valuation
      • Insurance Services
      • Human Capital Management & Payroll
      • Wealth Management
      • Transaction Advisory
      • Investment Banking
      • Supply Chain
      • Marketing & Communications
      • Retirement Plan Services
  • Industries
    • Industries
        • Manufacturing
          • Discrete Manufacturing
          • Industrial Equipment Manufacturing
          • Manufacturing
        • Life Sciences
        • Agriculture
        • Government Contractors
        • Retail
        • Financial Services
        • Construction & Real Estate
        • Not-For-Profit
        • Government
        • Distribution & Supply Chain
        • Professional Services
        • Title IV Audit & Consulting
        • Automotive
  • Insights
    • Insights
    • COVID-19 Resource Page
    • Blog & Resources
    • News
    • Events
    • Lessons From Leadership
  • About
    • About
    • Our Company
    • Our People
    • Locations
    • Awards
    • Partnerships
  • Careers
  • Make a Payment
  • Contact

Security

View All Sikich Insights
cybersecurity requirements

Evolving Security

Reading Time: 5 minutes
  • January 21, 2021
  • Security | Technology
“Change is the only constant.” That is an idea we accept in both our own lives and the world of technology. Within the technology…
Read More
Cheryl-Aschenbrener-Featured-in-WICPA-On-Balance

Cheryl Aschenbrener Featured in WICPA’s On Balance Publication

Reading Time: 1 minute
  • January 15, 2021
  • Accounting | COVID-19 | Distribution | Manufacturing | News | Security | Tax | Technology
Cheryl Aschenbrener’s article, “Top Trends and Topics for Manufacturers” was featured in the Wisconsin Institute of CPAs’ (WICPA) publication, On Balance. This article provides…
Read More
single sign-on

How to Keep Single Sign-on Secure

Reading Time: 3 minutes
  • December 22, 2020
  • Information Technology | Security | Technology
Single Sign-on or SSO is an IT buzzword that you probably have seen or heard over the past few years, especially when dealing with…
Read More
keeping Business Central data secure

How to Make Sure Your Business Central Data Is Safe During the COVID-19 Pandemic

Reading Time: 3 minutes
  • December 7, 2020
  • COVID-19 | Dynamics 365 Business Central | Security | Technology
During this COVID-19 pandemic, many things are rapidly changing and creating a lot of uncertainties for businesses. This can be quite a stressful time,…
Read More

Microsoft MFA Update

Reading Time: 3 minutes
  • November 23, 2020
  • Security | Technology
I wrote a blog almost two years ago illustrating what MFA (Multifactor Authentication) was and why you need it. As a quick recap, it is…
Read More
credit unions

Top Cybersecurity Considerations for Community Banks and Credit Unions

Reading Time: 7 minutes
  • October 19, 2020
  • Security | Technology
Small community banks and credit unions have unique challenges when it comes to cybersecurity. They manage systems and data that are some of the…
Read More
RFID card security

RFID Card Security and Attacks

Reading Time: 8 minutes
  • October 15, 2020
  • Security | Technology
In a previous blog post, we discussed what a radio frequency identification (RFID) access card is, what the risks associated with RFID cards, how…
Read More
ransomware attack priorities

Immediate Response Priorities and Pitfalls to Avoid during a Ransomware Attack

Reading Time: 4 minutes
  • October 13, 2020
  • Security | Technology
If your network experiences a ransomware attack, it is likely that your IT staff will want to immediately begin researching and working to stop…
Read More
Microsoft Family Group cell phone

Microsoft Family Group – Protecting Your Child’s Cell Phone Use

Reading Time: 5 minutes
  • October 9, 2020
  • Security | Tips & Tricks
I discussed in a previous blog about how Microsoft’s Family Group service can help lock down a laptop or computer to be used by…
Read More
Office 365 SMTP AUTH

Microsoft Office 365 SMTP AUTH, Email Relay, and Header Analyzer Tool

Reading Time: 3 minutes
  • October 5, 2020
  • Office 365 | Security | Technology
Traditionally, even when moving to the cloud, it’s rare to move everything to the cloud. There is usually a need for an on-premise server…
Read More
Netlogon vulnerability

What You Need to Know About the Netlogon Vulnerability

Reading Time: 1 minute
  • September 14, 2020
  • Security | Technology
Last month, as part of their monthly rollup, Microsoft released a fix for CVE-2020-1472, a critical vulnerability in Netlogon that allows elevation of privileges….
Read More
Tech-Bong-NBC-Milwaukee

Kevin Bong Featured on NBC Milwaukee

Reading Time: 1 minute
  • September 3, 2020
  • COVID-19 | News | Security | Technology
Kevin Bong was interviewed on NBC Milwaukee about ransomware attacks during the pandemic. Kevin, MS, PCICFI, QSA, CISSP, CISA, PMP, GSE, GGIH, GCIA, GPPA,…
Read More
empty manufacturing warehouse with boxes and equipment stored along the walls

The “New Normal” Continues in the Manufacturing Industry: A Roundtable Recap

Reading Time: 4 minutes
  • August 26, 2020
  • Accounting | COVID-19 | Distribution | Human Resources | Manufacturing | Security | Technology
This article is based on a recent conversation I had with leading manufacturers in the Midwest during a roundtable discussion. Workspace changes, remote work…
Read More
password management

Protect Your Data, Protect Your Company

Reading Time: 6 minutes
  • August 21, 2020
  • Security | Technology
With more devices, applications, networks, and users, the complexity of password management and protecting your business’ data continues to grow. There are a few…
Read More
cyber security threat prep

Preparing for Cyber Security Threats

Reading Time: 4 minutes
  • August 18, 2020
  • Security | Technology
On July 23, 2020, the fitness brand Garmin was hit by ransomware. This particular ransomware was called WastedLocker and was developed by members of…
Read More
practicing your incident response plan

The Importance of Practicing Incident Response

Reading Time: 4 minutes
  • July 29, 2020
  • Security | Technology
During times of stress, you can find kind people helping. Unfortunately, you can also find people trying to exploit vulnerabilities created by fear and…
Read More

Manufacturers and distributors neglect key cybersecurity activities, report finds

Reading Time: 4 minutes
  • July 22, 2020
  • Accounting | Audit and Tax | Distribution | M&D Report | Manufacturing | News | Press Releases | Security | Technology
CHICAGO — July 22, 2020 — Less than 40% of respondents in Sikich’s 2020 Manufacturing and Distribution Report said they perform important data breach prevention…
Read More
NetSuite file security for expense reporting

Enhanced NetSuite File Security 2020.1: Expense Reporting

Reading Time: 2 minutes
  • June 24, 2020
  • NetSuite | Security | Technology
Need a GDPR-compliant expense reporting tool? Look no further than the NetSuite Expense Reporting module, which has newly enhanced file security for sensitive attachments…
Read More
IP security

Thick as IP Thieves

Reading Time: 7 minutes
  • June 18, 2020
  • Security | Technology
Organizations want to believe that they can trust their employees with intellectual property (IP) security. In fact, to even hint at the idea that…
Read More
passwordless authentication

Passwordless Authentication

Reading Time: 4 minutes
  • June 9, 2020
  • Security | Technology
Passwordless authentication? Typical reactions to this phrase include “how is that possible?” or “how is that secure?” Passwords have been around since the 1960s…
Read More
Page1 Page2 Page3 Page4 Page5

Accounting, Tax & Audit

  • Accounting
  • Tax
  • Audit

Technology

  • Products
  • ERP & CRM Services
  • Business Intelligence
  • Office 365
  • Cloud & Infrastructure
  • Security & Compliance

Advisory

  • Business Succession Planning
  • Forensic & Valuation
  • Human Resources
  • Marketing & Design
  • Public Relations
  • Retirement Plan Services
  • Investment Banking
  • Supply Chain
  • Insurance
  • Wealth Management
  • Transaction Advisory Services

Company

  • About Sikich LLP
  • Corporate Development
  • Locations
  • Partners
  • Careers
  • News
  • Events
  • Blog
  • Client Login

Connect With Us

Facebook
Twitter
Youtube
Linkedin

©2020 All Rights Reserved.   Privacy Policy   Disclaimer

white sikich logo