Our Thoughts On

Sort by

Categories
Authors

Schneider Downs Professional

Articles 111 - 119 of 119

Simple Data Analysis Guides Crucial Business Decisions: What Information Guides Your Decisions?

Can you confidently answer the following questions? What is the revenue collection rate for each of your customers? What is the actual expense to service

Cybersecurity, Where Do We Begin? Measuring Your Organization's Security with NIST Cybersecurity Framework

The concept of cybersecurity can be a daunting thought. The world of information technology alone is filled with complexity, then you add in business requirements

FFIEC Cybersecurity Assessment Tools Released - Are You Prepared?

Remember the FFIEC Pilot Program? The assessment is here! On June 30, 2015, the Federal Financial Institutions Examination Council (FFIEC) released its

Quality of Earnings Reports in M&A Transactions

Performing thorough due diligence is a must in M&A transactions. The acquirer will often want a Quality of Earnings (Q of E) report prepared by an
Register to receive our weekly newsletter with our most recent columns and insights.

Understanding the Purpose of a Loan's Financial Covenants

“I haven’t missed a single payment.” That is a sentence I have heard from almost every struggling borrower I have represented. The client

ASEC Issues Exposure Draft to Revise TSP Section 100, Trust Services Principles and Criteria for SOC 2 Reports

On June 15, the Assurance Services Executive Committee (ASEC) of the American Institute of CPAs (AICPA) issued an exposure draft proposing revisions to

FFIEC Announces Results of New Cybersecurity Assessment

The Federal Financial Institutions Examination Council (FFIEC) has established its priorities for the remainder of 2015 as a result of the recent FFIEC

Use Bridge Analysis for Better Planning and Measurement

For those of you who have not performed bridge analysis, it is a way to analyze your performance against a benchmark (prior year, budget, latest forecast)
Register to receive our weekly newsletter with our most recent columns and insights.

Preventing Cyberattacks and Data Breaches via Employee Awareness Training and Phishing Simulations

One of the findings in Verizon’s most recent Data Breach Report is that stolen credentials are the root cause of data breaches 80% of the time. The
Register to receive our weekly newsletter with our most recent columns and insights.

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×