Learn more about the case Connelly v. United States. ...
This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.
I recently read a startling whitepaper titled “Cash is King: Who’s Wearing Your Crown?” in which two researchers simulated an attack on an accounting system, making changes to the underlying data structure and ultimately causing the system to send payments to malicious parties. In one of the more disturbing examples, the researchers changed customer address and check name records, causing the system to send refund checks made out in their name to an address they specified.
Here are a few steps your accounting system users can take to reduce such a risk:
Schneider Downs Technology Advisors provides risk assessment and security vulnerability services. Please contact Schneider Downs Technology Advisors for a confidential consultation.
© 2014 Schneider Downs. All rights-reserved. All content on this site is property of Schneider Downs unless otherwise noted and should not be used without written permission.
This advice is not intended or written to be used for, and it cannot be used for, the purpose of avoiding any federal tax penalties that may be imposed, or for promoting, marketing or recommending to another person, any tax related matter.
Learn more about the case Connelly v. United States. ...
Learn more about the case Connelly v. United States. ...
We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.
Ask us
[email protected]
p:412.261.3644
f:412.261.4876
[email protected]
p:614.621.4060
f:614.621.4062
[email protected]
p:571.380.9003