On June 9th, 2023, a new compliance law went into effect that has a significant impact on CPAs. The new requirement, known as the FTC Safeguards Rule, requires all CPAs to implement and maintain a comprehensive cybersecurity program.
The law defines a cybersecurity program as "a set of policies, procedures, and technologies that are designed to protect a CPA's information systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction."
The law requires CPAs to:
- Assess their cybersecurity risks
- Implement appropriate controls to mitigate those risks
- Monitor and test their cybersecurity program on a regular basis
- Report any cybersecurity incidents to the appropriate authorities
- Designate a qualified individual to manage their information security program
The FTC requires CPAs to have the PEN Test and a Vulnerability Assessment. The law also provides for civil and criminal penalties for non-compliance.
In order to help CPAs comply with the new law, Vector Choice is offering a free PEN test and Vulnerability Assessment. These services will help you identify and mitigate your cybersecurity risks.
What is a PEN Test?
A PEN Test is an 'authorized' attempt to gain 'unauthorized' access to a computer system or network. PEN Tests are used to identify and assess security vulnerabilities. This test has a market value of $997.
What is a Vulnerability Assessment?
A Vulnerability Assessment is a process of identifying and assessing security vulnerabilities in a computer system or network. Vulnerability Assessments are used to identify potential security risks and to prioritize remediation efforts. This assessment has a market value of $497.
How can these services help me comply with the new compliance law?
Our PEN Test and Vulnerability Assessment can help identify and mitigate your cybersecurity risks. This will help you meet the requirements of the new cybersecurity law and protect your clients' sensitive data.
As a limited-time special offer to CPAs, we are providing a free PEN Test and Vulnerability Assessment with a qualified information security manager.
To schedule your required PEN Test and Vulnerability Assessment, click the button below.
Watch Our Recent Webinar!
The Top Technology and Security Strategies Every CPA and Client Needs to Know
Are you worried about cybercriminals stealing your sensitive financial information? Do you want to learn about the latest technology and security strategies that can help safeguard your financial future and that of your clients? If so, you won't want to miss our webinar.
- The latest cyber threats facing the financial industry and how to stay ahead of them
- Strategies and tools to protect your sensitive financial information
- Best practices for securing your clients' data
- Real-life examples of cyber attacks and how they were mitigated
Watch this webinar to gain valuable insight and take proactive steps to protect your financial future.
Schedule Your PEN Test or Vulnerability Assessment Today
Cyber Security and Compliance
Other Webinars Of Interest
Cyber Beyond Technology: Understanding Your Cyber Insurance Coverage Before It’s Too Late
Fight the Phish: How Security Awareness Training Can Protect Your Business
Compliancy is NOT Just for Healthcare: Why Your Business Should Stay Up to Date on Your Industry's Compliance Standards
Introducing a New Era in Cybersecurity
Vector Choice and Coro Cybersecurity are two leading cyber security companies that have aligned their services to offer a unified security platform that provides complete protection for your entire organization.
- Gain real-time visibility into your security posture
- Respond to threats quickly and effectively
- Reduce your risk of a data breach
Managed User Services
- In & Outbound Email Spam Filtering
- White and Blacklist in Spam Filter
- Data Loss Prevention
Managed Site Services
- Firewall with IDS/IPS
- Site-to-Site VPN
- Endpoint Protection
- All the Time VPN for Computers
- Web Gateway Security
- Multi-Engine Proxy Scanning
FAQs - Cyber Security
HOW DOES CYBER SECURITY WORK?
Ultimately, it focuses on protecting the identity, the device, and the data, and
how to protect, detect and respond to the inevitable breach. It's not simply
about the four walls of the organization and its data center security.
DOES VECTOR CHOICE HAVE ACCESS TO OUR DATA?
No. We simply install systems within your network that act as a protection
barrier against hackers.
WE HAVE HAD A BREACH AND UPDATED OUR SECURITY. WHAT ELSE COULD WE BE MISSING?
Many of our clients feel falsely secure under their current security measures.
Our free assessment helps to uncover holes in your defenses that could leave
you open for another attack.
DO YOU INSURE YOUR PROGRAM?
While no cyber security provider will guarantee a fail-proof program, we are
incredibly confident in ours because we are constantly searching for the latest
solutions that provide maximum protection. However, we do offer Vector
Cyber Crime Insurance, which is a policy that will insure you in the event of a