Over twenty-five years ago I met with a new client who told me why he fired his last accounting firm. He received a phone call from a good samaritan that the person had found
my client’s tax records in a phone booth. Apparantly, his CPA (from one of the largest CPA firms) had left my client’s tax records when he stopped to make a call in a phone booth.
There are so many opportunties in every business week, to compromise security. The article, 3 big security blunders You don’t know you’re making by Angela Stringfellow set up some blunders, guidelines and solutions:
- Not implementing a mobile security policy. Protable devices are a security nightmare. In our CPA firm, nobody is to keep client’s records on a USB drive. We require that if a CPA (or bookkeeper) transfers information from a client’s computer to a laptop computer to be worked on later, we require their USB drive be erased and access to the laptop have a password. In addition, if the CPA (or bookkeeper) are accounting records, the access to those records be secured by a password. The mobile device referred to in the article are devices like cell phones and ipads that can log into a company’s server. For those kind of security breaches, the author recommends NQ Mobile to secure all mobile devices across the board.
- Using cloud-based applications without security precautions. More and more CPA and accounting applications are developed on a cloud. You wonder how secure they are, and how secure your connection is. The author recommends that you understand that a cloud has 24/7 security with an adequate staff. As CPA’s we are the hub of clients’ information, so our security should be deliberate.
- Failing to test third-party applications. This flaw is more technical than most CPAs can understand, but what the author states is that eventhough third-party applications test for security, a company’s internal security system can be compromising them. “The most common—and most dangerous—security flaws introduced by third-party apps include SQL injection and Cross-Site Scripting (XSS),” according to the author. The bottom line is to hire a company to assess your security protocols, and how that interact with third-party software.
Your company’s data is your lifeblood. But your concern must go beyond the company’s computers and to those who share your data like your attorney and CPA. The analysis should also work its way to your company procedures and empolyees. As a CPA firm, we have different measures to secure client’s check stock, tax returns, financial statements, personal information, etc.

Twenty-five years ago worked in a CPA firm with a woman whose father directed orchestras for major films. She informed me about an orchestra director secrets like the isometrics he would perform to build up his arms, the focus of his eyes, and the rhythm of his body language. The artistic part obviously was the message he was projecting the orchestra to play. The “business” though, was the set of tools and discipline that he had mastered in order to project his musical vision. Both were equally important.
Whether ’tis Nobler in the mind to suffer the stings and angles of outrageous tax planning, or to take hold against a sea of tax pitfalls, and by addressing them : to not cry, to sleep more soundly.
Have you ever watched a mountain climbing movie or documentary where they have to cross a glacier that is covered with snow. The climbers move at a snail’s pace checking the ground in front of them for a hidden crevasse. One bad step and they can drop a hundred feet into a icy grave. Certainly not the environment for a mild mannered CPA.
I worked in my family’s Italian restaurant as a pizza cook during my teen years and even today I still have to taste pasta to know for sure that it is done. Another way is to throw it against the wall and see if it sticks. That’s too messy.
I grew up in a family of entrepreneurs. Most of my uncles were some form of contractor: General, electrical, and plumbing. Prior to becoming a CPA, I learned a little about these trades from them which helped me when I built my own house. They were (and are) masters at their trades and deserve the greatest of respect.
Two respected strategist friends and I had lunch discussing new service businesses. Erik asked how much a person should charge when creating a newer field. Robert responded that there is no magic “price,” but that you should base it on the value you are creating (or saving) the client. In other words, if your services are saving the client $1 million dollars, a fee of $50,000 is not unreasonable, especially if nobody else has your skill set.
Recently I led a strategy meeting for the Association for Strategic Planning, Los Angeles Chapter (ASP). What made this exercise unusual is that even though was the Chapter President, I was not the only strategist in the room. In fact, there were several proven strategists who had more experience in me in the area of strategic planning. Moreover, I am a CPA, a profession that usually doesn’t embrace strategy and deals in the past of historical financial statements. So, what is a Strategic Leader?
I remember the days when our young ones were in childcare. We would allot the maximum amount allowed under my wife’s flexcare (or cafeteria) plan in order to deduct as much of childcare on our tax return.
Almost two years ago, I invited my social networking guy, Gregg Towsley (of