Data Backup for Accounting and Financial Professionals

 

Clients

 

Financial Offices

 

Small Business

 

Medical Offices

 

Scientific User

 

Network Admin

We understand the difficulty involved in complying with new and changing regulations and standards. In an effort to help the financial professionals using our service we have developed a resource center, dedicated to providing information regarding; 1) Regulatory Compliance, 2) Disaster Recovery Planning and 3) Vulnerability Assessment.

These resources should not only help you better understand current regulatory and compliance issues, but should also help in developing a comprehensive contingency plan.

A secure and scheduled data backup system is an important aspect of regulatory compliance, disaster recovery and vulnerability assessment. SyncCom provides data backup, disaster recovery and contingency planning services. Please contact a SyncCom for further details.

 

Regulatory Compliance

 

Sarbanes-Oxley Act

Sarbanes-Oxley Act and Compliance
We support your efforts towards Sarbanes-Oxley compliance. This reference reviews various aspects of the SOX Act and illustrates how online backup helps institutions meet the requirements of various sections of the mandate.

Sarbanes-Oxley Act - Community Forum
This interactive community portal is designed to facilitate the exchange of information between those seeking to comply with the requirements of this important legislation.

Sarbanes-Oxley Act/PCAOB Implementation Central
An excellent resource that provides background, toll-free hotlines, guidance and tools.

Gramm-Leach-Bliley Act

Gramm-Leach-Bliley Act and Compliance
As a result of the Safeguards Rule it is extremely important that financial institutions develop data backup policies. Learn how online data backup can help your organization meet Gramm-Leach-Bliley requirements.

Complying with the Safeguards Rule
As part of its implementation of the GLB Act, the Federal Trade Commission (FTC) has issued the Safeguards Rule. Learn who must comply and how to comply.

FTC Privacy Safeguards Rule, Application to CPAs
Explains the specification for a comprehensive security program to ensure the security and confidentiality of customer information.

Federal, State and Other Professional Regulations
CPAs engaged in privacy advisory services and attestation must follow the pertinent, laws, rules, and standards. This resource provides an overview of developments on information privacy in the United States.

 

Disaster Recovery and Contingency Planning

 

Disaster and Business Continuity Planning
If you do not have a plan or do have the idea that "it won't happen to you," consider the consequences.

Disaster recovery is a numbers game
A computer contingency plan should have emergency, back-up, recovery, test and maintenance plans. Adequate computer contingency planning should help firms to quickly regain their capabilities to process information and get back in business.

 

Vulnerability Assessment

 

Los Alamos Vulnerability Assessment
PowerPoint presentation that focuses on computer security, network & Internet security, intellectual property security, information & records security and communications security.

Common Vulnerabilities and Exposures
Common Vulnerabilities and Exposures (CVE®) is a public repository of security vulnerabilities and exposures international in scope. This repository is free for public use. This is an effort to standardize the reporting of vulnerabilities and exposures.

Federal Information Technology Security Assessment Framework
The Federal Information Technology (IT) Security Assessment Framework provides a method for managers to determine the current status of their security programs relative to existing policy and, where necessary, establish a target for improvement.

 

General Security Resources

 

General IT Management & Planning Resources
An excellent collection of resources that help organizations understand potential threats, principles and practices. Includes resources for assessing and establishing IT security.

The Internet Security Alliance
Case Studies of attacks on Small Businesses and a 12-step Program for Information Security
Common Sense Guide to Cyber Security for Small Businesses