Header image for EKS&H resources

Objective Advice and Deep Expertise—Find it Here

Welcome to the EKS&H resources page.

As your true business advisor, we provide information on regulatory updates, industry strategies, and expert analysis to help you think strategically and make better decisions.

Browse by type, or use the search feature to find content on specific topics of interest.

October 17, 2016

The Audit Committee Update Newsletter - Third Quarter 2016

The Audit Committee Update Newsletter is a quarterly publication from EKS&H’s Technical Accounting and Auditing Group. In this newsletter, we highlight some important 2016 third quarter issues facing audit committees. Read on »

October 5, 2016 | Dan Domagala

Minimizing Cybersecurity Risk Part 8 – Organizational Awareness

The final installment of this eight-part series on cybersecurity focuses on your most important weapon in the war against cyber-attacks: your people. Read on »

September 20, 2016 | Dan Domagala

Minimizing Cybersecurity Risk Part 7 – Have a Response Plan

​Cybersecurity professionals like to say it’s no longer a question of if you will suffer a breach — it’s now a question of when. Of course it still makes sense to take preventative measures to minimize your risk, but it is equally important to have a plan in place to swiftly and decisively respond to a breach. In this post, EKS&H Consulting Senior Manager Dan Domagala outlines important considerations for creating and updating your cybersecurity breach response plan. Read on »

September 14, 2016 | Michael Fitzgerald

IRS Temporary Regulations May Permanently Impact Manufacturers

Companies that outsource part or all of their manufacturing will want to pay particular attention to several proposed and temporary regulations which are likely to affect deductions for oil-related activities, production and construction definitions, film licensing, and changing which party is eligible for the deduction when property is produced on behalf of another. Read on »

September 12, 2016 | Dan Domagala

Minimizing Cybersecurity Risk Part 6 - Monitoring

​Actively monitoring your network for anomalies or suspicious activity is another preventative action in the ongoing cybersecurity battle. Most modern servers and administration consoles spew out a stream of logs—the challenge is to sift through this torrent of data and focus on potential warnings or critical alerts. Read on »

September 2, 2016 | Dan Domagala

Minimizing Cybersecurity Risk Part 5 - Authentication and Authorization

Cracking or compromising passwords is an extremely common method for hackers to gain unauthorized access to IT systems. This preventative step five underscores the importance of effective authentication before authorizing system access. Read on »

August 31, 2016 | Lawrence Knutson and Rebecca Potts

Changes to the R&D Tax Credit: New Opportunity for Early Stage Biotech and Medical Device Manufacturers

​Early stage biotech firms often bring in little or no revenue while they are faced with considerable expenses related to research and development. A significant portion of the R&D costs are taken up by researchers. As of early 2016, biotech businesses can take advantage of the federal R&D tax credit to offset their payroll taxes. Read on »

August 27, 2016 | Dan Domagala

Minimizing Cybersecurity Risk Part 4 - Managing User Access

Once your organization has a good grasp on the scope of its sensitive information, a logical next step is to fully understand and manage who has access to it. Read on »

August 26, 2016 | Mary Jo Zuelsdorf, Lyndsy Schultz, and Jim Cowgill

A Hidden Obligation: What Hospitality Companies Need to Know about Unclaimed Property

To make up for budget shortfalls, states are looking anywhere they can for additional revenue sources. Unfortunately for businesses in the hospitality industry, this effort includes an increase in unclaimed property audit examinations. Are you familiar with obligations in this area? Read on »

August 18, 2016 | Dan Domagala

Minimizing Cybersecurity Risk Part 3 - Eight Preventative Actions

With a dizzying array of security rules, regulations, best practices, and certifications, it can be difficult to ascertain what an organization might be obligated to comply with. Navigating this evolving landscape of standards and compliance is one aspect of reducing risk while demonstrating to others that you are taking cybersecurity seriously.  Read on »

Displaying results 1-10 (of 151)
| < <  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 ...  > >|