AAFCPAs’ Information Technology (IT)/Cyber Security Assessments
Identify risks from the use of technology that could potentially cause information loss and/or financial and reputational harm to your organization. Our assessments follow industry best practices. In addition, we help determine if planned technology acquisitions comply with federal and state laws and company policies for protecting critical data before they are implemented. The detailed findings, associated risks, and recommendations that are documented in our assessments help you reduce the overall exposure of your organization to technology security risks.
Tailored IT/Cyber Security Assessments
Every organization is unique and so is the technology environment developed to serve their needs. AAFCPAs tailors our IT/Cyber Security Assessments to address the unique needs of your organization. We start by gaining an understanding of your technology environment in order to identify areas which may present risks. Our process is highly collaborative and engaging, and we ensure on-going communication and feedback throughout the engagement. The results are packaged in a report that provides clear, concise findings and recommendations that can be used as a road-map for mitigating risks.
Let’s Connect

James Jumes

Vassilis Kontoglis
Vulnerability/Penetration Assessments
- External vulnerability
- Internal vulnerability
- Web application scan
- Wireless penetration
Phishing Simulation and Training
- Simulated phishing campaigns using social engineering
- Security awareness training
Configurations Assessment
- Firewall configuration
- Enterprise Mobile Management (EMM/ Unified Endpoint Management (UEM)
- Office 365 configuration
Infrastructure Operations
- Business Continuity Plan (BCP) development
- IT Security Policy Development
- IT department staff appraisal
- Fractional CIO / CISO (staff augmentation)
- Cybersecurity Insurance Policy assessment
- Risk management program assessment
- Data Governance
- Incident Response Plan (Documentation, planning and testing)
- Remote access (policy, process, and configuration)
- Infrastructure and network topology security and enhancements
- Disaster recovery (backup and recovery strategy)
Regulatory Compliance
- HIPAA Top 10
- HIPAA Security Risk Assessment (SRA)
- HIPAA Compliance Audit Program Assessment
- NIST 800-53 / CSF
- ISO 27000
- Third party SOC report assessment and summary
- Critical / Key Vendor Assessment (Security Scorecard)
IT General Controls (“ITGCs”)
- Access to Programs and Data
- Program Changes
- Program Development
- Computer Operations
- Network Security
Vulnerability Management as a Service (VMaaS)
AAFCPAs offers “Vulnerability Management as a Service” (VMaaS) to assist companies in identifying and mitigating vulnerabilities in their servers, software, workstations, phone systems, printers, and employee devices. We provide peace of mind to those charged with risk management and alleviate the burden from your team of improving your security posture.
Why AAFCPAs Business Process & IT Consulting for Cybersecurity?
We bring our clients’ Finance and IT functions together. We understand both very well. AAFCPAs’ Business Performance, Internal Controls and IT Consulting practice includes corporate managers and technologists with a pragmatic understanding of business, making us uniquely qualified to advise clients on making sound business decisions regarding business processes, IT systems, and performance controls. We have a team of dedicated professionals with extensive experience in the technology field, including Senior Security Specialists and White Hat Ethical Hackers. Our team members have a deep understanding of information technology operations, information security, and internal controls from a design, implementation and testing perspective.
Our exceptional value comes from delivering proven solutions with that ideal combination of expertise, service, and price.
Ethical Hacker Shares Bad Actor Strategies
Contact AAFCPAs
We look forward to speaking with you to determine how we may best solve your needs. A firm representative will reach out to you within one business day. Looking for additional ways to reach us? Visit our Contact Page. >>