MHM
Go to...
  • About Us
    • Careers
    • Locations
  • Services
    • Audit & Assurance
      • Financial Statement Audits
      • EBP Audits
      • Public Company Services
      • Attest & Other Services
      • Systems and Organization Controls
    • Tax
      • State and Local Tax
      • Federal Tax
      • International Tax
      • Private Client Services
    • Advisory
      • Complex Accounting
      • Transition & Transaction Services
      • IT Security
  • Industries
    • Financial Services
    • Manufacturing & Distribution
    • Not-for-Profit & Education
    • Private Equity
    • Professional Services
    • Real Estate
    • Retail and Consumer Products
    • Technology & Life Sciences
    • Construction
  • Insights
    • Articles
    • Webinars
  • People
  • Contact Us
    • MHM Ethics Hotline
MHM
  • About Us
    • Careers
    • Locations
  • Services
    • Audit & Assurance
      • Financial Statement Audits
      • EBP Audits
      • Public Company Services
      • Attest & Other Services
      • Systems and Organization Controls
    • Tax
      • State and Local Tax
      • Federal Tax
      • International Tax
      • Private Client Services
    • Advisory
      • Complex Accounting
      • Transition & Transaction Services
      • IT Security
  • Industries
    • Financial Services
    • Manufacturing & Distribution
    • Not-for-Profit & Education
    • Private Equity
    • Professional Services
    • Real Estate
    • Retail and Consumer Products
    • Technology & Life Sciences
    • Construction
  • Insights
    • Articles
    • Webinars
  • People
  • Contact Us
    • MHM Ethics Hotline

IT Security Services

  1.  
  2.  
A server room representing IT security

IT Security

Our cybersecurity professionals help strengthen your protection against a potential data breach through risk assessments and evaluations.

A server room representing IT security

IT Security

Our cybersecurity professionals help strengthen your protection against a potential data breach through risk assessments and evaluations.

  • Contact Us
  • Submit RFP

Unauthorized access to data brings devastating legal, financial, and reputational consequences. Knowing you helps us implement cybersecurity measures that match your information technology (IT) investment to your unique business needs. We evaluate industry risks as well as the information security policies you have in place in order to implement and maintain a successful IT security program.  Our team provides best-in-class data protection by incorporating industry-recognized frameworks, such as ISO, COBIT, NIST, ITIL and COSO, into your risk management approach. 

Online Cybersecurity Risk Assessment

Our online cybersecurity risk assessment provides a high-level of overview of your cybersecurity preparedness.

Take it
Take our Cybersecurity Risk Assessment

Knowing you creates tailored solutions to safeguard your critical IT systems from disruption.

Insights

Where’s My Data, and Who’s Protecting It?

The growing use of cloud computing technology and third party providers complicates data protection protocol.

Learn More

How Cybersecurity Staffing May be Impacted During COVID-19 Recovery

It may be time to consider augmenting your information security team.

Learn More

Creating the Optimal Security Awareness Training

Employee training on cybersecurity along with other strategies can help your organization be prepared for cyber threats.

Learn More
  • SOC 2: The Solution to Tedious Security Questionnaires

    Vendors and customers are understandably concerned about IT security in our current environment of data leaks and cyber-attacks. One of the ways cybersecurity concern manifests for service organizations is through information security questionnaires.
  • Ransomware Hackers Shift Focus to Manufacturing and Utilities

    Manufacturers should be aware of the growing risks in the information security environment.
  • Your Guide to Responding to Information Security and Data Breaches

    Here’s how to prepare your response to an information security incident.
  • How Much Longer Can I Avoid GDPR Compliance?

    How do you, as an organization, understand what your risk exposure is? To understand that question, you have to start with understanding how GDPR enforcement works.
  • Webinar: Case Studies in Cybersecurity - A Primer for Not-for-Profits

    In our webinar, we will cover real life examples of how NFPs have taken ownership for knowing and managing their cybersecurity risk. We will also cover how to navigate a relationship with a third party IT service provider and the right questions you should be asking about cybersecurity.
  • The Cloud Hanging Over Information Security

    The cloud provides a more efficient venue for creating new products or services by allowing remote collaboration. From a cybersecurity perspective, however, cloud software presents a logistical nightmare.
  • Public Companies Should Prepare for Cybersecurity Disclosures

    The SEC recently released guidance on required cybersecurity disclosures for public companies.
  • A Cybersecurity Primer for Not-for-Profit Organizations

    From large organizations to small local associations, cybersecurity is a concern for everyone in the not-for-profit sphere.
  • Enhance Your Organization's Cybersecurity Strategy

    Data breaches affect all organizations, from small not-for-profit organizations to large commercial retailers. Should your organization fall victim to a cyber attack, the results could be devastating.
  • Cybersecurity Risks to Benefit Plans

    The number of cyber attacks continues to rise. Employee benefit plans should evaluate their protocol to make sure they are prepared for the risks in their environment.
  • Evolving ERM: New Framework Provides Updated Guidance for Risk Management

    The new guidance enhances COSO's 2004 ERM publication, Enterprise Risk Management-Integrated Framework by providing additional detail organizations can use to enhance enterprise-wide risk management procedures.
  • What Financial Institution Cybersecurity Regulations Tell Us About Cybersecurity for the Infrastructure Sector

    Information security is a threat for every business, but it’s particularly disruptive to the nation’s infrastructure systems including transportation, communications and financial institutions.
  • Seven Ways to Strengthen Your Cybersecurity: Monitor the Human Element

    The first of our series explores the key definitions with which organizations should be familiar as well as the considerations when the human element is involved in a possible breach of your digital information.
  • 5 Things Board Members Need to Know About Their Organization’s Cybersecurity Strategy

    October is cybersecurity month, a good reminder for not-for-profits and their boards to re-examine their information security strategies. The following are five ways a not-for-profit’s board can help with data protection.
  • Signs You Need a Chief Information Security Officer

    Threats to information security are leading to innovation within the information technology function.
  • Creating the Optimal Security Awareness Training

    Employee training on cybersecurity along with other strategies can help your organization be prepared for cyber threats.
  • How to Have a Transition-Ready Strategy for Information Security

    The frequency of cyberattacks and information security incidents in today’s market makes information technology controls vital.
  • How Cybersecurity Staffing May be Impacted During COVID-19 Recovery

    It may be time to consider augmenting your information security team.
  • Takeaways from 2019’s Biggest Information Security Incidents

    Major cybersecurity incidents from 2019 can tell us a lot about the current information security landscape. Here are some of the top lessons we have gleaned from some of the year’s most disruptive cyber attacks.
  • Seven Ways to Strengthen Cybersecurity: Questions to Ask About Third-Party Providers

    Protecting your organization from cybersecurity threats is essential in today's business environment. One of your key areas of vulnerability comes from third-party service providers.
  • Seven Ways to Strengthen Cybersecurity: Know Your State Notification Laws

    Who needs to be contacted and when may vary depending on your physical location.
  • Seven Ways to Strengthen Cybersecurity: What Management Should Know About the IT Environment

    To ensure your organization is adequately protected, management and IT need a routine monitoring plan in place and regular communication about the following topics.
  • Welcome to the New Age of Cyber Regulations

    The European General Data Protection Regulation (GDPR) might be ushering in a new age of cyber regulations.
  • The CFO's Guide to the CCPA

    Privacy protection regulations are not such a foreign concept any more. The California Consumer Privacy Act provides a template of what U.S. companies may expect to see in privacy regulations trends moving forward.
  • Seven Ways to Strengthen Your Cybersecurity: Secure the Small Things

    In the second part of our series we will examine controls for portable devices in more detail.
  • More Insights

    Key Contact

    Brenda Piazza

    brendap@cbiz.com
    (858) 795-2213

    The first step in
    Knowing You is Knowing how
    we can help You.

    Contact Us

    *MHM (Mayer Hoffman McCann P.C.) is an independent CPA firm that provides audit, review and other attest services. MHM works in an alternative practice structure with CBIZ, a leading business consulting, tax, and advisory services provider. MHM provides all attest services and, with limited exception, CBIZ provides all non-attest services.

    MHM. Knowing You.

    Contact Us

    About Us


    MHM (Mayer Hoffman McCann P.C.) is an independent CPA firm dedicated to learning about your organization and helping you meet your requirements and make informed decisions. We use our global resources and 60-plus years of experience serving growth-oriented public, private and not-for-profit organizations, to bring you best practices and sound guidance.

    A member of Kreston Global |
    A worldwide network of accounting firms


    Client Portal | Careers | Terms of Use | Privacy Policy

    Copyright 2021 Mayer Hoffman McCann P.C. All rights reserved.

    About Us


    MHM (Mayer Hoffman McCann P.C.) is an independent CPA firm dedicated to learning about your organization and helping you meet your requirements and make informed decisions. We use our global resources and 60-plus years of experience serving growth-oriented public, private and not-for-profit organizations, to bring you best practices and sound guidance.

    MHM. Knowing You.

    Contact Us

    A member of Kreston Global |
    A worldwide network of accounting firms


    Client Portal | Careers | Terms of Use | Privacy Policy

    Copyright 2021 Mayer Hoffman McCann P.C. All rights reserved.