
Resources & Tools
CPABC members are involved in management, industry, finance, government, taxation and public practice. Accordingly, the following tools below cover a variety of these areas.

Cybersecurity
Fraud gets personal with social engineering
By Anthony Green
Sep 9, 2024

Cybersecurity
Watch out for these three common online frauds
By Anthony Green
Sep 9, 2024

Cybersecurity
How social engineering attacks manipulate your emotions
By Anthony Green
Sep 9, 2024

Cybersecurity
AI risks in accounting and finance
By Tommy Stephens
Jun 5, 2024

Cybersecurity
ChatGPT’s ‘perfect storm’: Managing risk and eyeing transformational change
By Mary Carmichael
Oct 26, 2023

Cybersecurity
Ransomware 101
By CPABC in Focus
Sep 29, 2023

Cybersecurity
A cybersecurity update for CPAs
By Michelle McRae
Sep 21, 2023

Cybersecurity
Cloud service for business: What to look for, and compliancy and security considerations
By Vince Kanasoot
Feb 25, 2022

Cybersecurity
How businesses can make informed cybersecurity investment decisions
By Justin Malczewski
Oct 27, 2021

Cybersecurity
How businesses should adapt their cybersecurity strategy in the age of COVID-19
By Anthony Green
Sep 24, 2021

Cybersecurity
How using behavioural biometrics in multi-factor authentication steps up cybersecurity
By CPABC
Aug 24, 2021

Cybersecurity
BC AWARE rebrands as VIPSS and runs in May, virtually
By Vince Kanasoot
Apr 22, 2021

Cybersecurity
How SMEs can start and gain company-wide support for cybersecurity
By Michael Argast
Apr 16, 2021

Cybersecurity
How has COVID-19 fraud impacted Canadians and what can you do to protect yourself?
By Lorena Christensen
Mar 15, 2021

Cybersecurity
The ethics of technology
By Ward Blatch
Oct 20, 2020
![How can someone legally access your data in the cloud [without you knowing]? How can someone legally access your data in the cloud [without you knowing]?](/CPABC/media/images/News%20and%20Events/Newsroom/2020/How-can-someone-legally-access-your-data-in-the-cloud-without-you-knowing-IU-Image.jpg?ext=.jpg)
Cybersecurity
How can someone legally access your data in the cloud [without you knowing]?
By Jean Loup P.G. Le Roux
Aug 26, 2020

Cybersecurity
Working from home? Secure your home network
By Anthony Green
Jun 10, 2020

Cybersecurity
How to securely share files remotely with clients
By Jeffrey Nyeboer
Apr 27, 2020

Cybersecurity
Working from home: Top five tips for leading a remote team
By Ann Wicks
Apr 16, 2020

Cybersecurity
Six tips on using Zoom safely and securely
By Rajvinder Saran
Apr 9, 2020

Cybersecurity
BC AWARE discusses cybersecurity for the decade ahead
By Vince Kanasoot
Jan 14, 2020

Cybersecurity
Thwart cyber-criminals through better password policies
By Eric Byres
Nov 5, 2019