4 minute read
Recruiting
WE’RE HIRING
RESEARCH & DEVELOPMENT TAX SENIOR ASSOCIATE
For current openings, check the opportunities on our website: KBKG » https://www.kbkg.com/careers KROST » https://www.krostcpas.com/job-opportunities
If you would like to request an open position, please fill out the requisition/recruiting form: https://www.tfaforms.com/4865092
Recruiting Bonus - We pay bonuses to anyone who refers talent that we hire!
Staff who have referred new hires to the firm since January 2021: • Juana Lopez ref Marissa Burriss • Keith Hamasaki ref Giovanni Valdivia, Victoria Shi, Kathryn Mendoza • Cyrielle Woo ref Vicky Quach, Alicia Quiroz Garcia • Heather Nichols ref Stephanie Obcamp • Zijian Tu ref Regina Ho • Angie Han ref Xiao Jiang • Lon O’Connor ref Michelle Snyder • Steve Chhuor ref Jing Yin • Mayra Silva ref Odalys Becerra • Cicely Wen ref Michelle Truong • Priscilla Sam ref Krikor Katoromian
From January 1, 2021 - 10/31/2021, we’ve hired… • Fulltime – 71 • Temps – ERTC & PPP – 14 • Interns – 11
COLLEGE RECRUITING
We have internships available! Departments: Accounting, Assurance & Advisory, Cost Segregation, Tax, and R&D Internship sessions: Winter (December/January – April/May) & Summer (June/July – August) Office Locations: Atlanta, West LA, Woodland Hills
If you know anyone, please send referrals to Joanne – joanne.quach@krostcpas.com
DATA RETENTION PROJECT
This year, the firm has created a Data Retention Policy to ensure that the necessary records and documents are protected and that those records that are no longer needed will be appropriately discarded at the proper time. The policy dictates that files should not be maintained past the age of years unless it is designated as a permanent (Perm) file.
The Data Retention Policy is located here: IT-503 Data Retention Policy
File classification was completed by the various departments for the CCPA (California Consumer Privacy Act) outlining the type of data that we have and what age that data could be deleted or if it is Perm data that should be retained indefinitely. These files should be updated by the members in the department that are responsible for doing so.
Those Data Classification Documents are located here: Data Classification Documents by Department
We are currently working with the departments to identify the locations where data is stored and come up with the best solution for adhering to the data retention policy in the near future.
INFORMATION SECURITY AWARENESS TRAINING
We will start changing how we complete our Information Security Awareness training beginning in November. Traditionally, security awareness training has been done in an hour-long block once a year. It has been determined that providing more frequent but shorter snips of training throughout the year is more effective for individuals to retain because we tend to keep our attention focused on the training during the shorter training periods. Also, by increasing the frequency of the training, it helps keep information security processes fresh in our minds. Our video training will be short videos, approximately 10 minutes or less, and we will be pushing them out every two months. It is important that we all take the time to complete these short training sessions as they are pushed out. We will still be pushing out our regular Phishing campaigns throughout the year, so be on the lookout for those.
SAVING DATA – S: DRIVE LIMITATIONS
Lately, there have been many questions regarding what data should be on the S: drive and how long it should stay there. The S: drive contains company resources, and each individual has their own folder for sharing files with others in the organization. Files that are intended to be shared can be kept on your own folder name within the S: drive but should be removed when they are no longer needed. If the files are client-related and can be stored in a location designated for client files, such as CCH Document, CCH Engagement, or on a file server within the client folder, then those documents should be stored there. Again, I want to say that if the file is no longer needed or duplicated data, it should be moved to a proper location depending on the type of file or deleted. This will help us keep proper tracking of documents for our Data Retention Policy.
CYBER SECURITY PROGRAM
In an effort to continue to protect the information of the firm and our clients, we have been performing Proof of Value (POV) tests for various cyber security solutions that use Artificial Intelligence (AI) to help combat cyber security issues. These products are designed to identify cyber-attacks in seconds and can take action to autonomously stop those attacks. We have had positive results so far during our evaluations and look forward to seeing the full capabilities of these products. Cybercrime is a continually evolving issue, as such, we need to continually evaluate and initiate processes and technologies to help prevent those attacks.