Welcome, Today is May 19, 2024



Information security standards are an emerging requirement for accounting and CPA firms. Compliance with these standards is becoming more important, and can provide a competitive advantage in today's business climate. AICPA standards and guidelines, state breach laws for consumer protection, and overlapping standards from other industries can challenge the most intrepid business leaders. A cybersecurity breach can damage a business beyond repair. Sensitive financial and personal information must be protected and even the perception that it is not can be dangerous.

The ability to demonstrate effective due diligence is more important for business-to-business work than ever before. Egis IT Security brings value by working with companies to secure information systems, to demonstrate their security by meeting cybersecurity standards and guidelines, and to assist with incident response planning and practices.

Accounting firms often overlap with cybersecurity requirements from other industries in addition to maintaining AICPA standards and practices. Egis has experience with the IRS 1075 Publication and cybersecurity insurance common requirements, in addition to state breach laws that can impact accounting and HR firms

Egis IT Security is committed to cyber defense of accounting firms. Our experience in the business services sector and in the defense industry have given us an important boots-on-the-ground perspective. We work with our clients on risk assessments and real cybersecurity value using defense-in-depth methods.

Our portfolio of services includes:

  • Assessments of information systems and policies to protect sensitive data.
  • Compliance as a Service for small business - we can be your cyber security experts.
  • Continuous Monitoring of security logs, threat exposures, and dark web threats.
  • Security Awareness Training for internal system protection with managed maturity processes.
  • Incident Response Planning and Exercises including annual tabletops and social engineering.
  • Documentation of relevant policies and procedures needed for standards complianc.


Leverage our processes and technology to relieve regulated clients and those with sensitive data from the burdens of maintaining cybersecurity and information controls. Elevate organizational security awareness and requirements recognition to the highest levels of management and ownership. Help maintain a culture that is disruptive to threat actors and anyone that would harm our clients and their critical industry sectors.