If you run an accounting firm, your cybersecurity risks are no longer hypothetical. You're holding sensitive financial data, tax filings, payroll records, W-2s, Social Security numbers, and banking information. That makes you an obvious target for attackers. And they’re not just going after large firms anymore.
In Ohio, small and mid-sized firms in cities like Painesville, Medina, and Cleveland have been caught off guard by phishing attacks, ransomware incidents, and email compromise. Many of these firms assumed they were too small to be noticed. They weren't. In most cases, the breach started with something basic: a reused password, an unprotected email account, or an unvetted software vendor.
The stakes are rising because accounting firms are now subject to overlapping compliance rules. The Sarbanes-Oxley Act (SOX) affects firms working with public companies. The Gramm-Leach-Bliley Act (GLBA) applies if you handle consumer financial data. And the FTC Safeguards Rule now covers virtually all tax professionals. These frameworks don’t just recommend security controls, they expect them. Regulators want to see access logs, encryption policies, written security programs, and vendor risk assessments.
The problem? Most accounting firms weren’t built with cybersecurity in mind. You’ve invested in tools like QuickBooks, Drake Tax, SmartVault, and Microsoft 365 to run your practice. But unless those systems are properly configured and secured, they can become liabilities. Misconfigured access controls or missing multi-factor authentication are still common, even among firms that are otherwise well-managed.
That’s where Securafy comes in. We support small and mid-sized accounting firms across Ohio with cybersecurity services that are built for compliance. We help firms meet regulatory expectations without adding unnecessary complexity. You don’t need an enterprise budget to meet industry standards, you just need a partner who knows what to prioritize.
In this guide, we’ll break down the compliance rules that apply to accounting firms, the top threats you face in 2025, and the tools and tactics that help firms stay protected. We’ll also explain how co-managed cybersecurity works, and why so many Ohio firms are moving toward specialized, compliance-first support.
If you're still deciding how to structure IT and security for your firm, download our guide. It explains the differences, costs, and benefits of each model, and what to ask before you hire any provider.
Compliance is no longer just a concern for large financial institutions. If you run an accounting firm, even a small one, you’re expected to follow specific data security rules tied to your services. Whether you're preparing tax returns, advising on financial plans, or managing payroll, you're handling sensitive data that falls under regulatory oversight.
Three major standards apply to most accounting and tax firms in the U.S., including those operating in Ohio:
If your firm audits or provides financial services to publicly traded companies, the Sarbanes-Oxley Act likely applies. SOX is focused on protecting the integrity of financial reporting, and part of that includes IT system controls.
What this means for you:
You must be able to prove who accessed what data, when, and why. You also need a record of system changes, logins, and updates that could impact financial records.
Auditors may ask for:
These controls aren’t just technical, they’re part of how you demonstrate accuracy and transparency in financial reporting.
The GLBA Safeguards Rule applies to firms handling personal financial information. That includes solo CPAs, tax prep firms, bookkeeping services, and financial advisors.
GLBA requires firms to develop a Written Information Security Program (WISP). This program must be documented, reviewed regularly, and cover several areas:
Most smaller firms are out of step with GLBA because they haven’t created a written security plan. That’s one of the first things we help firms build at Securafy. It's not optional anymore, FTC enforcement is getting stricter.
The Federal Trade Commission has clarified that the Safeguards Rule now applies to virtually all tax professionals. If your firm prepares taxes or offers related financial services, you're expected to meet specific cybersecurity requirements.
Key rules include:
This affects how you use tools like Drake Tax, Lacerte, UltraTax, and Thomson Reuters CS. Using these tools isn’t enough, you need to configure them securely and document your processes.
If you skip these steps and there’s a breach, you may be held responsible under federal enforcement guidelines. In some cases, even client contracts now reference GLBA or FTC expectations.
Most small and mid-sized accounting firms in Cleveland, Akron, and Columbus aren’t ignoring security, they just don’t know where their gaps are. They rely on general IT support or default software settings, assuming those are enough. They’re not.
Compliance is about process, not just tools. Securafy helps firms document and implement those processes without adding unnecessary overhead. That includes creating your WISP, configuring MFA, reviewing vendor security, and preparing for an audit or breach event.
Cyber threats against accounting firms are more frequent and targeted than ever. Attackers know you’re handling sensitive financial data, and that many small firms lack the time or technical staff to maintain secure systems.
In 2025, threat patterns are shifting from generic attacks to industry-specific tactics. That includes targeting popular tax software, exploiting remote work setups, and impersonating financial institutions. Here’s what your firm should expect, and how to prepare.
Ransomware remains the top threat for accounting firms. Attackers encrypt your client files and demand payment for access. These incidents often strike during tax season, when your workload is highest and your tolerance for downtime is lowest.
We’ve seen attacks launched through malicious email attachments or unpatched vulnerabilities in platforms like:
In some cases, attackers also steal data before encrypting it, then threaten to leak it publicly unless the firm pays.
Ohio firms that lack secure backups or segmented networks are especially vulnerable. Without protections like endpoint detection and recovery systems, you may have no way to recover.
Phishing tactics have evolved. Attackers now spoof IRS emails, refund notices, or bank statements with realistic branding and urgent calls to action. They may send:
These emails often bypass basic spam filters and land in Microsoft 365 or Gmail inboxes. Firms without advanced email security (like Microsoft Defender or Proofpoint) are more likely to fall for them.
Phishing simulations and training can reduce click rates, but detection tools are just as important.
BEC is when someone gains access to your firm’s email account and uses it to commit fraud. For example, they may:
Attackers often wait silently after breaking into an account. They monitor conversations, then strike at the right moment.
This has happened to firms in Columbus and Akron, where outdated Microsoft 365 settings lacked multi-factor authentication. Once inside, attackers forwarded emails and deleted alerts to cover their tracks.Insider threats don’t have to be malicious. Accidental actions by untrained team members are one of the most common causes of data exposure.
We’ve seen examples where:
Without policies, logging, or alerts in place, these actions often go unnoticed until it’s too late.
Firms using remote staff, seasonal workers, or virtual office setups may lack consistent security controls. Common issues include:
These gaps make it easy for attackers to move laterally into your systems. In Ohio, we’ve worked with firms that had no visibility into contractor devices, even though those devices were handling live client data.
We help firms across Ohio defend against these threats by:
Most threats are preventable when the right controls are in place. But reacting after a breach is far more expensive, and more damaging to client trust.
Ideal for firm leaders looking to reduce risk and improve compliance without adding internal IT headcount.
If you're running an accounting or tax firm, your cybersecurity program isn’t just about keeping hackers out, it’s about meeting documented expectations from regulators and clients. SOX, GLBA, and the FTC Safeguards Rule all require controls around data access, security planning, and incident response. But most small firms don’t know where to start.
You don’t need dozens of tools. You need the right ones, configured properly, supported by documented processes. Here's what that looks like.
Start with a basic risk assessment. This is required under both GLBA and the FTC Safeguards Rule. You need to understand:
This assessment forms the basis for your Written Information Security Program (WISP). If you’re audited, this is one of the first things they’ll ask for.
Securafy provides templates and advisory support to help small firms build compliant WISPs without wasting time on fluff or irrelevant documentation.
Regulations expect you to control and monitor who can access client data.
At minimum, your firm should:
You can implement this with:
Without logging or alerts, you won’t know when something goes wrong, and you’ll have no proof that your firm took reasonable steps to protect data.
Regulators expect encryption of data both “at rest” and “in transit.”
That means:
Common tools include:
Don’t rely on Dropbox or Google Drive unless you've configured security settings carefully. Many breaches happen because staff assume “cloud = secure” by default.
If something does go wrong, and eventually it will, you need a plan. Regulators and clients will expect you to act quickly and document your actions.
A basic incident response plan should include:
Securafy helps firms create realistic, audit-ready IR plans that map to your systems, team size, and risk exposure. We also test these plans with simulated breach scenarios.
In cities like Cleveland, Akron, Medina, and Columbus, many firms assume they’re too small to need this level of planning. But it’s these same firms that face the most risk, because they often run lean, rely heavily on seasonal staff, and haven’t reviewed their systems in years.
A compliance-driven cybersecurity program doesn’t have to be complex. It just has to be specific, documented, and aligned to your actual operations.
Accounting firms rely on software and cloud platforms to operate. From tax prep tools and file sharing systems to outsourced bookkeeping and payroll apps, third-party vendors are everywhere. But when those vendors are compromised, or misconfigured, you’re still the one responsible for the data.
If your firm uses platforms like QuickBooks Online, Drake Tax, or SmartVault, you need a way to evaluate and manage their security. This isn’t just a best practice. Under GLBA and the FTC Safeguards Rule, it’s required.
Every vendor you use to store, process, or transmit client financial data should be reviewed. This includes:
What you’re looking for is whether their security practices meet your obligations under compliance rules. That includes encryption, access control, breach notification timelines, and subcontractor use.
If vendors can’t answer these questions clearly, or try to dodge them, that’s a red flag.
You don’t need to eliminate these vendors, but you do need to document your expectations and restrict how data flows through their systems.
Securafy helps firms maintain a vendor risk program that fits the real world. We provide templates, review checklists, and advice on contract language that aligns with FTC and GLBA expectations.
In smaller firms across Medina, Painesville, and Columbus, we often see vendors chosen based on cost or convenience, with no security review at all. That’s understandable. But it creates real liability. If one of these vendors gets breached, you’ll be the one explaining what steps were, or weren’t, taken.
Managing vendor risk doesn’t mean avoiding third-party tools. It means asking the right questions, getting documentation, and limiting access where possible.
If you're still deciding how to structure IT and security for your firm, download our guide. It explains the differences, costs, and benefits of each model, and what to ask before you hire any provider.
Most cybersecurity breaches start with a person, not a piece of software. That’s why employee training is not optional. It’s a requirement under the FTC Safeguards Rule, the GLBA, and every modern cybersecurity framework.
Training helps your team recognize threats before they turn into incidents. It also shows auditors and regulators that you’ve taken “reasonable steps” to protect client data. But for it to work, the training must be specific, ongoing, and part of your firm’s daily operations, not just a once-a-year checkbox.
If your firm handles financial data, you’re required to educate your staff about security risks. The FTC and GLBA rules specifically reference training as a control for:
In small firms, this applies to everyone, not just CPAs. Admin staff, part-time bookkeepers, and remote contractors must also be included.
You don’t need long lectures or corporate-style LMS platforms. The most effective training is short, focused, and repeated regularly.
At a minimum, cover:
Include internal policies too. Your team should know your firm’s stance on personal device use, cloud storage, and password reuse.
For SMBs in Ohio, the goal is fast deployment and consistent results, not big training budgets.
We recommend:
Securafy offers these tools bundled with our cybersecurity support. We help you set the schedule, track participation, and adjust based on real risks.
Training doesn’t have to be formal to be effective. A 10-minute phishing quiz every quarter will help your staff stay alert and confident.
Firms in Akron, Columbus, and Cleveland often rely on one-time training, or informal reminders. That’s not enough. Regulators now expect documentation. If you can’t show who was trained, on what topics, and when, it’s as if it didn’t happen.
We’ve also seen firms avoid training to “save time.” But every hour of training avoided now could lead to days of incident response later. Most successful attacks are caused by one mistake: a clicked link, an insecure file, or a reused password.
Securafy helps firms build practical, repeatable training programs. We manage the schedule, provide content, and track results, so you stay compliant and protected without making training a burden.
Most accounting firms already work with some form of IT support, either internal, outsourced, or a mix of both. But not all IT providers offer true cybersecurity. And as compliance requirements grow, many firms are realizing they need more than basic tech help. They need a partner focused on risk, not just repair.
This is where the distinction between general IT support and cybersecurity matters. It’s also where co-managed IT comes in, a model that gives your firm more control, more visibility, and more compliance support without hiring a full in-house security team.
Traditional IT support covers:
These services are useful, but they don’t include:
If your provider doesn’t mention GLBA, the FTC Safeguards Rule, or written security policies, you’re probably missing critical protections.
A cybersecurity-first provider focuses on:
This includes:
Co-managed IT is a flexible model where your internal team or current IT vendor handles day-to-day support, and a cybersecurity partner like Securafy adds the specialized security services you’re missing.
This approach works especially well for:
You keep control of your systems, but gain access to the tools, templates, and monitoring that support your compliance goals.
Quick Comparison | ||
Service | General IT Provider | Cybersecurity Partner (Securafy) |
Helpdesk support | ✅ | ✅ |
Email and device setup | ✅ | ✅ |
GLBA / FTC compliance | ❌ | ✅ |
Written security policies | ❌ | ✅ |
Phishing simulations | ❌ | ✅ |
Microsoft 365 hardening | ❌ | ✅ |
Legal vendor risk reviews | ❌ | ✅ |
Local audit support (Ohio) | ❌ | ✅ |
Firms in Columbus, Medina, and Painesville often outgrow their general IT provider once compliance questions start coming up, from regulators, clients, or insurance companies. When that happens, they either scramble to meet requirements or look for a security-focused partner who already understands the accounting industry.
Co-managed cybersecurity means:
Ideal for firm leaders looking to reduce risk and improve compliance without adding internal IT headcount.
Cybersecurity risks aren’t limited to large cities or high-profile firms. Across Ohio, small and mid-sized accounting practices are being targeted in ways that directly threaten their operations, reputations, and compliance standing. The risks may look different in Columbus than they do in Medina, but the exposure is real, and growing.
Securafy has worked with accounting firms throughout the state. We’ve seen how resource constraints, outdated systems, and vendor reliance put firms in a vulnerable position, especially during tax season.
Inconsistent protections in hybrid environments.
In towns like Painesville and Medina, remote staff working without endpoint protection or secure VPN access have introduced malware and exposed client data. Personal laptops and public Wi-Fi remain common entry points.
Many Ohio-based firms still believe compliance rules don’t apply to them. But as soon as a breach occurs, the FTC, state regulators, or even clients will start asking questions. The most common gaps we see:
Failing to address these areas leaves firms exposed not just to attackers, but to legal liability and audit failure.
We specialize in helping accounting firms in Ohio build realistic, defensible cybersecurity programs. We understand that your team is small, your tools are already in place, and you don’t have time for fluff. Our focus is on delivering what matters.
What we offer:
Whether you’re in Columbus, Medina, or Cleveland, we deliver cybersecurity that matches your operations, not a one-size-fits-all service from an out-of-state provider.
This FAQ covers the questions we hear most from CPA firms, tax professionals, and financial service providers in Ohio. The answers focus on compliance, practical tools, and security expectations specific to small and mid-sized firms.
Yes. If you prepare taxes, manage financial data, or provide payroll or advisory services, the FTC considers you a “financial institution” under the Safeguards Rule. This applies even if you're a solo practitioner. The rule requires you to maintain:
Failure to comply may result in fines or enforcement action after a breach.
If your firm works with publicly traded companies, the Sarbanes-Oxley Act (SOX) applies. It requires IT controls to protect the integrity of financial reporting. That includes:
These expectations often overlap with GLBA and general cybersecurity frameworks like NIST.
QuickBooks Online is secure by design, but only if configured properly. You should:
Consider using a secure client portal like SmartVault or ShareFile to share sensitive data instead of giving clients direct QBO access.
Ask for:
Vendors like Drake, Lacerte, and UltraTax can meet compliance standards, but you need to confirm that their security settings are properly implemented on your end.
All documentation should be reviewed annually and updated after major incidents or changes to your tech stack.
Yes. Ohio requires notification to affected residents if unencrypted personal data is compromised. This applies to both digital and paper records. Notification must happen “without unreasonable delay” and include details about the breach, the type of data affected, and contact instructions.
Ohio also provides Safe Harbor protection for firms that adopt recognized cybersecurity frameworks (e.g., NIST, GLBA, ISO 27001). This can reduce legal exposure after a breach.
Use tools like:
Train everyone at onboarding, then at least once a year. More often if you deploy new systems or experience a breach.
IT support focuses on:
Cybersecurity focuses on:
If your provider can’t speak to GLBA, FTC, or SOX expectations, they’re likely not offering full cybersecurity support.
Not without configuration. Both tools can be secured, but most firms use them with default settings that allow public link sharing and lack encryption at rest. Use a tool designed for accounting file storage, like:
These offer stronger controls, audit trails, and permissions built for financial documents.
At least annually. Also after:
Document your findings, review policies, and adjust access controls based on what you learn.