Image Image Image Image Image Image Image Image Image

Tech Archives | Delap CPA


11 Sep

What is Blockchain?

September 11, 2018 | By | No Comments

Will blockchain technology reinvent double entry accounting? Accountants today use double entry bookkeeping to record transactions. Companies record financial information in central ledgers in a debits and credits format. At year-end, they hire auditors to review their records, who then verify and provide trust in the records and reasonable assurance that fraud did not take […]

Read More

15 Mar

Cybersecurity – Does it Matter in the Manufacturing Industry?

March 15, 2018 | By | No Comments

According to the Leading Edge Alliance 2018 National Manufacturing Outlook and Insights Report (click the link above to download the report) cybersecurity will be a top priority for manufacturing companies during 2018. In our technology-driven culture, cybersecurity is (or will become!) important to everyone.   Do you realize you should be improving the IT controls within […]

Read More

29 Jan

Tax Guide to Cryptocurrencies – Part 2: Mining

January 29, 2018 | By | No Comments

Author: Victoria Leca, Tax Accountant at Delap Read Tax Guide to Cryptocurrencies – Part 1: Like Kind Exchanges For the second part of our blog series on cryptocurrencies, we will discuss revenue recognition implications around mining currencies. An important feature that has made Bitcoin so popular is the opportunity to mine the coin yourself. Any […]

Read More

18 Jan

Tax Guide to Cryptocurrencies – Part 1: Like Kind Exchanges

January 18, 2018 | By | No Comments

January 18, 2018 — By Victoria Leca, Tax Accountant at Delap In recent years cryptocurrencies have become extremely popular. From the meteoric rise of Bitcoin, to the founding of Coinbase, which now has over 13 million users, to new cryptocurrencies being developed daily, it has been a challenge for regulators to keep up. So the onus […]

Read More

14 Sep

The Newest Attack on Bluetooth Devices and How You Can Protect Yourself

September 14, 2017 | By | No Comments

  Yesterday, researchers at Armis announced that they had found a series of vulnerabilities in Bluetooth that can allow an attacker to take over a device in seconds, with no interaction from the user end. They have dubbed this new attack “BlueBorne.” Bluetooth is a short range wireless protocol most commonly used to send things […]

Read More