Olsen Thielen Advisor Blog

Categories
Small businesses are always on the lookout for what can differentiate them in the marketplace, but are they overlooking a common business tool? Information technology (IT) is often thought of as the tool used for general back office functions and office employee productivity. Without these basic functions, businesses would come
There are ten fundamental information security practices that should be followed in every organization: Think Right, Get Help, Get Involved, Lead, Plan, Set Goals, Measure, Seek, Encourage and Prepare. Some of these things you can delegate to others, and some of these thing you can’t. As CEO you need to
Every day there are tens of thousands of new threats created, and most of them will be delivered to your employees in the form of an innocent looking email, a shared file, or an infected website. A simple click of their mouse will invite it in to your network. So
As economic conditions have improved and the number of baby-boomers ready for retirement has grown, we have seen a dramatic increase in the sale of private companies here in Minnesota and in the United States.
Once the tax filing season is over doesn't mean that tax scams have ended. Taxpayers face the threat of tax scams at any time because it is highly profitable for fraudsters year round. IRS phone scams, in particular, can be carried out any time of the year.
An important internal control related to cash disbursements can include requiring two authorized signatures on all company checks generally over a specific amount that has been set by management or the board directors. By requiring two signatures, the company is verifying that both signers agree that the payment is proper
Form 990 is the annual information return filed by tax-exempt organizations with the Internal Revenue Service, and provides a wealth of information to the IRS and to readers of the return. Form 990 is a public document, meaning anyone can ask to see your association’s 990, and you are required
According to Steve Lapppenbusch, Ph.D., of LexisNexis Risk Solutions: "An identity is stolen every three seconds--adding up to about 27,000 per day."
Did you know that email marketing is regulated by Federal law? In 2003, the United States Congress passed an act that legislates how and when a business can send emails to customers or potential customers. This legislation is called the "Controlling the Assault of Non-Solicited Pornography and Marketing Act of
Have you ever wanted to start saving for retirement or increase your savings rate, yet you hesitated due to all the complexity of investment alternatives? Start saving now so you will improve your future retirement outlook.
The Association of Certified Fraud Examiners (ACFE) releases a report that summarizes information from fraud cases investigated in more than 100 countries. The 2014 report includes an analysis of 1,483 cases of occupational fraud.
A Certified Fraud Examiner (CFE) has a unique set of skills that are not found in any other career field or discipline. They combine a knowledge of complex financial transactions with proven expertise in fraud prevention, detection and deterrence. Fraud examiners are trained to understand not only how fraud occurs,
Our forensic support services can help implement strategies to identify fraud and reduce the risk of loss. If fraud is already present, we can investigate and calculate losses.
Our business valuation experts help business owners and their advisors determine and understand the value of their business.
Before you elect any board member the first step is to figure out which type of person you would like to choose. You want to consider their experience, qualifications, skills and commitment, but what about age?
We Value Your Privacy

This site may use cookies to store information on your computer. Some are essential to make our site work and others to improve the user experience. By using this site, you consent to the placement of these cookies and accept our privacy policy.