<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CAMICO Archives - CAMICO</title>
	<atom:link href="https://snoopy.camico.com/blog/category/camico/feed/" rel="self" type="application/rss+xml" />
	<link>https://snoopy.camico.com/blog/category/camico/</link>
	<description>Insurance for CPAs, by CPA&#039;s</description>
	<lastBuildDate>Thu, 18 Dec 2025 17:31:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://snoopy.camico.com/wp-content/uploads/2022/04/camfav-150x150.png</url>
	<title>CAMICO Archives - CAMICO</title>
	<link>https://snoopy.camico.com/blog/category/camico/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Claims Chronicles 127-B</title>
		<link>https://snoopy.camico.com/blog/claims-chronicles-127-b/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=claims-chronicles-127-b</link>
		
		<dc:creator><![CDATA[Amber]]></dc:creator>
		<pubDate>Thu, 18 Dec 2025 17:15:59 +0000</pubDate>
				<category><![CDATA[CAMICO]]></category>
		<category><![CDATA[Claims]]></category>
		<guid isPermaLink="false">https://snoopy.camico.com/?p=13591</guid>

					<description><![CDATA[<p>The post <a href="https://snoopy.camico.com/blog/claims-chronicles-127-b/">Claims Chronicles 127-B</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The post <a href="https://snoopy.camico.com/blog/claims-chronicles-127-b/">Claims Chronicles 127-B</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Cyber Saga Continues… Protect Your Firm from First-Party and Third-Party Cyber Exposures</title>
		<link>https://snoopy.camico.com/blog/the-cyber-saga-continues-protect-your-firm-from-first-party-and-third-party-cyber-exposures/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-cyber-saga-continues-protect-your-firm-from-first-party-and-third-party-cyber-exposures</link>
		
		<dc:creator><![CDATA[Amber]]></dc:creator>
		<pubDate>Tue, 24 Jun 2025 23:34:08 +0000</pubDate>
				<category><![CDATA[Accounting]]></category>
		<category><![CDATA[CAMICO]]></category>
		<category><![CDATA[CPA]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.camico.com/?p=13245</guid>

					<description><![CDATA[<p>In today’s digital landscape, it is no surprise that there appears to be a new cybersecurity story in the news every week, from attacks on major infrastructure to small companies being held for ransom. The risk of cyber threats continues to grow for CPA firms, along with other professional services firms, as all are considered ... <a title="The Cyber Saga Continues… Protect Your Firm from First-Party and Third-Party Cyber Exposures" class="read-more" href="https://snoopy.camico.com/blog/the-cyber-saga-continues-protect-your-firm-from-first-party-and-third-party-cyber-exposures/" aria-label="Read more about The Cyber Saga Continues… Protect Your Firm from First-Party and Third-Party Cyber Exposures">Read more</a></p>
<p>The post <a href="https://snoopy.camico.com/blog/the-cyber-saga-continues-protect-your-firm-from-first-party-and-third-party-cyber-exposures/">The Cyber Saga Continues… Protect Your Firm from First-Party and Third-Party Cyber Exposures</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13245" class="elementor elementor-13245" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-69ce6b7 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="69ce6b7" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0aca252" data-id="0aca252" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-6f2e583 elementor-widget elementor-widget-text-editor" data-id="6f2e583" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>In today’s digital landscape, it is no surprise that there appears to be a new cybersecurity story in the news every week, from attacks on major infrastructure to small companies being held for ransom. The risk of cyber threats continues to grow for CPA firms, along with other professional services firms, as all are considered prime targets for cyber criminals given the wealth of sensitive client data, financial information, and/or legal documents they maintain.</p><p>Don’t be lulled into a false sense of comfort that your firm (or your clients) are too small or too large to be attacked. CAMICO is seeing an uptick in the number of cyber-related claims impacting CPA firms of all sizes and unfortunately, the severity of these cyber crimes and ransomware attacks have grown in recent years.</p><p>Some of the more frequent categories of loss for CPA firms related to cyber claims include:</p><ul><li>Social engineering</li><li>Funds transfer fraud</li><li>Theft of data</li><li>Loss of laptop or data stick</li><li>Unauthorized use of networks</li><li>Failure to protect client confidential information shared with a third-party service provider</li><li>Computer system cloud hack</li><li>Lost profits related to cyber events</li><li>Ransom attacks</li></ul><p>Identifying key cyber risks and best practices to mitigate risk exposures is important to safeguard confidential information, maintain client trust, and ensure your firm’s continuity. One of the important concepts people must be aware of when evaluating their cybersecurity exposures is the difference between first-party risks and third-party risks. First-party risks are damages and losses you incur from a cyber attack or security breach of your firm, whereas third-party risks often arise when a hacker has penetrated the firm’s (or client’s) computer system causing damages to a client or other third party as a result of the cyber incident for which the firm may be blamed in whole or in part.</p><p>As you would expect, first-party cyber exposures have become increasingly problematic for CPA firms as cyber criminals are targeting CPA firms and tax professionals with greater frequency because of the abundance of client data found on CPA firms’ computers. If they are successful in gaining access to a firm’s information infrastructure, there can be costly measures that need to be taken by the firm such as hiring IT forensic experts to determine the extent of the breach, consulting with attorneys who specialize in data breach laws and notification obligations, and providing credit monitoring to those impacted by the breach.</p><p>What may be surprising to some CPAs, however, is the increase in third-party cyber exposures that are impacting firms. These situations often arise when a client has been hacked, and the hacker has penetrated the client’s computer system and once inside, causes all manner of losses for which the CPA firm may be blamed. Unfortunately, many of these incidents tend to be high-dollar claims against the CPA firm. These claims typically include allegations that the firm failed to detect red flags associated with communications executed by the hacker, falling below the standard of care by initiating wire transfers (later determined to be fraudulent) without “proper” client authorization, failure to “warn and advise” clients of the potential risks/threats of cyber attacks, and the list goes on.</p><p><strong>Cyber Claims Trends</strong><br />Human error remains a significant threat to cybersecurity, with a wide range of activities such as weak password practices, falling for phishing attacks, and the mishandling of sensitive information contributing to security breaches.</p><p>Social engineering, which is the art of exploiting human behavior as a manipulation technique to gain access to confidential information, is one of the most dangerous types of cybersecurity threats to CPA firms given the type of information that firms gather and store. “Phishing” is one of the more widespread social engineering schemes, where information in an email attempts to convince a recipient that the email is from a legitimate source and the recipient needs to respond to the request by clicking a link. The trend this past tax season as reported in CAMICO’s mid-March 2025 Alert is bogus emails from the “Social Security Administration” or “IRS e-Services.” As employees are the most common entry point for phishing attacks, a firm’s best protection against social engineering attempts is to make continuous efforts to raise awareness with staff to <strong>never take these emails at face value</strong> and instead, maintain ongoing vigilance and enhanced skepticism with every email and online interaction.</p><p>Consider the following two scenarios from the CAMICO claims files which unfortunately are becoming all too familiar for CPA firms:</p><p style="padding-left: 40px;"><strong>Scenario #1: Client hacked; CPA firm initiated fraudulent wire-transfers<br /></strong>A client of the CPA firm was hacked, and the hacker penetrated and commandeered the client’s email account. The hacker emailed several requests to the CPA firm to wire funds to a new account — a classic “man in the middle” attack. After receiving each request, a CPA firm staff member emailed the client to verify the wire transfer instructions. As the hacker had full control of the client’s email account, the hacker was able to respond back to the CPA firm to verify the payments to the hacker’s overseas bank account.<strong><br /></strong></p><p style="padding-left: 40px;">The above scenario, unfortunately, has become a recurring fact pattern, and these fraudulent wire transfer requests frequently cause large dollar losses. If the fraudster is controlling the client’s email and potentially their phone system as well, and the fraudulent request mimics previous legitimate requests, it is often difficult for the firm to identify the request as illegitimate. When fraud is discovered after the transfer, the funds are usually not recoverable. Domestic banks are not always helpful in preventing fraudulent transfers, as laws tend to limit their risk exposures and enable them to deny responsibility.</p><p style="padding-left: 40px;">With the increased number of claims related to fraudulent wire transfers, the best risk management practice in the absence of any written protocols to the contrary is to verbally confirm <strong>all</strong> wire transfer requests with the client, and <strong>not</strong> rely on email or voicemail confirmations. Unfortunately, technological advances have permitted sophisticated scammers to create AI versions not only of people’s voices, but also realistic avatars of scam targets so that you can’t trust your ears or your eyes on virtual calls (Microsoft Teams). <strong>Ideally, you and your client will have a code word and/or phrase to confirm the authenticity of the person you are speaking to.</strong> Additional loss prevention guidance to minimize fraudulent wire transfer exposure can be found in CAMCO’s article <em>Social Engineering Scams/Fraudulent Wire Transfers</em>. Refer to the Cyber/Data Security Resource Center on CAMICO’s <a href="https://member.camico.com/portal/Policyholder-Login">Members-Only Site</a>.</p><p style="padding-left: 40px;"><strong>Scenario #2: Ransomware</strong><br />An employee of a CPA firm opened an unsolicited email attachment from “IRS e-Services” that immediately downloaded ransomware onto the firm’s computer system. The employee noticed that the file names were rapidly being changed to “Needs Decrypting.” The employee turned off and rebooted the computer, but the virus had already spread to all the firm’s servers, and all the files became encrypted. The employee reported the incident to the firm’s managing partner and the firm promptly took actions in accordance with their Incident Response Plan. Once it was determined that a breach had occurred, the firm complied with applicable state and federal laws, and the breach was reported to law enforcement.</p><p style="padding-left: 40px;">Ransomware is one of the most malicious hacker attack vectors and firms of all sizes have become victims. It sneaks into computer systems, encrypts files, and demands a ransom before agreeing to decrypt the files. A major problem is that hackers do not always decrypt files even after the ransom is paid.</p><p style="padding-left: 40px;">Ransom demands have certainly increased in recent years and it is not unusual to see them range from several thousand dollars to several hundred thousand dollars. Some ransomware attacks rely on software that now has known fixes, so a solution might be found online. Other ransom attacks are more advanced and have no known fixes, other than the victim retrieving and relying on the latest backup files. Therefore, being prepared and taking precautions against cyber risk exposures is essential.</p><p>To gain a greater perspective on how CPA firms are impacted by cyber exposures, refer to the <em>IMPACT 126</em> <em>Claims Chronicles</em> for two additional cyber-related claims.</p><p><strong>Has your firm prepared for a cyber incident?</strong><br />Remember, it is not if you will be attacked, but <em>when</em>.</p><p>The weakest link in most cybersecurity attacks today continues to be the <strong>human element</strong>, so it is important to remember that your firm employees are a vital line of defense. Take action now to arm your employees with education, awareness, and reminders, so that they can make informed decisions about what they click.</p><p>Although not meant to be all-inclusive, the following additional <strong>basic best practice measures</strong> are extremely important when addressing the <strong>human element</strong> of data security:</p><ol><li><strong>Cybersecurity awareness training:</strong> As employees are the most common entry point for phishing attacks, a firm’s best protection against social engineering is to make continuous efforts to raise awareness of the importance of ongoing vigilance and enhanced skepticism of each email and online interaction. Education can come in various forms, both formal and informal. Consider sharing with your team “real-life” examples of the potential scam emails received by members of your firm. Learning of the attempted attacks on their colleagues heightens awareness of the nature and types of scams that pose potential threats.</li></ol><p style="padding-left: 40px;">As part of the firm-wide cybersecurity awareness training, you should also consider reviewing the firm’s existing protocols and infrastructure (refer to the firm’s written security plan in place) that supports the firm’s commitment to taking appropriate cybersecurity precautions so that all employees are aware and updated when changes are made. If your firm does not yet have a written security plan in place or you are in the process of updating your document, refer to CAMICO’s Written Information Security Plan (“WISP” or “ISP”) template. The template can be found on the Cyber/Data Security Resource Center on the CAMICO <a href="https://member.camico.com/portal/Policyholder-Login">Members-Only Site</a>.</p><p style="padding-left: 40px;">Raising the cybersecurity IQ of all employees will help tremendously in guarding against a breach and will minimize your firm’s potential exposure as employees will be better able to recognize social engineering attempts and understand the importance of guarding their login/authentication credentials both in the office and at home. To be of ultimate value, it is important for firms to commit to embracing a motto of continuous education because the threat landscape doesn’t stop evolving when your employees’ cybersecurity training is done.</p><p style="padding-left: 40px;">2. <strong>Use multi-factor authentication.</strong> This can add an extra level of security to prevent an account hack, especially when employees work remotely.</p><p style="padding-left: 40px;">3. <strong>Change and strengthen passwords frequently.</strong> Systems are only as secure as the passwords used to access them.</p><p style="padding-left: 40px;">4. <strong>Ensure all software has the latest security options/patches.</strong> This will help protect against malware, viruses, and hacker attacks.</p><p style="padding-left: 40px;">5. <strong>Require regular data backups.</strong> By encouraging employees to regularly back up their data you are preventing data loss when disaster strikes. While this may be a hard policy to enforce for employees working remotely, it remains the best practice. In many instances, devices can be set to back up to the cloud automatically. When relying on cloud storage remember that ransomware can also compromise cloud services. Any data stored in the cloud should also be periodically backed up to an external hard drive. Data backups ensure that a business can continue to operate, even if resources are taken offline by a ransomware attack.</p><p style="padding-left: 40px;">6. <strong>Maintain strong cyber hygiene.</strong> Reinforce with employees the cyber protocols to be followed when working both in the office as well as remotely (e.g., machine use restrictions, Wi-Fi passwords, VPN, firewalls, etc.).</p><p style="padding-left: 40px;">7. <strong>Remind all employees of the importance of powering down computers when not in use.</strong> Computers are not accessible to attacks or intrusions when powered off.</p><p><strong>Choose the Right Cyber Insurance Coverage</strong><br />Cyber insurance protects against financial losses related to data breaches or other covered cyber events. Cyber insurance coverage is basically divided along two lines:</p><ul><li>First-party, which refers to losses directly suffered by the policyholder (or insured) firm in response to a firm’s data breach or other covered cyber event, and</li><li>Third-party, which refers to damages alleged by clients or other third parties that the negligence of the CPA firm contributed in whole or in part to the third party’s cyber-related loss. CAMICO’s professional liability policy generally will cover third-party cyber claims subject to applicable policy terms, conditions, and exclusions.</li></ul><p>It is possible that a single cyber incident may give rise to both damage suffered by the firm (first-party losses) and damages allegedly suffered by others that blame the firm (third-party losses). The relationship between the first and third parties can be formed in many ways. It can be contractual (for example, engagement letters), built through tort law, common law, or other ways. CPA firm clients are third parties, and others may become a third party based on the nature of an incident. Clients may have insurance of their own, making them a first party with their own cyber insurance carrier.</p><p>First-party insurance typically covers the direct costs of actions needed after a firm has had a data breach, extortion, ransomware attack, or other hacker malfeasance against the firm. Third-party cyber-liability insurance, on the other hand, covers the costs of dealing with the claims of other parties that seek to hold your firm at least partially responsible for damages that they have incurred because of a cyber incident. Sometimes, the line between first-party damage and third-party damage becomes blurred — especially if a firm and its client have both been breached, and forensic analysis cannot conclusively establish either the sequence of events leading up to the breach and/or how the breach occurred.</p><p>Although not meant to be all-inclusive, the table below shows common cyber costs and damage that may be incurred in cyber-related claim situations, classified by first- and/or third-party potential exposures:</p><table><tbody><tr><td width="396"> </td><td width="114"><p style="text-align: left;"><strong>First-Party <span style="text-decoration: underline;">Exposures</span></strong></p></td><td style="text-align: left;" width="114"><p><strong>Third-Party <span style="text-decoration: underline;">Exposures</span></strong></p></td></tr><tr><td width="396">Restoration of the damaged systems, hardware, software and network</td><td width="114"><strong>X</strong></td><td width="114"><strong> </strong></td></tr><tr><td width="396">Cost to restore lost data</td><td width="114"><strong>X</strong></td><td width="114"><strong> </strong></td></tr><tr><td width="396">Ransom fees to retrieve lost data or reopen systems</td><td width="114"><strong>X</strong></td><td width="114"><strong> </strong></td></tr><tr><td width="396">Notification costs</td><td width="114"><strong>X</strong></td><td width="114"><strong>X</strong></td></tr><tr><td width="396">Forensic investigation costs</td><td width="114"><strong>X</strong></td><td width="114"><strong> </strong></td></tr><tr><td width="396">Credit monitoring costs</td><td width="114"><strong>X</strong></td><td width="114"><strong>X</strong></td></tr><tr><td width="396">Reprogramming costs</td><td width="114"><strong>X</strong></td><td width="114"><strong> </strong></td></tr><tr><td width="396">Business interruption costs</td><td width="114"><strong>X</strong></td><td width="114"><strong> </strong></td></tr><tr><td width="396">Lost client’s money sent to someone incorrectly due to a cyber event</td><td width="114"><strong> </strong></td><td width="114"><strong>X</strong></td></tr><tr><td width="396">Costs (restoration, fines/fees, etc.) incurred by the third party required due to lost data</td><td width="114"><strong> </strong></td><td width="114"><strong>X</strong></td></tr></tbody></table><p>Understanding the difference between first-party and third-party risks is essential when seeking cyber insurance. Ideally, every CPA firm should have some degree of insurance coverage for both first-party and third-party risks as the CPA firm faces exposure to many accusations and lawsuits in the event of a compromise or data breach impacting its clients’ data. For example, everyone faces risks of inadvertently forwarding a malware-infected email message that subsequently wreaks havoc after being opened by a recipient, or of their computers and networks being breached and subsequently exploited by hackers to serve as launching pads from which to target others. Relying on only one type of cyber insurance that may be limited to either first- or third-party coverage may leave businesses exposed to significant financial and legal risks. Whereas investing in both first-party and third-party cyber insurance ensures greater protection against today’s growing cyber threats.</p><p>If you have any specific coverage-related questions, please contact your agent or CAMICO at 1.800.652.1772, and ask to speak with your underwriter.</p><p><strong>Additional CAMICO Resources</strong><br />Additional risk management guidance and information on this topic is available on the Members-Only Site — refer to CAMICO’s Cyber/Data Security Resource Center. CAMICO policyholders with questions regarding this communication or other risk management questions should contact the Loss Prevention department at <a href="mailto:lp@camico.com">lp@camico.com</a>, or call our advice hotline at 800.652.1772 and ask to speak with a Loss Prevention Specialist.</p><p style="padding-left: 80px;"> </p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://snoopy.camico.com/blog/the-cyber-saga-continues-protect-your-firm-from-first-party-and-third-party-cyber-exposures/">The Cyber Saga Continues… Protect Your Firm from First-Party and Third-Party Cyber Exposures</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Conflicts of Interest Still Cause Trouble for CPAs</title>
		<link>https://snoopy.camico.com/blog/conflicts-of-interest-still-cause-trouble-for-cpas/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=conflicts-of-interest-still-cause-trouble-for-cpas</link>
		
		<dc:creator><![CDATA[Amber]]></dc:creator>
		<pubDate>Tue, 13 May 2025 21:40:17 +0000</pubDate>
				<category><![CDATA[CAMICO]]></category>
		<category><![CDATA[CPA]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Conflict of interest]]></category>
		<guid isPermaLink="false">https://www.camico.com/?p=9685</guid>

					<description><![CDATA[<p>                                                                By Duncan B. Will, CPA/ABV/CFF, CFE Conflicts of interest have long been a major factor in professional liability claims against CPAs. Part of ... <a title="Conflicts of Interest Still Cause Trouble for CPAs" class="read-more" href="https://snoopy.camico.com/blog/conflicts-of-interest-still-cause-trouble-for-cpas/" aria-label="Read more about Conflicts of Interest Still Cause Trouble for CPAs">Read more</a></p>
<p>The post <a href="https://snoopy.camico.com/blog/conflicts-of-interest-still-cause-trouble-for-cpas/">Conflicts of Interest Still Cause Trouble for CPAs</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="9685" class="elementor elementor-9685" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-95c5257 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="95c5257" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-37c49ec" data-id="37c49ec" data-element_type="column">
			<div class="elementor-widget-wrap">
							</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-e2ca313 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e2ca313" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5e5230c" data-id="5e5230c" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5d0ff68 elementor-widget elementor-widget-text-editor" data-id="5d0ff68" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><span style="color: var(--contrast);">                                                                <em>By Duncan B. Will, CPA/ABV/CFF, CFE</em></span></p>
<p>Conflicts of interest have long been a major factor in professional liability claims against CPAs. Part of the problem is that potential conflicts of interest are hard to recognize or identify until something goes wrong. When clients are satisfied, they tend to perceive the CPA as a competent advisor who has their best interests at heart. It’s not until clients become disappointed that their perception of the CPA begins to change. The CPA appears to no longer be prioritizing the client’s best interests. Sometimes the CPA may even appear to have sacrificed the client’s best interests to benefit the CPA or another party to the client’s detriment.</p>
<p>One common claim scenario is that of the CPA advising both parties to a transaction, or helping the parties resolve a dispute. For example, the CPA will sometimes agree to represent both the husband and the wife in a divorce when they are still friendly and cooperative. Many times though, the couple&#8217;s relationship will deteriorate, leaving the CPA stuck in the middle and caught in the crossfire. </p>
<p>The same is true for dissolutions or disputes between business partners. Disputes between partners or owners often result in the CPA’s advice becoming perceived by one of them as favoring the other.</p>
<p>Participating in business deals or investments with clients is another common scenario where everyone is happy while the investment performs well. But as soon as it takes a downturn or falls apart, the client’s perception of the CPA erodes.</p>
<p>These scenarios are riskiest when issues develop slowly, and the CPA is slow to recognize the slippery slope they are traversing by continuing to serve the parties’ conflicting interests.</p>
<h5><strong>Case Study</strong></h5>
<p>Consider the following case study (the names have been changed):</p>
<p>For decades, Paul Noble, the founder and managing partner of his CPA firm, had served as a trusted financial advisor to his clients. Like many CPAs, he also had his own personal financial advisor—stockbroker Rich Arrington. Noble frequently shared advice he received from Arrington with his firm’s clients and partners.</p>
<p>Chad Pennyworth, a junior broker at Arrington’s brokerage house, worked with some of Noble’s clients and took on many of Arrington’s accounts when Arrington retired. Noble trusted Arrington’s judgment in Pennyworth’s training and development. Though Noble did not refer any of his clients or acquaintances to Pennyworth, he did inform several of them that he had elected to work with him. Because of Noble’s reputation, many of his clients chose to engage Pennyworth as their own broker when they learned of Noble’s faith in Pennyworth.</p>
<p>Almost immediately after Arrington left, Pennyworth sold Noble some bonds, based on incorrect information that misidentified the bonds’ guarantor as the state, when the bonds were instead guaranteed by a financially challenged local school district.</p>
<p>Pennyworth acknowledged the mistake to Noble, and the brokerage firm agreed to repurchase the bonds from Noble’s portfolio, subject to a nondisclosure agreement, which Noble signed. Noble was pleased when a safer alternative was substituted for the bond investment a couple weeks later.</p>
<p>Two years later though, Noble was troubled when he read of the financial disaster that was all over the news: the local school district’s failure and worthlessness of the bonds the district had guaranteed. Pension funds and investors, including some of his clients, were hurt badly by the losses. Noble felt sorry for the investors but was relieved he had avoided a similar fate.</p>
<p>His relief turned to dismay, as some of his clients called to discuss the impact of the losses they sustained and their intentions to sue Pennyworth and the brokerage house.</p>
<p>Noble’s hands had been tied because of the nondisclosure agreement. He had not warned his clients of the elevated risk of the bond investment, and his clients were now surprised to learn that he was not “in the soup” with them.</p>
<p>During the class action lawsuit against Pennyworth and the brokerage house which followed, Noble’s initial investment, the reversal of that transaction, and the nondisclosure agreement became public knowledge. Noble’s reputation was ruined. He was now seen as a greedy, self-interested collaborator. Ultimately, Noble and his firm were added to the list of defendants in the class action lawsuit. His former clients alleged that Noble and his firm had a duty to disclose the concerns regarding their investment, had ignored the apparent conflict of interest, and had prioritized their own interests over those of their clients.</p>
<h5><strong>Loss Prevention Tips</strong></h5>
<p><strong>Recognize and communicate potential conflicts of interests.</strong> Project the scenario forward to anticipate what would happen if things were to go wrong. Juries tend to sympathize with clients — especially with the benefit of hindsight and the evidence laid out by a skilled attorney.</p>
<p><strong>Embrace “active ethics.”</strong> The CPA should recognize that his or her own personal interests can be adverse to client interests and should not agree to sign nondisclosure agreements without first protecting vulnerable clients. Moreover, disclosing a conflict of interest, while helpful, does not resolve the problem, even if clients acknowledge and sign the CPA’s disclosure regarding the potential conflict of interest. Clients could later argue that their consent was not “informed” by a third party (such as an attorney). Do not get too comfortable with disclosure as a form of protection. In the end, the issue will be whether there is a perception that the CPA’s loyalty to his or her clients waned.</p>
<p><strong>Recognize that there are risks associated with providing referrals.</strong> Clients often link the CPA who gives a referral to the professional who ultimately performs the services. In instances where it may be perceived that a CPA is offering a referral, the CPA should be careful to name three or more qualified candidates to perform the service and encourage the client to perform their own due diligence in assessing the suitability of the professionals’ qualifications.</p>
<p><em>Duncan Will is a Loss Prevention Director and Accounting and Auditing Specialist with CAMICO. He advises policyholders through the CAMICO Loss Prevention hotline and speaks to CPA groups on a wide range of topics.</em></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://snoopy.camico.com/blog/conflicts-of-interest-still-cause-trouble-for-cpas/">Conflicts of Interest Still Cause Trouble for CPAs</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Meet CAMICO&#8217;s New Vice President of Information Technology John Zissu</title>
		<link>https://snoopy.camico.com/blog/camico-names-john-zissu-as-its-vice-president-of-information-technology/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=camico-names-john-zissu-as-its-vice-president-of-information-technology</link>
		
		<dc:creator><![CDATA[Amber]]></dc:creator>
		<pubDate>Sat, 19 Apr 2025 22:33:18 +0000</pubDate>
				<category><![CDATA[CAMICO]]></category>
		<category><![CDATA[Press Releases]]></category>
		<guid isPermaLink="false">https://www.camico.com/?p=13149</guid>

					<description><![CDATA[<p>John Zissu became Vice President of Information Technology on April 7, 2025. John Zissu joined CAMICO as Vice President of Information Technology on April 7, 2025. Prior to CAMICO, Zissu served as Vice President – Platform Owner at Everest North America and as Vice President of Technology at Tokio Marine HCC (TMHCC), where he spearheaded ... <a title="Meet CAMICO&#8217;s New Vice President of Information Technology John Zissu" class="read-more" href="https://snoopy.camico.com/blog/camico-names-john-zissu-as-its-vice-president-of-information-technology/" aria-label="Read more about Meet CAMICO&#8217;s New Vice President of Information Technology John Zissu">Read more</a></p>
<p>The post <a href="https://snoopy.camico.com/blog/camico-names-john-zissu-as-its-vice-president-of-information-technology/">Meet CAMICO&#8217;s New Vice President of Information Technology John Zissu</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13149" class="elementor elementor-13149" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-b099aa4 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="b099aa4" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-79a988e" data-id="79a988e" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-107c762 elementor-widget elementor-widget-image" data-id="107c762" data-element_type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
												<figure class="wp-caption">
										<img fetchpriority="high" decoding="async" width="254" height="300" src="https://snoopy.camico.com/wp-content/uploads/2025/04/CamicoPortraits-04-254x300.jpg" class="attachment-medium size-medium wp-image-13151" alt="" srcset="https://snoopy.camico.com/wp-content/uploads/2025/04/CamicoPortraits-04-254x300.jpg 254w, https://snoopy.camico.com/wp-content/uploads/2025/04/CamicoPortraits-04-868x1024.jpg 868w, https://snoopy.camico.com/wp-content/uploads/2025/04/CamicoPortraits-04-768x906.jpg 768w, https://snoopy.camico.com/wp-content/uploads/2025/04/CamicoPortraits-04.jpg 1181w" sizes="(max-width: 254px) 100vw, 254px" />											<figcaption class="widget-image-caption wp-caption-text">John Zissu became Vice President of Information Technology on April 7, 2025.</figcaption>
										</figure>
									</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-345c333 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="345c333" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-76e9e28" data-id="76e9e28" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5f5e896 elementor-widget elementor-widget-text-editor" data-id="5f5e896" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>John Zissu joined CAMICO as Vice President of Information Technology on April 7, 2025.</p><p class="mdc-article-paragraph" data-v-02ca9be7="">Prior to CAMICO, Zissu served as Vice President – Platform Owner at Everest North America and as Vice President of Technology at Tokio Marine HCC (TMHCC), where he spearheaded projects that significantly improved operational efficiency through modern core, digital, and data systems implementations. Specifically, within the TMHCC consolidation, Zissu worked on miscellaneous professional liability and employment practices implementations, developing highly relevant subject matter expertise for CAMICO.</p><p class="mdc-article-paragraph" data-v-02ca9be7="">His expertise in modernizing technology operations includes cloud architecture, cybersecurity, data analytics, and the strategic implementation of Robotic Process Automation (RPA) and Artificial Intelligence (AI).</p><p class="mdc-article-paragraph" data-v-02ca9be7="">“John brings 25 years of insurance industry experience, including 15 years in specialty carrier technology leadership, driving strategic transformation,” said CAMICO President and CEO Mike Ray. “His deep understanding of insurance underwriting, claims, and financial processes, coupled with expertise in modern carrier platform architecture, enables him to translate complex technology into actionable business strategies. He is well prepared to step into this important leadership role and provide value to CAMICO and its policyholders.”</p><p class="mdc-article-paragraph" data-v-02ca9be7="">Zissu holds a J.D. from Fordham Law and a bachelor’s degree in psychology from The College of New Jersey, bringing a unique blend of analytical and strategic thinking.</p><p class="mdc-article-paragraph" data-v-02ca9be7="">“I am thrilled to be joining the CAMICO family and looking forward to contributing to CAMICO&#8217;s continued growth and success,” Zissu said. “From my first interactions, it was clear how much CAMICO values its people and its reputation for providing exceptional client value. I&#8217;m passionate about using technology to create positive change, and I&#8217;m eager to work alongside the team to develop solutions that make a real difference for our employees and policyholders.”</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://snoopy.camico.com/blog/camico-names-john-zissu-as-its-vice-president-of-information-technology/">Meet CAMICO&#8217;s New Vice President of Information Technology John Zissu</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CAMICO Tip: Best Practices to Prevent Wire Transfer Fraud</title>
		<link>https://snoopy.camico.com/blog/camico-tip-best-practices-to-prevent-wire-transfer-fraud/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=camico-tip-best-practices-to-prevent-wire-transfer-fraud</link>
		
		<dc:creator><![CDATA[Amber]]></dc:creator>
		<pubDate>Thu, 20 Mar 2025 01:22:07 +0000</pubDate>
				<category><![CDATA[Accounting]]></category>
		<category><![CDATA[CAMICO]]></category>
		<category><![CDATA[CPA]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://www.camico.com/?p=13111</guid>

					<description><![CDATA[<p>Q: My client has asked our firm to initiate wire transfers. What risks are associated with agreeing to initiate wire transfers and what protocols should our firm consider?  A: CPA firms continue to be at high risk of social engineering attempts due to the type of information firms gather and store. If the firm and/or a ... <a title="CAMICO Tip: Best Practices to Prevent Wire Transfer Fraud" class="read-more" href="https://snoopy.camico.com/blog/camico-tip-best-practices-to-prevent-wire-transfer-fraud/" aria-label="Read more about CAMICO Tip: Best Practices to Prevent Wire Transfer Fraud">Read more</a></p>
<p>The post <a href="https://snoopy.camico.com/blog/camico-tip-best-practices-to-prevent-wire-transfer-fraud/">CAMICO Tip: Best Practices to Prevent Wire Transfer Fraud</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13111" class="elementor elementor-13111" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-9b52954 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9b52954" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cff5101" data-id="cff5101" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-029b75a elementor-widget elementor-widget-text-editor" data-id="029b75a" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>Q: My client has asked our firm to initiate wire transfers. What risks are associated with agreeing to initiate wire transfers and what protocols should our firm consider? </strong></p><p><strong>A: </strong>CPA firms continue to be at high risk of social engineering attempts due to the type of information firms gather and store. If the firm and/or a client’s email is hacked, a wire transfer request could come from a fraudster/hacker. As fraudulent wire transfers frequently cause large dollar losses, firms need to be hypervigilant in their efforts to protect the firm and clients against wire transfer fraud.</p><p>If the fraudster controls the client’s and the firm’s email, commonly referred to as a “man in the middle” attack, the fraudulent request may mimic previous legitimate requests, which can make it very difficult for a firm to identify the request as illegitimate. When the fraud is discovered after the transfer, the funds are usually not recoverable. Domestic banks are often not helpful in preventing fraudulent transfers, as laws tend to limit their risk exposure and enable them to deny responsibility.</p><p>Given the increasingly sophisticated phishing and spoofing scams, CAMICO strongly encourages firms to have written protocols in place with clients who need such services that outline the protocols to be followed when executing wire transfer requests. Certainly, best practice would be to verbally verify the authenticity of <strong>all</strong> wire transfer requests that are received by the firm via email correspondence, but for those clients who may wish to limit the requirement for your firm to verbally verify each wire transfer, the client should specify in writing those limits (e.g., by dollar threshold, business purpose, etc.) as well as acknowledge their responsibility for the added risks associated with this limited verbal verification process. We recommend including as part of the verification process specific questions to which only your client would know the answer.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://snoopy.camico.com/blog/camico-tip-best-practices-to-prevent-wire-transfer-fraud/">CAMICO Tip: Best Practices to Prevent Wire Transfer Fraud</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CAMICO Tip: Tax Engagements – Managing Client Expectations</title>
		<link>https://snoopy.camico.com/blog/camico-tip-tax-engagements-managing-client-expectations/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=camico-tip-tax-engagements-managing-client-expectations</link>
		
		<dc:creator><![CDATA[Amber]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 19:39:25 +0000</pubDate>
				<category><![CDATA[CAMICO]]></category>
		<category><![CDATA[CPA]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Tax Risk Management]]></category>
		<category><![CDATA[Tax Season]]></category>
		<guid isPermaLink="false">https://www.camico.com/?p=12887</guid>

					<description><![CDATA[<p>Are you taking the right steps to manage (and document) client expectations? Effective communication is a key factor in any CPA-client relationship, and when you work to stay in control of managing client expectations, you help to safeguard your firm. To that end, good documentation is critical to successfully managing client expectations. Jurors (members of ... <a title="CAMICO Tip: Tax Engagements – Managing Client Expectations" class="read-more" href="https://snoopy.camico.com/blog/camico-tip-tax-engagements-managing-client-expectations/" aria-label="Read more about CAMICO Tip: Tax Engagements – Managing Client Expectations">Read more</a></p>
<p>The post <a href="https://snoopy.camico.com/blog/camico-tip-tax-engagements-managing-client-expectations/">CAMICO Tip: Tax Engagements – Managing Client Expectations</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="12887" class="elementor elementor-12887" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-2afea50 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="2afea50" data-element_type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-db23e4c" data-id="db23e4c" data-element_type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-4de7a67 elementor-widget__width-initial elementor-widget elementor-widget-text-editor" data-id="4de7a67" data-element_type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p style="text-align: left;">Are you taking the right steps to manage (and document) client expectations? Effective communication is a key factor in any CPA-client relationship, and when you work to stay in control of managing client expectations, you help to safeguard your firm. To that end, <strong>good documentation</strong> is critical to successfully managing client expectations. Jurors (members of the public) generally consider CPAs to be experts in documentation, and falling short of that expectation may be viewed as negligent and perceived as falling below the standard of care.</p><p>Below are helpful documentation tips to get you through the remainder of tax season:</p><ul><li><strong>Engagement letters.</strong> While engagement letters won’t immunize you from lawsuits, they can be your first line of defense if a client makes a claim against you. Although you likely already have executed engagement letters in place with your tax clients, for those engagements that have had some engagement creep, memorialize the additional services by updating your engagement letter or obtaining a signed addendum clarifying the revised scope and limits.                                                                                                                                                                                                                    </li><li><strong>Always document significant meetings and communications.</strong> Follow up with written communications in circumstances including, but not limited to:<ul><li>Change in engagement scope (may require a new engagement letter)</li><li>Negative information (e.g., tax return is already late, client’s failure to timely provide information, client is facing an audit)</li><li>Judgment calls (e.g., aggressive tax positions taken by your predecessor)</li><li>Client agreement to take significant action</li><li>Conversations regarding transactions, extensions, or estimated tax payments                                                                                                      </li></ul></li><li><strong>“Advise” clients of opportunities and “warn” clients about risks.</strong> Consider the need for additional documentation (e.g., client notification letters, tax representation letters, etc.) to mitigate high-risk issues such as the following:<ul><li>Recent legal and regulatory developments regarding the Beneficial Ownership Information (BOI) reporting requirements under the Corporate Transparency Act (CTA) have implications for reporting companies’ compliance obligations and FinCEN’s enforcement of the CTA reporting rules as currently promulgated. As the CTA-BOI saga continues, CAMICO strongly recommends that CPA firms continue to keep clients<b> informed</b> and <b>advised</b> as these significant developments occur.</li><li>For clients with significant digital asset transactions, it may be prudent to have them sign a <em>tax representation letter</em> or a stand-alone <em>certification letter</em> at the conclusion of the engagement addressing cryptoasset implications. The additional defensive documentation provides evidence of the client’s understanding and acceptance of their responsibilities regarding digital asset transactions and the limitations of the services your firm provided.                                                                                                              </li></ul></li><li><strong>Written documentation should be factual, professional, and without personal commentary or unsubstantiated opinions.</strong> Unprofessional and/or inappropriate comments can damage the integrity of documentation. Ask yourself whether your documentation would be helpful or harmful if presented at trial.</li></ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://snoopy.camico.com/blog/camico-tip-tax-engagements-managing-client-expectations/">CAMICO Tip: Tax Engagements – Managing Client Expectations</a> appeared first on <a href="https://snoopy.camico.com">CAMICO</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
