Is PwC the New KPMG?

From the mailbag:

Hi Caleb,

I am considering becoming an experienced hire at PwC, however I have heard some strange things and can’t seem to get a solid angle on them. I have heard that PwC (still) doesn’t let you expense lunches when traveling. I’ve also heard that PwC is still on Windows XP with Office 2003, Lotus Notes email and using Lenovo ThinkPads. Can you please help me confirm or deny these rumors and add some color around them? Also, are there other things at PwC that I should be wary of? Is PwC the new KPMG?

Thanks,

Concerned Potential Recruit


To the best my knowledge, Concerned, I’ll address these one at at time:

1. I have heard that PwC (still) doesn’t let you expense lunches when traveling. – True. PwC does not allow you to expense lunches when traveling, although it’s my understanding that a “business lunch” is reimbursable.

2. I’ve also heard that PwC is still on Windows XP with Office 2003 – Partially true. P. Dubs is on XP but is running Office 2007.

3. Lotus Notes email – True. There were some layoffs of LN developers way back in the fall of ’09 but it’s our understanding that they still run it.

4. Lenovo ThinkPads – True. You were maybe expecting iPads? Those are for bonuses only.

5. Are there other things at PwC that I should be wary of? – I’d start here.

6. Is PwC the new KPMG? – Um, no. Unless you’re consider all the KPMG partners they’ve picked up makes it the “new KPMG.”

Fraudbusters Get a Lesson in Internet Stalking

Yesterday I sat in a session at the ACFE Fraud Conference and Exhibit entitled “Effectively Using Social Networks and Social Media in Fraud Examinations” with a few hundred [?] fraudbusters and I got the impression that few people in the room were social media savvy (in the stalk-y sense, anyway). I came to this conclusion after watching most of the hands in the room go up when asked “who thinks social media is a waste of time?” and saw nearly same amount of hands raised when asked “do you have some sort of social network presence?”

Cynthia Hetherington, President of Hetherington Group, described herself as “[A] librarian, a technologist and licensed private investigator. So, I’m a nerd, I’m a geek and I’m a dick,” was the speaker for this particular session and a lot of her talk introduced the crowd to the idea of stalking people on the Internet. She knew her crowd well, as a joke about Laverne & Shirley’s apartment got plenty of laughs, while a quip about Snooki got crickets. This reinforced my suspicion that the idea that of curating information about financial crooks using Facebook and Twitter was new to many in the room.

Now, the majority of people listening may have known it was possible to find partially-nude pics on someone’s Facebook profile or Twitter account (which she demonstrated in one non-Anthony Weiner example) but maybe they hadn’t considered that they could learn a lot of other useful information about someone they were investigating.

In short, Ms. Herrington explained to the biz casual crowd that you can find out a lot of information about a person just by poking around their social media accounts. Whether it’s Facebook, Twitter, or LinkedIn, you can learn someone’s likes, dislikes, their political leanings, where they’ve lived, who their friends are, etc. and use that information to build a profile, analyze behavior or in some cases, find out where someone maybe hiding.

What does all this mean? Opportunity my friends. If you fancy yourself social media and Internet savvy, you probably have a leg up on many of the vets in the fraud and forensics business when it comes to poking around the Web and finding information on people of interest to you. Sure you may not have their years of investigative expertise, extensive contacts or an aging wardrobe but you may have successfully Web-stalked ex-significant others, crushes and completely random people to learn things that they’ve volunteered into cyberspace. And here you thought your creepy behavior was completely worthless.

Chase’s New Expense Tracking App Will Cater to the Most Anal-Retentive Bosses

If finicky expense-tracking is going to evolve with the times, there has to be a way to track every dime spent from anywhere and it appears Chase is making an effort toward that goal with its newest offering: Jot.

Hot off the wire:

Jot will provide Ink from Chase customers a variety of mobile benefits, including the ability to:

— Receive text alerts within seconds of making a purchase with their Ink card;

— Immediately tag these purchases to custom categories on a mobile device or online;

— Enable employees to tag their business expenses;

— Immediately view all transactions on their account, including those of their employees, through their mobile device or online;

— Adjust employees’ card spending limits in real-time via a mobile device; and

— Create and download reports into accounting software, including QuickBooks(R) and Excel(R).

“Small business owners are innovative, passionate and hardworking, and Chase’s dedication to partnering with these business owners comes from the belief that this group of entrepreneurs is an integral part of the American economy,” said Richard Quigley, president of Ink from Chase. “Jot was designed with small business owners’ immediate financial needs top of mind. Jot will enhance the finance-savvy business practices of small business owners, allowing for additional time and an improved focus on the passion and sense of accomplishment they have for their businesses.”

Financially-savvy Ink customers who have an iPhone or Android phone can download Jot by visiting the Ink website. Once you’ve got it downloaded you and your employees’ spending will be reined in and you’ll be back agonizing over more important things in no time.

Mobile Expense Tracking, The Easy Way

While we won’t all admit it, many of us are pretty lazy. There’s nothing wrong with that, of course, and given the right set of tools, lazy bastards like us can actually spend more time procrastinating and less time worrying about how to blow off whatever it is we’re trying to avoid.

When it comes to expenses, we can all use an easier way, lazy or not. Here are three apps that should help.

Evernote (free) MACPA CEO Tom Hood uses the Evernote iPhone app to snap a pic of his receipts, which he can then send directly to his office for safe-keeping and reimbursement. This means no stuffing random receipts into your pockets hoping they make it back to homebase. You can also use it as a sort of mobile Post-it note and scrapbook, capturing clips from newspaper articles, meeting notes and even business cards.

iXpenseIt This app ($4.99 in the Apple store) can help you track your own personal expenses as well as any you might incur for work. Voted one of the 50 Most Useful iPhone Apps by Laptop Magazine and a Best iPhone App by CNN Money.

ProOnGo Expense (free 30-day trial, pricing varies) goes a step further and even allows you to track your billable hours. It is compatible with iPhone, Android, BlackBerry and even Windows Mobile. Using the GPS feature, you can track your mileage too. The receipt reader feature allows you to put all your receipts into a neat Excel sheet or QuickBooks file.

Just for clarity’s sake, we’re sure you’re aware of this but here are the IRS rules on business expenses for your records. File it!

Getting Hacked Happens to the Best of Us?

Recently, I’ve been getting suspicious emails purporting to be from a high-up in my company. I have faith in this person and therefore would assume if (s)he wanted to push hot webcam videos on me, (s)he’d have the decency to text me with the hott linkks instead of using poor grammar in work emails. My suspicions were confirmed when I saw the same emails coming from – gasp! – my own email address. Now I knew it had to be a scam; surely I wouldn’t have to tell myself about some hot new webcam girrllss I’d discovered on an .ru domain, I’d have that shit deliciously bookmarked on my own machine.

Being incredibly careful with my logins, I knew I couldn’t have slipped up and gotten phished. Had I been hacked?

Whenever someone says “I got hacked!” I have to admit I always feel a bit of “blame the victim” is in order. After all, I find it a bit hard to swallow that some hardcore hackers in Russia are all that concerned with your personal Facebook page. To say “I’ve been hacked” implies that some outside source did some work to break through your rock solid security and gain entry, and makes no implication that the user themselves likely opened the door and let the “hacker” in, if unwittingly. More often than not, “I got hacked” means “I unknowingly gave up my password in a phishing scheme” or “I screwed up and clicked an unbelievable posting on Facebook that stole my login info because I never read the permissions I give third party apps.”

It’s been done a million times but for your sake, here are a few tips for staying safe out there in the big scary Internets.

Make sure your contact info is up to date. If an unscrupulous individual ever gains access to your Facebook account, you may be forced to lock it down, in which case you’ll need access to the email address you use to sign in to receive communications from Facebook to get your account back. Make sure you’re using an email you have access to, even if it’s one you don’t use often.

Diversify your passwords. It goes without saying that a good password is one that isn’t found in the dictionary but isn’t so difficult you have to keep it written on a sticky at your desk. Dennis Howlett recommends a LastPass account (via AccountingWEB UK) for harder to remember passwords if you must. Substitute numbers for letters (like “1” instead of “I” or “3” instead of “E”) and throw in some punctuation just to be safe.

If you aren’t sure, don’t click it. Spammers have gotten pretty smart since the days of the “ILOVEYOU” virus (which happens to turn 11 this week) and even the most technologically-adept can fall for their tricks. If you aren’t expecting an attachment, don’t open it. Common attachment scams include spoofed emails from UPS or USPS claiming to contain your tracking number or a package exception – while UPS may send you emails, they’d never send you a zip file (tracking numbers are always included in the body of any UPS communications sent on merchants’ behalf). Be wary!

And if you have been hacked, phished or otherwise compromised, delete any offending posts from your hijacked social media pages and issue an apology. You don’t have to beg for forgiveness, just let everyone know you got compromised and are sorry, it won’t happen again.

In my case, I just got spoofed, which isn’t really my fault at all. That’s where a nice email from the tech support department to the rest of the team comes in handy.

BlackBerry PlayBook vs iPad 2: Which Would You Rather Have Your Firm Pay For?

Tablets are the new Pocket PC and while we may question the viability of accountants preparing tax returns on iPads, it might be time to take a look at the new BlackBerry PlayBook versus the iPad2 for all things somewhat work-related. Let’s go!


Pros of the PlayBook:
• features: 7″ LCD display, 1024 x 600 screen resolution, 1 GHz dual-core processor, 1 Gb RAM
• runs Flash so you can watch YouTube videos at the client
• works with Android applications so you have 200,000 Android toys at your disposal
• doesn’t run native email so you have a great excuse for ignoring emails (for now you can use the device as a viewer to connect to your BlackBerry smartphone but cannot actually open emails from the PlayBook)

Pros of the iPad 2:
• features: 9.7″ LED display with 1024 × 768 screen resolution at 132ppi, Apple 1GHz A5 Processor, 512 Mb RAM
• looks awesome
• inspires jealously among your friends who work for broke mid-tier firms
• makes you more likely to get robbed using it on the train, helping you get over your awkward social phobia by forcing you to talk to your would-be thief
• doesn’t run Flash so you won’t be tempted to waste precious time watching YouTube videos at the client (unless you’re clever enough to have a decent converter)
•works with thousands more apps than Android/BlackBerry offerings, allowing you a much larger pool of distractions to access from company PP&E

Though this writer must disclaim this entire article by pointing out that she is a BlackBerry fan, it’s worth pointing out that without playing with one, we have to say the PlayBook is definitely disappointing on the surface. Technology ED is nothing to joke about, and this release was definitely a premature splurt on the face of BB nerds everywhere. No native email? That doesn’t even make sense.

The only selling point on the PlayBook for work may be that many of you already carry around company-issued BlackBerry devices, and we all know management is resistant to change. While iPads have been marketed as convenience devices, BlackBerry has somehow retained its reputation as a work device, allowing a bit of an in when it comes to getting management to spring for a handful of these little toys.

As for increased productivity? We haven’t seen any proof from either device that shows putting one in staff hands leads to any greater enthusiasm for work. Until someone comes up with a mind control app, we’ll keep holding out.

As always, let us know in the comments if you wholeheartedly agree with our obviously biased opinion.

Survey: CFOs Find Outdated Technology Slightly Maddening

CFOs admit that if technology is implemented correctly it can be pretty damn swell but over half of those surveyed said the biggest barrier to improving the finance department is “out of date and inflexible” IT systems. Also, nearly three-quarters of respondents said that these systems are also to blame for failing to reach objectives. Not good. How can we possibly solve this problem?

According to KPMG’s Steve Lis, “By adopting a unified approach to technology, CFOs and CIOs can transform their organizations to become more proactive, innovative and flexible.” That’s a pretty interesting thought but another possibility not addressed in KPMG’s press release was: spending money. I know, I know. Pretty crazy concept so it’s probably best to just keep things the way they are. [KPMG]

Before You Quit Your Job, You Should Do a Little Tech Housekeeping

Since apparently accounting is still booming and jobs are everywhere according to CNN, chances are you might be considering walking away from your awesome 70-hour-a-week grudge work for the sweet life of private industry or maybe the lucrative pastures of healthcare. Either way, if you’re going to quit your job, you will probably want to keep your former employer as a reference. The best way to do that is to erase your digital footprint as neatly as possible, just in case a team of nerds will be scoping out your computer and any embarrassing data contained therein post-employment.

Let’s be real, just about everyone uses company PP&E for non-company things; email, Facebook and, if you’re at the SEC, porn. We won’t judge your daytime browsing habits, let’s just get into how to make them go away before your last day.

First, it’s best to start scrubbing your history before you actually let on that you are about to leave. Granted, if you’ve gotten fed up to the point of quitting, it’s likely that no one in your office even realizes how miserable you are and won’t notice when your cube is suddenly devoid of personal items. Regardless, it’s still a good idea to take some of these steps before management is aware you’re running away.

So, you’ve got your final resignation notice saved on your desktop and are ready to send it to your boss. What next?


Erase your web history In Firefox, go to Tools, then Options, and then choose “clear your recent history.” While you’re in there, hit the Security tab and uncheck “remember passwords for sites” which, really, you shouldn’t have turned on at work anyway. Not using Firefox? Here are instructions for deleting your history and cookies in Chrome and Internet Explorer.

Unsubscribe from any newsletters or subscriptions you’ve been getting at work Maybe your firm doesn’t care if you get the Going Concern newsletter but just to be safe, spend some time combing through your work email and unsubscribing from any non-work-related newsletters. This way you can transfer everything to your personal account if you still want to receive it and save yourself some embarrassment when the person your emails are forwarded to after you leave gets your daily Bestiality Hotties email.

Delete any personal files you have on your desktop This could be that annoying photo of you and your boyfriend on vacation, your resignation letter (including the ultra-vulgar first and second drafts) and/or any third-party programs you’ve added to your computer (either with or without management’s permission). You never know how thoroughly IT is going to check out your laptop, so assume they’ll be combing through it and don’t leave anything of yours carelessly lying around. This includes your music collection, no reason to give them free mp3s.

Avoid deleting too much It would be awfully suspicious if you tried to clear out most of your emails and let’s face it, there’s a copy stored on the server anyway if management cares that much. This is about cleaning up after yourself, not looking like a paranoid weirdo. Be diligent but not psychotic.

Empty the recycle bin All of the above are useless if you forget to clean the recycle bin when you’re done.

The Doomsayers at Deloitte Have Come Up With a Crisis Management App

By crisis, we don’t mean 70 hour work-weeks and diversity training in the face of that A1 in your office who likes to wear short skirts and low-cut tops just to mess with you.

In the event of a catastrophic emergency like an earthquake, it’s good to know where your co-workers are if you’ve got to evacuate the building. Deloitte Australia has addressed the issue of safety and keeping tabs on the worker bees with Bamboo™, a Business Continuity Management (BCM) smart phone application (so far released for BlackBerry and iPhone only).

How does it work?


The BlackBerry application uses the device’s unique PIN (anyone addicted to BBM knows what that is) as well as voice, SMS and email to keep the team in communication in the event of an emergency. Emergency plans are readily available with Bamboo, eliminating the need to lug along a huge contingency binder stuffed with exit plans and instructions in a crisis situation.

Bamboo automatically logs all usage on each handset and when there is network access, sends these logs to the Bamboo server. The Bamboo Administrator is able to view all logs, from all users to understand its usage, retrace all steps taken and tailor training based on this usage. This data is also valuable in post-incident reviews and audits.

Don’t try to find it in the app store, Bamboo is an enterprise application and as such is deployed by the Company through enterprise application deployment, supported by the local Deloitte office.

Follow Deloitte’s Australian BCM team at @DeloitteBCM and stay tuned, they assure us they’re working to get the kids in America hooked up with their own BCM team.

Check it out in action below:

CFOs Think Cloud Computing (Whatever That Is) Might Be Important to Future IT Strategy

Asked about their current use of cloud-computing services, a majority of senior finance executives either have no plans to pursue it in the short term, or are doing so very tentatively. Nearly a third admit that they aren’t even sure what “cloud computing” really means. Yet, when asked how cloud computing might affect their company’s approach to IT longer term, almost half say they believe it will enable a significant restructuring of their entire IT strategy. [CFO]

Do You Want Your CPA Filing Tax Returns From an iPad?

Technology is a beautiful thing. It makes our lives easier, including work. It gives us supremacy over our late-to-adopt friends and colleagues who are still stuck with clunky old company laptops. And apparently it makes it easier to lug around several devices than just sit at our desk with one. Somehow this is more convenient, but we’ll get to that in a minute.

Check out this revolutionary, wielding his iPad as a weapon in the war against April 15th 18th:

With the 2011 tax season in full swing, accountants and CPAs are searching for ways to save time and service geographically separated clients. A popular solution, QuickBooks hosting, allows for CPAs to securely access QuickBooks and client data remotely from any computer, phone or tablet with an internet connection. Recently, NovelASPect’s client, Scott Sanders, CPA, took QuickBooks hosting to the next level. Scott added his tax software to his QuickBooks hosting account on a NovelASPect virtual server. Using the Citrix receiver, Scott can now access his tax software from anywhere with his iPad. He then paired his iPad with his iPhone via Bluetooth to use the iPhone as a mouse for the iPad.

“Accessing my tax software and QuickBooks via my iPad has been a tremendous time saver,” says Scott Sanders. “Clients can review and sign their tax documents at their location. I can then efile the return with the government and email a copy of the tax return immediately to the client. I also have access to client financial information in Quickbooks anytime / anywhere.”

Quick question: can’t a laptop do the same exact thing?

Remember last June when 114,000 iPad user accounts were exposed by rogue Internet security group Goatse Security? Not to mention the fact that the iPad is not only a target of hacktivists looking to prove a point but also thieves who would love to get their hands on that overpriced toy you insist on playing with on the subway.

Here’s the issue I see with on-the-run tax preparers MacGyvering their iPads to shoot the data off to the client and then to the government from just about anywhere: WiFi is not always secure. We assume Scott Sanders knows a thing or two about protecting sensitive data if he’s knowledgeable enough to figure out how to use his iPhone as a mouse for his iPad (and what’s wrong with using a laptop and a, oh I don’t know, mouse?) but I would not want my tax preparer sending me my 1040 to sign; he can barely wash his grungy white dress shirt separate from his red socks.

I’m all for convenience but there’s a point when the work required to make it safe for all involved parties becomes inconvenient.

Technology at SEC Good Enough for Viewing Porn, Not Reliable Internal Controls

Last year the Government Accountability Office issued a report that called attention to the SEC’s accounting system (or lack thereof). Reuters now reports that the SEC will admit in testimony tomorrow that the material weaknesses in their accounting system are largely due to technology that would make your grandparents laugh.

“These material weaknesses are unacceptable,” the SEC’s top division directors said in prepared testimony that was viewed by Reuters. They added the “root causes” of the problems stem from “years of underinvesting in financial system technologies.”

It should be noted that while the accounting systems were not quite up to snuff for the GAO, the equipment used by employees was sufficient for viewing a metric asston of porn, which we just learned moments ago, was even more widespread than initially thought.

SEC says its accounting problems stem from technology [Reuters]