Webinar: Interviewing for Results in Manufacturing

Date March 20, 2024
Authors HBK Manufacturing Solutions
Categories

Join HBK Manufacturing Solutions and special guest Ron Bower, Founder and President of the Brickpath Group and InterviewPath, in a discussion of the interview process. The Interviewing for Results process is a simple, powerful, and proven approach to acquiring the skills required to make the right hiring decisions and avoid costly mistakes, improve your quality of hire, and provide a positive candidate experience.

Watch on demand.

Speak to one of our professionals about your organizational needs

"*" indicates required fields

hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



Webinar: Manufacturing Extension Partnerships: How MEPs can help Manufacturers Innovate, Grow, and Prosper

Date February 21, 2024
Authors HBK Manufacturing Solutions
Categories

Join HBK Manufacturing Solutions and special guests Darlyn McDermott and Janelle Lee, Directors of Client Engagement for The Manufacturing Advocacy and Growth Network (MAGNET), to discuss how Manufacturing Extension Partnerships (MEP) can help small and medium-sized manufacturers. Darlyn will discuss the Future of Manufacturing Blueprint developed by MAGNET (Northeast Ohio’s MEP) and how MAGNET and other MEPs can support your business initiatives.

Watch on demand.

Speak to one of our professionals about your organizational needs

"*" indicates required fields

hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



Webinar: 2023 Tax Planning Update for Manufacturers

Date November 15, 2023
Authors HBK Manufacturing Solutions
Categories

As we approach the end of the calendar year, manufacturers should begin their planning processes. This includes planning for tax obligations that may come due in 2023. Join HBK Manufacturing Solutions to discuss tax planning strategies that are important for all manufacturers to consider.

Watch on demand.

Speak to one of our professionals about your organizational needs

"*" indicates required fields

hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



Watch: Business Email Compromise and Protecting Against Identity Theft

Date October 25, 2023

Highlights of the October edition of the HBK Risk Advisory Services webinar series hosted by William J. Heaven, CPA/CITP. CISA, CSCP, Senior Director, HBK Risk Advisory Services

Watch On-Demand.

Two closely related topics: business email compromise and protecting against identity theft

Business Email Compromise (BEC)

Defined as a type of email cybersecurity crime scam in which an attacker targets a business or individual with intent to defraud.

  • A large and growing problem
  • Also called an email account compromise, very accelerated because of cloud-based infrastructure
  • BEC Examples:

  • A vendor sends an invoice with altered payment details; vendors don’t usually send emails to change where to send a payment.
  • A CEO asks an assistant to purchase dozens of gift cards to send out as rewards and asks for serial numbers to expedite delivery.
  • A homebuyer receives a message from a title company with instructions on how to wire the down payment.
  • Whatever money you send, basically double your cost, because you’re paying the bad guy but still owe the real vendor.

    From the FBI:

  • In 2022: 21,832 BEC complaints were filed with reported losses of more than $2.7 billion.
  • 64% of companies worldwide have been affected by BEC hacking.
  • Total losses exceed losses from ransomware attacks.
  • Most common BEC attack vectors:

  • Spoofing an email account or website
  • Phishing/spear phishing emails
  • Malware
  • How to protect against BEC:

  • Use multi-factor authentication (MFA) wherever possible; never turn it off
  • Be careful:

  • with information you share online, including social media
  • about unsolicited, unexpected emails; be skeptical: “if it sounds too good to be true, it likely is”
  • with unrecognized URLs or emails
  • before opening downloads: could have a malicious payload
  • if you are asked to act quickly-Phone calls: don’t answer spam calls; that could validate your number.
  • If you become a victim of BEC:

  • First, contact the bank/financial institution: where you wired the money from and where you wired the money to. If you wired overseas, you might have 24 to 48 hours to have the money clawed back.
  • Report the attack to your local FBI field office, or better, the IC3 (internet crime complaint center) because FBI does not investigate “small” losses.
  • Learn from the attack so you don’t fall for the same thing in the future.
  • Identity theft

    Defined as obtaining personal or financial information of another person for the sole purpose of assuming that person’s name or identity to enter into transactions or make purchases.

    Forms of identity theft:

  • Healthcare, such as for procedures you haven’t had done
  • Tax fraud, such as filing an income tax return in your name
  • Financial, including for credit cards
  • Statistics:

  • 5.7 million cases of fraud and ID theft in 2022
  • ID theft every 22 seconds
  • Median loss to victims is $500 (growing as we become more digitally dependent)
  • How thieves obtain your identity:

  • Data breaches
  • Exposed consumer or employee records
  • Theft of personal information, such as through spoofing or phishing
  • The deep web is about 90% of internet, including company information; the dark web is about 6% of internet, home to illegal activity like buying email addresses and other personal information.
  • How to protect identity:

  • Freeze your credit.
  • Safeguard your Social Security number.
  • Shred everything.
  • Protect RFID cards (people with scanners 10 to 15 feet from you can copy your card): Purchase a “wallet” for a shield around your cards, Use a passport carrying case and Buy a jamming card to put in your wallet to block signals: inexpensive route
  • Use strong passwords and a password manager.
  • Use MFA (do business with organizations that use MFA).
  • Train yourself and staff to recognize and report phishing.
  • Keep software updated.
  • Be careful what you post on social media; don’t disclose personal data.
  • Set-up online account access and monitor it weekly.
  • Establish email/text alerts for account authorizations, account declines, statement balances, and account payments.
  • Consider an ID theft monitoring service: multiple companies. They will do:

  • Credit monitoring
  • Dark web monitoring
  • Opt you out of data brokers
  • Provide some form of insurance coverage
  • Provide some threat resolution information
  • Don’t carry your social security card.
  • Know what’s in your wallet and make copies of your credit cards, front and back.
  • If you’re ID is stolen:

  • Place a fraud alert with one of the bureaus; they will contact the others; companies must contact you before they issue credit in your name.
  • Review your credit report.
  • Contact the Federal Trade Commission (FTC).
  • Build a recovery plan: FTC site will help you build a plan.
  • FTC site has a lot of valuable information: identitytheft.gov.
  • Check your Social Security account (create an account).
  • Contact your local police; for example, an attacker might use your driver’s license data to create a new license and commit a crime.
  • As of 2018, there is no fee to freeze your credit with credit bureaus.
  • Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Watch: Business Email Compromise and Protecting Against Identity Theft

    Date October 25, 2023
    Authors

    Highlights of the October edition of the HBK Risk Advisory Services webinar series hosted by William J. Heaven, CPA/CITP. CISA, CSCP, Senior Director, HBK Risk Advisory Services

    Watch On-Demand.

    Two closely related topics: business email compromise and protecting against identity theft

    Business Email Compromise (BEC)

    Defined as a type of email cybersecurity crime scam in which an attacker targets a business or individual with intent to defraud.

  • A large and growing problem
  • Also called an email account compromise, very accelerated because of cloud-based infrastructure
  • BEC Examples:

  • A vendor sends an invoice with altered payment details; vendors don’t usually send emails to change where to send a payment.
  • A CEO asks an assistant to purchase dozens of gift cards to send out as rewards and asks for serial numbers to expedite delivery.
  • A homebuyer receives a message from a title company with instructions on how to wire the down payment.
  • Whatever money you send, basically double your cost, because you’re paying the bad guy but still owe the real vendor.

    From the FBI:

  • In 2022: 21,832 BEC complaints were filed with reported losses of more than $2.7 billion.
  • 64% of companies worldwide have been affected by BEC hacking.
  • Total losses exceed losses from ransomware attacks.
  • Most common BEC attack vectors:

  • Spoofing an email account or website
  • Phishing/spear phishing emails
  • Malware
  • How to protect against BEC:

  • Use multi-factor authentication (MFA) wherever possible; never turn it off
  • Be careful:

  • with information you share online, including social media
  • about unsolicited, unexpected emails; be skeptical: “if it sounds too good to be true, it likely is”
  • with unrecognized URLs or emails
  • before opening downloads: could have a malicious payload
  • if you are asked to act quickly-Phone calls: don’t answer spam calls; that could validate your number.
  • If you become a victim of BEC:

  • First, contact the bank/financial institution: where you wired the money from and where you wired the money to. If you wired overseas, you might have 24 to 48 hours to have the money clawed back.
  • Report the attack to your local FBI field office, or better, the IC3 (internet crime complaint center) because FBI does not investigate “small” losses.
  • Learn from the attack so you don’t fall for the same thing in the future.
  • Identity theft

    Defined as obtaining personal or financial information of another person for the sole purpose of assuming that person’s name or identity to enter into transactions or make purchases.

    Forms of identity theft:

  • Healthcare, such as for procedures you haven’t had done
  • Tax fraud, such as filing an income tax return in your name
  • Financial, including for credit cards
  • Statistics:

  • 5.7 million cases of fraud and ID theft in 2022
  • ID theft every 22 seconds
  • Median loss to victims is $500 (growing as we become more digitally dependent)
  • How thieves obtain your identity:

  • Data breaches
  • Exposed consumer or employee records
  • Theft of personal information, such as through spoofing or phishing
  • The deep web is about 90% of internet, including company information; the dark web is about 6% of internet, home to illegal activity like buying email addresses and other personal information.
  • How to protect identity:

  • Freeze your credit.
  • Safeguard your Social Security number.
  • Shred everything.
  • Protect RFID cards (people with scanners 10 to 15 feet from you can copy your card): Purchase a “wallet” for a shield around your cards, Use a passport carrying case and Buy a jamming card to put in your wallet to block signals: inexpensive route
  • Use strong passwords and a password manager.
  • Use MFA (do business with organizations that use MFA).
  • Train yourself and staff to recognize and report phishing.
  • Keep software updated.
  • Be careful what you post on social media; don’t disclose personal data.
  • Set-up online account access and monitor it weekly.
  • Establish email/text alerts for account authorizations, account declines, statement balances, and account payments.
  • Consider an ID theft monitoring service: multiple companies. They will do:

  • Credit monitoring
  • Dark web monitoring
  • Opt you out of data brokers
  • Provide some form of insurance coverage
  • Provide some threat resolution information
  • Don’t carry your social security card.
  • Know what’s in your wallet and make copies of your credit cards, front and back.
  • If you’re ID is stolen:

  • Place a fraud alert with one of the bureaus; they will contact the others; companies must contact you before they issue credit in your name.
  • Review your credit report.
  • Contact the Federal Trade Commission (FTC).
  • Build a recovery plan: FTC site will help you build a plan.
  • FTC site has a lot of valuable information: identitytheft.gov.
  • Check your Social Security account (create an account).
  • Contact your local police; for example, an attacker might use your driver’s license data to create a new license and commit a crime.
  • As of 2018, there is no fee to freeze your credit with credit bureaus.
  • Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Webinar: State and Local Tax Considerations for Manufacturers

    Date October 25, 2023
    Authors Timothy Adams HBK Manufacturing Solutions
    Categories

    Join HBK Manufacturing Solutions and special guest, Tim Adams, Principal, National Director, State & Local Tax, to discuss how state and local taxes affect manufacturers. Tim will lead a discussion regarding Sales/Use Tax, Income Tax, Ohio’s Commercial Activity Tax, and other state and local tax developments, including legislative changes for 2024. Our discussion will assist you in ensuring that your business is in compliance and actions to take if you are uncertain of your status.

    Watch on demand.

    Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Watch: Protecting Your Network in the Modern Risk Landscape

    Date September 27, 2023

    Highlights from the September 27th episode of the 2023 HBK Risk Advisory Services webinar series hosted by HBK Manufacturing Solutions and Bill Heaven, CPA/CITP, CISA, CSCP, Senior Director, HBK Risk Advisory Services. This episode’s featured presenters: Vertilocity Executives Justin Krentz, Principal; Chris Bowman, Director of Security Services; and Josh Prager, virtual Chief Information Officer

    Watch On-Demand.

    How to Succeed

    The three elements required for an organization to be successful, and the areas were you need protection: people, process, and technology. All three need to work in harmony and be proficient.

    Key to cybersecurity protection is educating staff and having them buy into the security plan and process. Everyone in the organization must understand the need for security, that there are real threats. All must be educated on these issues on a continuous basis or adoption will fizzle. People are most important to maintaining security and as well as provide the greatest threat.

    The Risks

    Many of the threats on modern landscape we face are not new:

  • Spam and phishing have existed since the advent of email.
  • Social engineering existed before even computers.
  • The first incident of rasomware was in 1989.
  • However, there has been a remarkable advance in toolsets that enable these attacks on businesses and governments, in fact, on everyone who uses a computer.
  • Cyber attacks have become a multi-billion dollar industry.
  • Biggest threats are phishing and social engineering: 90 percent of small business attacks.

  • They are trying to get your identity, any information they can use to impersonate you.
  • Emails and text messages used to be riddled with misspelling and bad grammar, but they are much more sophisticated now.
  • Starting to see impact from Artificial Intelligence (AI). AI is sending and receiving messages that look more real, plus convincing audio and video, as well calls that sound like the person they’re impersonating.
  • Insider threats are a growing concern

  • Defined as: A user has legitimate access to a network device and that access is exploited.
  • Is a growing problem with the increase in mobile workforces; can’t create a perimeter around your internal network.
  • Hackers are beginning to use X and LinkedIn to send phishing messages.

  • The messages might look like they’re coming through those services but they’re not.
  • Go to LinkedIn webpage and look for the message there.
  • Also targeting legitimate LinkedIn accounts to gather personal information, then doing things like making them a job offer that isn’t legitimate.
  • Addressing Risks

    Multiple activities to put in place:

  • User training: only way to reliably control whether someone gets caught up is making sure users are making smart decisions: Have to teach people to be skeptical. Looking for speech patterns that would tip you off that it isn’t the person they’re impersonating. Do I know the person who’s sending this message or is it someone else? For example, why would I need to sign in with my Microsoft credentials to get a donut shop coupon, or why would I need to provide my phone number to a fraud alert from Amazon?
  • Enhanced email protection: analyzes links in emails, checks where an email is going to ensure the server is safe
  • Attachment protection: opens the attachment to ensure it contains nothing malicious
  • Anti-spoofing: analyzing emails to ensure they aren’t from a different email account
  • Identity and access management (another change with a mobile workforce): A shift in security focus to prove who you are and that you should have access to this resource before you get it.
  • Multifactor authentication (MFA): User should have a password and something additional, like a biometric fingerprint, to verify the user is who they say they are.
  • Multi-factor authentication types and benefits:

  • Defined as: something you have, something you know, or something you are in addition to password. Passwords are for sale everywhere on the dark web.
  • Message based MFA – the text message you receive to put back in to prove you’re you.
  • MFA tokens: a more robust and newer type of MFA, a FIDO2 key essentially says that if you have this key and it’s in your phone or computer, you can use it to prove you are who you say you are. It is a single-session MFA, so when you log in it works throughout your session. You can’t steal the key and it’s only good for that computer session.
  • Other ways to control access:

  • Conditional access controls: like geo-location access.
  • Application access: like people using the VPN are using approved devices.
  • Mark devices as compliant by requiring them to meet certain criteria.
  • By protocol, only allowing certain types of ports or devices to communicate with certain types of services.
  • MFA Do’s:

  • Only approve logins when you’re actually trying to login. If you’re getting multiple push notifications reach out to IT because someone probably has your password and is trying to hack you.
  • Keep authentication apps updated. Update phone security just like your computer to maintain level of security.
  • Back up somewhere safe.
  • Let IT know if you’re getting strange pushes at odd hours.
  • MFA Don’ts:

  • Never give someone your one-time code.
  • Don’t approve sign-ins at odd hours.
  • Don’t get complacent. If you’re not actively doing something, don’t approve.
  • Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Webinar: Attracting and Retaining Manufacturing Employees with Employee Benefit Plans

    Date September 20, 2023
    Authors HBK Manufacturing Solutions
    Categories

    Join HBK Manufacturing Solutions and Special Guests from Arthur J. Gallagher & Company to discuss the benefit programs that manufacturers should consider to attract and retain employees. During this webinar, trends among manufacturers will be discussed so that you may help benchmark your business against your competition.

    Watch on demand.

    Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Watch: Why Organizations Must Have a Data Destruction Policy

    Date August 23, 2023

    Highlights of the August 23, 2023 edition of the HBK Risk Advisory Services monthly webinar series hosted by William J. Heaven, CPA/CITP, CISA, CSCP, Senior Director, HBK Risk Advisory Services, and this episode featuring Jennifer Lamar, CEO, and Kevin Lamar, VP Business Development, Northern Shores Services.

    Watch On-Demand.

    Northern Shores Services offers the option of having data destroyed on-site or off-site. They erase data, physically destroy data and devices, and provide reporting.

    The Office of the Comptroller of the Currency (OCC) assessed Morgan Stanley a $60 million civil penalty. The bank hired a moving company instead of a data destruction firm, and it was determined that the bank failed to evaluate or address risks associate with the decommissioning of its hardware. Because they didn’t specify that drives should be erased, the drives were sold on the secondary market, and purchasers found Morgan Stanley data, including client’s personal data.

    Problems in past years included:

  • Deleting files doesn’t get rid of the data.
  • Some copiers have data bearing drives.
  • But also, devices like your refrigerator and vehicle now house data.
  • Factors that drive the need for data destruction and IT asset recycling:

  • Changing out to new technology in the marketplace
  • Upgrading existing equipment
  • Changes in staffing levels and office locations
  • Compliance with corporate IT policy revisions
  • Revisions to business models based on industry regulations
  • Assessing data and asset recycling. Consider as issues: security, space, time, conditions and convenience

    Consideration: Cybersecurity measures are used to protect data during its active lifecycle, but data no longer needed often becomes more valuable to data thieves.

    Terms and definitions

  • Media vs. data: media, the physical platform; data, the actual information.
  • Data destruction: the process of removing data by rendering it inaccessible
  • Media destruction: when media is destroyed to destroy the data it contains
  • Data wiping: the process of removing data from electronic storage media by removing meaningless data and leaving media intact and operational
  • HDD: hard drive with spinning storage platters
  • SSD: solid-state drive with no moving parts
  • Flash media: simple storage media using chips instead of spinning platters
  • Developing Your Policy

    NIST Special Publication 800-88 Revision 1 (U.S. Department of Commerce)

  • Provides general information on acceptable media sanitization methods
  • Objective is to assist with decision-making when media requires disposal, reuse, or is leaving the control of the organization
  • Information owner is responsible for identifying data categories and confidentiality levels; determining the level of media sanitization required for their organization
  • To decide appropriate method for your organization:

  • Categorize the security level of the information to be disposed of
  • Assess the media on which it’s stored
  • Evaluate the risk to confidentiality (extremely important)
  • Determine the future of the media: donate, reuse, or destroy
  • Considerations for determining what to do with media assets

  • Determine the type and storage capacity of the media.
  • Security and confidentiality: What kind of information is on the drive?
  • The physical location of the media: Is it in a secure, controlled area?
  • Personnel performing the sanitization: Do you have the personnel or do you need to outsource?
  • Volume of media to be sanitized
  • Availability of equipment for sanitization
  • Training level of the personnel: Are they familiar with the process and have the time to tackle the task (large capacity hard drives can take hours)?
  • Total cost of the sanitization process
  • Is any particular industry more at risk? Not the industry specifically, but leadership’s position on destroying or retaining data.

  • Consumers need to be particularly careful disposing of smart TVs.
  • Additional considerations

  • Responsibility for control over and access to the media
  • Data protection levels: varying data protection policies for different company departments
  • Senior management is ultimately responsible for creating and maintaining an effective information security program. But data end users must know the confidentiality of the information associated with their roles.
  • Data destruction techniques:

  • Clear: applies to logical technique to sanitize data in all user-addressable storage locations for protection against simple non-invasive data recovery techniques
  • Purge: applies to physical or logical techniques that render storage data recovery unfeasible outside of state-of-the-art laboratory techniques
  • Destroy: rendering target data recovery unfeasible using state-of-the-art laboratory techniques
  • Factors in policy decision–making process:

  • Start by identifying the type of data stored on a device.
  • Choose efficient techniques that ultimately preserve the confidentiality of the data.
  • Purge or clear may be more approach than destroy when facing environmental concerns.
  • Risk decision should include the consequence if information is retrieved, the cost of information retrieval, and the cost of sanitization.
  • NIST 800-88 requires documentation and maintaining “certificates of media disposition,” including sanitization method and verification method. The amount of information required is based on the confidentiality level of the data sanitized.

    Three NIST appendices to help you get your policy in place:

  • Appendix A specifies the minimum recommended sanitization techniques to clear, purge or destroy various media.
  • Appendix B defines terms used in the guide.
  • Appendix G provides a sample certificate of sanitization for documenting an organization’s sanitization activities.
  • Practical applications:

  • Sound data destruction policy should address the creation and maintenance of an inventory list to track data storage devices.
  • Inventory should include items such as device type, manufacturing, model, serial no., lifecycle state, location, and ownership details.
  • Devices can be desktops laptops, tables, servers, routes and switches, smart phones, printers/canners;/copiers, hard drives, tapes, black media, etc.
  • Data wiping/overwriting:

  • Advantages: great audit trail potential, can be very secure, allows for reuse
  • Disadvantages: time consuming, can be complex and require more employee training than physical destruction methods, and SSDs may be subject to wear-leveling
  • Physical Destruction: Degaussing (subjecting media to magnetic field with intent of eradicating data)

  • Advantages: clean, simple to execute, most tools are portable
  • Disadvantages: no visual feedback, reporting limited, QC requires forensic analysis, some equipment requires periodic calibration to manufacturer specifications
  • Physical Destruction: Shredding

  • Advantages: simple to execute, strong visual confirmation, widely accepted
  • Disadvantages: a dirty process (have to dispose of the waste), less portable
  • Physical Destruction: Crushing (typically with a bending wedge or conical punch)

  • Advantages: portable, simple to execute, visual confirmation, surprisingly secure, minimal employee safety risk
  • Disadvantages: limited throughput, marginal reliability, material recovery sometimes difficult
  • Note: Get input on needs from different departments to combine into an overall company data destruction policy.

    Takeaway: Popularity of SSDs has thrown wrinkle into data destruction policy as they require very specific physical destruction

    Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.



    Webinar: Improving Business Operations & Efficiencies in a Manufacturing Environment

    Date August 16, 2023
    Authors HBK Manufacturing Solutions
    Categories

    Join HBK Manufacturing Solutions and Special Guest, Tyler Gargano, CPE, CSF-CCSFP, Director of Advisory Services to discuss how management of manufacturing companies can improve business operations and create efficiencies in a manufacturing environment.

    Watch on demand.

    Speak to one of our professionals about your organizational needs

    "*" indicates required fields

    hbkcpa.com needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.