Nonprofit Resources
Liquidity & Availability Disclosure Considerations for Churches in ASU 2016-14
We’ve received a number of questions from church clients about the additional disclosures related to liquidity and availability. Here a look at the requirements and what your church should consider as you plan for this significant implementation.
4 Steps to a Solid User Administration Process
Although it may seem like a small detail in the grand scheme of cybersecurity, a good user administration process plays an important role. Taking some basic steps will help your organization create a solid process and reduce your organization’s risk of a breach.
Christian Colleges Rank High for Student Engagement
Among the colleges and universities in the Wall Street Journal/Times Higher Education College Rankings with the highest student engagement, nine of the top 12 are faith-based.
Gifts-in-Kind: Reporting Contributions of Nonfinancial Assets
Since the standards for recognizing contributions at their fair value were issued in 1993, nonprofit organizations have been challenged to measure the value of the myriad contributions they receive. This controversial area is once again being addressed by watchdog agencies and state attorneys general and, thus, is one that nonprofits should navigate with care.
Business Continuity and Disaster Recovery Planning
The business continuity and disaster recovery environment is changing every day. It is critical for nonprofits to establish baseline plans, back-up configurations, and training and testing processes to ensure ongoing operations.
Church Musicians: Employees or Independent Contractors?
Are the musicians your church pays to perform for worship services and other church events employees, or independent contractors? An incorrect classification can result in significant negative financial consequences for both the church and the musician.
Dual-Use Facilities – Methodologies for Allocations of Expenses
Allocating expenses for dual-use facilities is complicated. Here's an in-depth look at the various methodologies and considerations.
Cybersecurity Training: Who, What, When, Where, and Why
There are many controls and safeguards organizations can — and should — put in place to reduce their risk of a cyber attack. One very vital tool in mitigating that risk is ongoing cybersecurity training. Use these tips and best practices to help your organization implement an effective training program.
Remote Access Trojans (RATs): Why We Cover Our Webcams
Remote access Trojans (RATs) are a top cybersecurity threat. Learn what they are and how to help protect your organization.
Mastering Employee Benefit Plan Complexities
Employee benefit plan (EBP) audits* are higher risk and require more specialized knowledge than the average financial statement audit. Here's one way our team is staying on top of the complexities to benefit our clients.