Securing Financial Information in the Digital Realm: Case Studies in Cybersecurity for Accounting Data Protection


  • Md Abdullahel Kafi Graduate Research Assistant, Department of Decision and Information Sciences, Oakland University, USA
  • Nazma Akter Assistant Professor, School of Business, Ahsanullah University of Science and Technology, Dhaka, Bangladesh



Accounting, Cyber-Security, Threats, Vulnerability


Securing financial information, especially accounting, is essential in the digital world. This article explores organizations' challenges in protecting accounting data from evolving cyber threats. By sharing real-life case studies and industry research, we offer suggestions to enhance the security of accounting information. These recommendations include adopting cybersecurity frameworks implementing technical defenses like endpoint protection and network segmentation, following secure coding practices prioritizing user awareness and training, creating incident response and business continuity plans, regularly conducting vulnerability assessments and monitoring, maintaining strong vendor relationships, and ensuring compliance with relevant regulations and standards. By implementing these suggestions, accounting professionals and organizations can strengthen cybersecurity measures. Effectively protect valuable financial data from the ever-growing threat landscape. Taking an approach that combines technical measures, user awareness, incident preparedness, and regulatory compliance is crucial when navigating the digital landscape with confidence and resilience.


Download data is not yet available.


APWG. (2022). Phishing Activity Trends Report.

BBC News. (2016). Bangladesh bank hackers fail in bid to net $1bn.

Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2019). Voice Recognition Systems in the Cloud Networks: Has It Reached Its Full Potential?. Asian Journal of Applied Science and Engineering, 8(1), 51–60. DOI:

Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2021). Algorithm Policy for the Authentication of Indirect Fingerprints Used in Cloud Computing. American Journal of Trade and Policy, 8(3), 231–238. DOI:

Bukth, T., & Huda, S. S. (2017). The soft threat: The story of the Bangladesh bank reserve heist. SAGE Publications. DOI:

Capital One. (2019). Capital One Announces Data Security Incident.

Chang, V., Walters, R. J., & Wills, G. (2018). Cybercrime and accounting information systems: A novel research direction. Journal of Computer Information Systems, 58(4), 334–343. DOI:

CISCO. (n.d.). What Is a Network Switch?

Citigroup. (2019.). Cybersecurity: protective measures treasuries should be taking.

Cloudflare. (n.d.). What Is a Web Application Firewall (WAF)?

Deloitte. (n.d.). Cybersecurity and Privacy Awareness.

Equifax. (2021). Support Regulatory & Security Compliance.

Ernst & Young (EY). (n.d.). Cybersecurity.

FORTRA. (2017). NotPetya: Timeline of a Ransomworm.

Glazer, E. (2015). J.P. Morgan to Accelerate Timeline for Cybersecurity Spending Boost. The Wall Street Journal.

Gutlapalli, S. S. (2016). Commercial Applications of Blockchain and Distributed Ledger Technology. Engineering International, 4(2), 89–94. DOI:

Gutlapalli, S. S. (2017). Analysis of Multimodal Data Using Deep Learning and Machine Learning. Asian Journal of Humanity, Art and Literature, 4(2), 171–176. DOI:

Gutlapalli, S. S., Mandapuram, M., Reddy, M., & Bodepudi, A. (2019). Evaluation of Hospital Information Systems (HIS) in terms of their Suitability for Tasks. Malaysian Journal of Medical and Biological Research, 6(2), 143–150. DOI:

Hyde, J. (2016). AICPA Unveils Cybersecurity Risk Management Reporting Framework. AICPA & CIMA.

IBM Security. (2022). Cost of a Data Breach Report. DOI:

Jartelius, M. (2020). The 2020 Data Breach Investigations Report–a CSO's perspective. Network Security, 2020(7), 9-12. DOI:

JPMorgan Chase. Protecting Our Systems and Customer Information.

Kafi, M. A., & Adnan, T. (2020). Machine Learning in Accounting Research: A Computational Power to Wipe Out the Challenges of Big Data. Asian Accounting and Auditing Advancement, 11(1), 55–70.

Kafi, M. A., & Adnan, T. (2022). Empowering Organizations through IT and IoT in the Pursuit of Business Process Reengineering: The Scenario from the USA and Bangladesh. Asian Business Review, 12(3), 67–80. DOI:

Le, D. C., & Zincir-Heywood, A. N. (2019). Machine learning-based insider threat modeling and detection. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). IEEE. pp. 1-6.

Lika, R. A., Murugiah, D., Brohi, S. N., & Ramasamy, D. (2018). NotPetya: Cyber-attack prevention through awareness via gamification. In 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE) (pp. 1-6). IEEE. DOI:

Mandapuram, M. (2016). Applications of Blockchain and Distributed Ledger Technology (DLT) in Commercial Settings. Asian Accounting and Auditing Advancement, 7(1), 50–57. Retrieved from

Mandapuram, M. (2017). Security Risk Analysis of the Internet of Things: An Early Cautionary Scan. ABC Research Alert, 5(3), 49–55. DOI:

Mandapuram, M., & Hosen, M. F. (2018). The Object-Oriented Database Management System versus the Relational Database Management System: A Comparison. Global Disclosure of Economics and Business, 7(2), 89–96. DOI:

Microsoft. (n.d.). Security at Microsoft.

National Institute of Standards and Technology. (2018). Guide to Small and Medium Business Cybersecurity.

Noever, D. (2019). Classifier suites for insider threat detection. arXiv preprint arXiv:1901.10948.

OWASP. (2021). OWASP Top Ten Project. Retrieved from

Ponemon Institute. (2020). Cost of a Data Breach Report.

Pritam, N. (2020). Money makes the cyber-crime world go round - Verizon Business 2020 Data Breach Investigations Report. Verizon. DOI:

Reddy, M., Bodepudi, A., Mandapuram, M., & Gutlapalli, S. S. (2020). Face Detection and Recognition Techniques through the Cloud Network: An Exploratory Study. ABC Journal of Advanced Research, 9(2), 103–114. DOI:

RED-GOAT. (2019). Insider Threat Report. Retrieved from DOI:

SANS Institute. (n.d.). Security-Awareness.

Simkins, B. J., Parikh, A., & Isbell, M. (2020). Digital forensics in the accounting classroom: A case for expanding coverage and skills in cybersecurity education. Journal of Forensic Accounting Research, 5(1), 53-71.

Smith, J. (2017). The Equifax Data Breach: Lessons Learned for Financial Institutions. Journal of Financial Security, 42(3), 123–145.

Symantec. (n.d.). Antivirus - Symantec Endpoint Protection (SEP).

US-CERT. (2018). Alert (TA17-132A): Indicators Associated with WannaCry Ransomware.

US-CERT. (2020). Advanced Persistent Threat Activity Exploiting Managed Service Providers.




How to Cite

Kafi, M. A., & Akter, N. (2023). Securing Financial Information in the Digital Realm: Case Studies in Cybersecurity for Accounting Data Protection. American Journal of Trade and Policy, 10(1), 37–48.



Policy and Practice Reviews