Most CPA firms believe they are compliant. However, that confidence often disappears when someone asks for proof.
Under the Gramm-Leach-Bliley Act (GLBA), CPA firms qualify as financial institutions. In addition, the FTC Safeguards Rule requires documented security controls, ongoing monitoring, and formal oversight.
In other words, compliance is not about what tools you installed. Instead, it is about what you can clearly demonstrate.
If a regulator, insurance carrier, or major client requests documentation, your firm must produce structured evidence immediately.
Preparation is straightforward. Nevertheless, it requires discipline.
Step 1: Conduct a Formal Risk Assessment
First, complete a documented risk assessment tailored to your firm’s operations.
Specifically, this assessment should evaluate:
- Internal access controls
- External threats
- Data storage practices
- Vendor exposure
- Safeguard effectiveness
If your IT provider cannot produce a written assessment from the past 12 months, you have a gap.
Additionally, if you are unsure how compliance impacts investment, review our breakdown of FTC Safeguards compliance cost for CPA firms.
Step 2: Maintain a Current Written Information Security Plan (WISP)
Next, maintain a current Written Information Security Plan.
A WISP should clearly define:
- Your safeguards
- Assigned security responsibility
- Monitoring procedures
- Incident response planning
- Policy review schedule
Importantly, auditors request the document itself — not a summary.
If your WISP has not been updated recently, that creates exposure.
Step 3: Align Technical Controls with Documentation
After documentation is in place, confirm that your technical controls match your written policies.
For example, if your WISP states that MFA is enforced, then it must include:
- Microsoft 365
- Tax software
- Administrative accounts
- Business computer logins
Likewise, if your policy states that monitoring occurs, you must demonstrate centralized logging and alert review.
To compare your safeguards against modern standards, review our guide on the cybersecurity stack CPA firms need in 2026.
Documentation without enforcement fails quickly.
Step 4: Demonstrate Ongoing Monitoring
Furthermore, FTC Safeguards requires continuous oversight.
To prepare properly, you should be able to show:
- Log aggregation
- Alert documentation
- Quarterly review records
- Security awareness training completion
If no one actively reviews alerts, then monitoring does not exist — even if software is installed.
Step 5: Designate a Qualified Security Lead
Finally, assign a designated individual to oversee your information security program.
This person should:
- Understand your cybersecurity stack
- Oversee risk assessments
- Coordinate documentation updates
- Report findings to firm leadership
Clear responsibility creates accountability. Without it, oversight weakens.
Real Example: “We Thought We Were Compliant”
A 5-person CPA firm in Broward County believed they were compliant. However, when documentation was requested, they could not produce:
- A formal risk assessment
- A current WISP
- Monitoring documentation
- Structured compliance reports
At the same time, they struggled with slow response times and limited proactive planning from their previous provider.
We implemented a compliance-aligned program at $1,650 per month, which included:
- Formal risk assessments
- GLBA-aligned WISP development
- MFA enforcement across all systems
- Centralized monitoring
- Quarterly compliance review meetings
As a result, they now maintain documented compliance alignment and enter every tax season with structured oversight. We have supported them for seven years.
The difference was not new technology. Instead, it was consistent execution.
The Most Common Audit Failure Points
In our experience, CPA firms most often struggle with:
- Outdated WISP documentation
- Inconsistent MFA enforcement
- Lack of centralized monitoring
- Missing risk assessments
- Undefined security leadership
These are not complex technical failures. Rather, they reflect gaps in process and accountability.
The Bottom Line
Ultimately, FTC audit preparation is about building a defensible security posture.
For most CPA firms in South Florida, budgeting $200–$400 per user per month supports operational IT as well as structured compliance oversight.
If you are unsure whether your firm could withstand documentation scrutiny, review our guide on managed IT cost for CPA firms in South Florida.
Because once documentation is requested, assumptions no longer protect you.

