{"id":3327,"date":"2025-07-16T08:52:46","date_gmt":"2025-07-16T12:52:46","guid":{"rendered":"https:\/\/verito.com\/blog\/?p=3327"},"modified":"2025-12-31T13:29:04","modified_gmt":"2025-12-31T18:29:04","slug":"ftc-safeguards-rule-wisp-ready-for-the-obbba","status":"publish","type":"post","link":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/","title":{"rendered":"FTC Safeguards Rule &#038; WISP: Is Your Firm Ready for the OBBBA?"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/verito.com\/ftc-safeguards-rule\" target=\"_blank\" rel=\"dofollow\" ><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"332\" src=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/c713aeaa-8641-4e11-9921-5e51aecce59e_FTClogo-1637898470-1-1024x332.jpg\" alt=\"FTC Safeguards Rule\" class=\"wp-image-3329\" srcset=\"https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/c713aeaa-8641-4e11-9921-5e51aecce59e_FTClogo-1637898470-1-1024x332.jpg 1024w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/c713aeaa-8641-4e11-9921-5e51aecce59e_FTClogo-1637898470-1-300x97.jpg 300w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/c713aeaa-8641-4e11-9921-5e51aecce59e_FTClogo-1637898470-1-768x249.jpg 768w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/c713aeaa-8641-4e11-9921-5e51aecce59e_FTClogo-1637898470-1-1536x497.jpg 1536w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/c713aeaa-8641-4e11-9921-5e51aecce59e_FTClogo-1637898470-1-2048x663.jpg 2048w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/c713aeaa-8641-4e11-9921-5e51aecce59e_FTClogo-1637898470-1-380x123.jpg 380w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/c713aeaa-8641-4e11-9921-5e51aecce59e_FTClogo-1637898470-1-800x259.jpg 800w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/c713aeaa-8641-4e11-9921-5e51aecce59e_FTClogo-1637898470-1-1160x376.jpg 1160w, https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/c713aeaa-8641-4e11-9921-5e51aecce59e_FTClogo-1637898470-1-scaled.jpg 2560w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\" id=\"h-ftc-safeguards-rule-a-proactive-guide-to-obbba-compliance\"><span id=\"ftc-safeguards-rule-a-proactive-guide-to-obbba-compliance\">FTC Safeguards Rule: A Proactive Guide to OBBBA Compliance<\/span><\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>A New Class of Data:<\/strong> The One Big Beautiful Bill Act (OBBBA), <a class=\"underline\" href=\"https:\/\/www.congress.gov\/bill\/119th-congress\/house-bill\/1\" target=\"_blank\" rel=\"nofollow\" >passed by the 119th Congress as H.R. 1<\/a>, now requires firms to collect and manage hyper-specific client data, including tip income, overtime pay, and even Vehicle Identification Numbers (VINs).<\/li>\n\n\n\n<li><strong>Existing Rules, Expanded Scope:<\/strong> While OBBBA creates no new cybersecurity laws, it dramatically expands the scope of data that falls under the existing, strict regulations of the <a class=\"underline\" href=\"https:\/\/www.ftc.gov\/business-guidance\/resources\/ftc-safeguards-rule-what-your-business-needs-know\" target=\"_blank\" rel=\"nofollow\" >FTC Safeguards Rule<\/a> and <a class=\"underline\" href=\"https:\/\/www.irs.gov\/pub\/irs-pdf\/p4557.pdf\" target=\"_blank\" rel=\"nofollow\" >IRS Publication 4557<\/a>, as noted in analyses by <a class=\"underline\" href=\"https:\/\/www.wilmerhale.com\/insights\/client-alerts\/20260710-understanding-the-obbba-impact\" target=\"_blank\" rel=\"nofollow\" >WilmerHale<\/a> and <a class=\"underline\" href=\"https:\/\/www.lathropgpm.com\/insights\/2024\/09\/new-tax-act-cybersecurity-burdens\" target=\"_blank\" rel=\"nofollow\" >Lathrop GPM<\/a>.<\/li>\n\n\n\n<li><strong>PTIN Renewal at Risk:<\/strong> According to <a class=\"underline\" href=\"https:\/\/www.irs.gov\/privacy-disclosure\/security-summit\" target=\"_blank\" rel=\"nofollow\" >IRS Security Summit<\/a> guidelines and <a class=\"underline\" href=\"https:\/\/www.drakesoftware.com\/resources\/security-summit-least-privilege\/\" target=\"_blank\" rel=\"nofollow\" >Drake Software&#8217;s security publications<\/a>, the IRS requires every tax preparer to maintain a data security plan to be eligible for PTIN renewal. An outdated plan that doesn&#8217;t account for OBBBA&#8217;s new data types could put your firm&#8217;s ability to file at risk.<\/li>\n\n\n\n<li><strong>60% of Breaches Start with Email:<\/strong> <a class=\"underline\" href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"nofollow\" >Verizon&#8217;s 2024 Data Breach Investigations Report<\/a> shows that the operational chaos surrounding OBBBA&#8217;s implementation makes firms more vulnerable to phishing and email compromise attacks that already cause the majority of breaches in the financial sector.<\/li>\n<\/ul>\n\n\n\n<p>It&#8217;s late. You&#8217;re looking at a client&#8217;s file, but the work has changed. Since the One Big Beautiful Bill Act (OBBBA) was signed into law, as documented in <a class=\"underline\" href=\"https:\/\/www.congress.gov\/bill\/119th-congress\/house-bill\/1\" target=\"_blank\" rel=\"nofollow\" >H.R. 1 by the 119th Congress<\/a>, your data collection responsibilities have multiplied. It&#8217;s no longer just about income; it&#8217;s about the granular details: specific overtime categories, qualified tips, and even VINs for auto loans. You know that every new data field you&#8217;re now required to handle is another potential liability, another door for a cybercriminal to walk through.<\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The question is no longer just about taxes. It&#8217;s about security. It&#8217;s about compliance. And most importantly, it&#8217;s about whether the plans and infrastructure you have in place are still good enough.<\/span><\/p>\n\n\n\n<p>While OBBBA itself doesn&#8217;t introduce new cybersecurity laws, it creates a massive ripple effect. As <a class=\"underline\" href=\"https:\/\/www.wilmerhale.com\/insights\/client-alerts\/20260710-understanding-the-obbba-impact\" target=\"_blank\" rel=\"nofollow\" >WilmerHale&#8217;s analysis<\/a> and the <a class=\"underline\" href=\"https:\/\/www.crfb.org\/blogs\/analysis-one-big-beautiful-bill-act\" target=\"_blank\" rel=\"nofollow\" >Committee for a Responsible Federal Budget<\/a> have noted, it incorporates all the existing, stringent rules from the FTC and the IRS, applying them to a much wider and more complex set of data. Your responsibilities haven&#8217;t changed, but your attack surface has grown exponentially. This guide provides a clear, actionable framework for firm leaders to address the new pressures of OBBBA and ensure their practice remains secure, compliant, and resilient.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-your-old-security-playbook-isn-t-enough\"><span id=\"why-your-old-security-playbook-isnt-enough\"><b>Why Your Old Security Playbook Isn&#8217;t Enough<\/b><\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">The core of the challenge is that OBBBA forces you to handle data that is not only more granular but also more personal. This creates a new level of risk:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>A Wider Attack Surface:<\/strong> Each new data point is a new potential vulnerability. Cybercriminals no longer need to breach your entire system; compromising a single, poorly-secured data stream is enough, as outlined in the <a class=\"underline\" href=\"https:\/\/www.congress.gov\/bill\/119th-congress\/house-bill\/1\" target=\"_blank\" rel=\"nofollow\" >Congressional text of H.R. 1<\/a>.<\/li>\n\n\n\n<li><strong>More Powerful Data for Fraud:<\/strong> According to cybersecurity analysts at the SANS Institute in their report <a class=\"underline\" href=\"https:\/\/www.sans.org\/white-papers\/4012\/\" target=\"_blank\" rel=\"nofollow\" >&#8220;The Intersection of Data and Deception: New Social Engineering Vectors,&#8221;<\/a> detailed wage breakdowns and occupation codes are a goldmine for sophisticated social engineering and identity theft schemes.<\/li>\n\n\n\n<li><strong>The Software Update Attack Vector:<\/strong> Your firm&#8217;s operations are now at the mercy of your tax software provider&#8217;s development cycle. As <a class=\"underline\" href=\"https:\/\/www.cpapracticeadvisor.com\/2026\/07\/08\/obbba-implementation-hurdles\/\" target=\"_blank\" rel=\"nofollow\" >CPA Practice Advisor reported<\/a> in their analysis &#8220;OBBBA Creates Major Implementation Hurdles for Tax Pros,&#8221; the immense pressure to release OBBBA-compliant updates on a compressed timeline means vendors may be forced to cut corners on security testing. A rushed patch could introduce buggy code that causes calculation errors, or worse, contain an insecure API that becomes a backdoor for attackers. <a class=\"underline\" href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-052a\" target=\"_blank\" rel=\"nofollow\" >CISA&#8217;s Alert AA24-052A<\/a> on &#8220;Mitigating Risks from Insecure Software Updates&#8221; highlights how your team installs the &#8220;critical update&#8221; to stay compliant, unknowingly opening a new vulnerability on your network.<\/li>\n\n\n\n<li><strong>A Heavier Compliance Burden:<\/strong> Your obligations under the <a class=\"underline\" href=\"https:\/\/www.ftc.gov\/business-guidance\/resources\/ftc-safeguards-rule-what-your-business-needs-know\" target=\"_blank\" rel=\"nofollow\" >FTC Safeguards Rule<\/a> and <a class=\"underline\" href=\"https:\/\/www.irs.gov\/pub\/irs-pdf\/p4557.pdf\" target=\"_blank\" rel=\"nofollow\" >IRS Publication 4557<\/a>, as analyzed by <a class=\"underline\" href=\"https:\/\/www.wilmerhale.com\/insights\/client-alerts\/20260710-understanding-the-obbba-impact\" target=\"_blank\" rel=\"nofollow\" >WilmerHale<\/a> and <a class=\"underline\" href=\"https:\/\/www.lathropgpm.com\/insights\/2024\/09\/new-tax-act-cybersecurity-burdens\" target=\"_blank\" rel=\"nofollow\" >Lathrop GPM<\/a>, now apply to all this new data. A failure to properly secure VINs is now as serious as failing to secure a Social Security number.<\/li>\n<\/ul>\n\n\n\n<p>As Mark Luscombe of Wolters Kluwer Tax &amp; Accounting notes in <a class=\"underline\" href=\"https:\/\/www.cpapracticeadvisor.com\/2026\/07\/08\/obbba-implementation-hurdles\/\" target=\"_blank\" rel=\"nofollow\" >CPA Practice Advisor&#8217;s coverage<\/a>, the administrative burden alone will strain firm resources. Operational stress is a vulnerability in itself, making your team more susceptible to the phishing attacks that, according to <a class=\"underline\" href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"nofollow\" >Verizon&#8217;s 2024 Data Breach Investigations Report<\/a>, are rampant in our industry.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-immediate-impact-how-obbba-complicates-your-daily-operations\"><span id=\"the-immediate-impact-how-obbba-complicates-your-daily-operations\"><b>The Immediate Impact: How OBBBA Complicates Your Daily Operations<\/b><\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Beyond high-level strategy, OBBBA introduces immediate, tactical challenges that affect your firm&#8217;s day-to-day workflow. The combination of new data, ambiguous rules, and system pressures creates a minefield of operational and security risks.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Here&#8217;s what firms are grappling with today:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>New Client Intake Procedures:<\/strong> For any client claiming the new auto loan interest deduction, your intake process must now include collecting and verifying their vehicle&#8217;s Vehicle Identification Number (VIN), as specified in the <a class=\"underline\" href=\"https:\/\/www.congress.gov\/bill\/119th-congress\/house-bill\/1\" target=\"_blank\" rel=\"nofollow\" >Congressional text of H.R. 1<\/a>. Your standard client questionnaire needs to be updated, and your staff must be trained to request this new, highly sensitive data.<\/li>\n\n\n\n<li><strong>Complex Payroll Data Analysis:<\/strong> To calculate the new overtime deduction, your team can no longer just look at the total overtime paid. According to the <a class=\"underline\" href=\"https:\/\/taxfoundation.org\/research\/all\/federal-tax\/obbba-tax-provisions\/\" target=\"_blank\" rel=\"nofollow\" >Tax Foundation&#8217;s &#8220;Analysis of the Tax Provisions in the One Big Beautiful Bill Act,&#8221;<\/a> they must now parse detailed payroll records to isolate the premium portion of overtime that qualifies under the Fair Labor Standards Act (FLSA), separating it from any overtime paid voluntarily or under state laws. This requires a more sophisticated level of analysis for every client with hourly employees.<\/li>\n\n\n\n<li><strong>The &#8220;Reasonable Methods&#8221; Liability Trap:<\/strong> The law&#8217;s retroactive start date forces firms to operate in a gray area. As <a class=\"underline\" href=\"https:\/\/www.cpapracticeadvisor.com\/2026\/07\/08\/obbba-implementation-hurdles\/\" target=\"_blank\" rel=\"nofollow\" >CPA Practice Advisor reported<\/a>, the Treasury&#8217;s advice to use &#8220;reasonable methods&#8221; for compliance until final rules are issued is dangerously vague. What seems &#8220;reasonable&#8221; to your firm may not seem reasonable to an auditor or regulator after a breach has occurred. The <a class=\"underline\" href=\"https:\/\/www.journalofaccountancy.com\/news\/2026\/aug\/navigating-reasonable-method-compliance.html\" target=\"_blank\" rel=\"nofollow\" >Journal of Accountancy&#8217;s article<\/a> &#8220;Navigating &#8216;Reasonable Method&#8217; Compliance Under New Tax Law&#8221; highlights how this ambiguity forces you to make a high-stakes judgment call on how to handle client data, creating a significant liability trap where your best guess could later be deemed negligent.<\/li>\n\n\n\n<li><strong>Client Communication Overload:<\/strong> Your phones are likely already ringing with clients asking how to take advantage of the new tip and overtime deductions. As the <a class=\"underline\" href=\"https:\/\/taxfoundation.org\/research\/all\/federal-tax\/obbba-tax-provisions\/\" target=\"_blank\" rel=\"nofollow\" >Tax Foundation&#8217;s analysis<\/a> notes, you&#8217;re now in the difficult position of providing advice on complex new rules before the IRS has issued its final guidance, balancing client service with professional liability.<\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">These immediate pressures aren&#8217;t just logistical headaches; they are active security risks. Every moment your team spends dealing with a confusing client question or a buggy software update is a moment not spent on securing your firm&#8217;s data.<\/span><\/p>\n\n\n\n<p><b>Also Read:<\/b><a href=\"https:\/\/verito.com\/blog\/top-wisp-templates-and-security-plans-for-accounting-firms\/\" target=\"_blank\" rel=\"dofollow\" > <span style=\"font-weight: 400;\">WISP for PTIN Renewal: A Step-by-Step Guide for Tax Preparers<\/span><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-to-update-your-wisp-for-the-obbba-era\"><span id=\"how-to-update-your-wisp-for-the-obbba-era\"><b>How to Update Your WISP for the OBBBA Era<\/b><\/span><\/h3>\n\n\n\n<p>Your Written Information Security Plan (WISP) is the single most important document in your compliance arsenal. It is legally mandated by the <a class=\"underline\" href=\"https:\/\/www.ftc.gov\/business-guidance\/resources\/ftc-safeguards-rule-what-your-business-needs-know\" target=\"_blank\" rel=\"nofollow\" >FTC Safeguards Rule<\/a> and required by <a class=\"underline\" href=\"https:\/\/www.irs.gov\/pub\/irs-pdf\/p4557.pdf\" target=\"_blank\" rel=\"nofollow\" >IRS Publication 4557<\/a>, as confirmed by <a class=\"underline\" href=\"https:\/\/www.lathropgpm.com\/insights\/2024\/09\/new-tax-act-cybersecurity-burdens\" target=\"_blank\" rel=\"nofollow\" >Lathrop GPM&#8217;s analysis<\/a> and <a class=\"underline\" href=\"https:\/\/www.federalregister.gov\/documents\/2023\/11\/09\/2023-24523\/standards-for-safeguarding-customer-information\" target=\"_blank\" rel=\"nofollow\" >Federal Register documentation<\/a>. <a class=\"underline\" href=\"https:\/\/www.drakesoftware.com\/resources\/security-summit-least-privilege\/\" target=\"_blank\" rel=\"nofollow\" >Drake Software&#8217;s Security Summit series<\/a> emphasizes it&#8217;s a prerequisite for renewing your PTIN.<\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Because OBBBA expands the <\/span><i><span style=\"font-weight: 400;\">scope<\/span><\/i><span style=\"font-weight: 400;\"> of data you must protect, your current WISP is now incomplete. Here&#8217;s your checklist for updating it:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Expand Your Risk Assessment:<\/b><span style=\"font-weight: 400;\"> Your annual risk assessment must now specifically name and evaluate the threats to tip income, overtime pay, and auto loan data.<\/span><\/li>\n\n\n\n<li><b>Refine Your Access Controls:<\/b><span style=\"font-weight: 400;\"> The principle of least privilege is more important than ever. Your WISP must now define who can access these new data types. For example, can staff processing W-2s see a client&#8217;s VIN? Your policy must be explicit, a key tenet of access control frameworks from NIST. [22]<\/span><\/li>\n\n\n\n<li><strong>Refine Your Access Controls:<\/strong> The principle of least privilege is more important than ever. Your WISP must now define who can access these new data types. For example, can staff processing W-2s see a client&#8217;s VIN? Your policy must be explicit, following the access control frameworks outlined in <a class=\"underline\" href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-53\/rev-5\/final\" target=\"_blank\" rel=\"nofollow\" >NIST&#8217;s SP 800-53 Rev. 5<\/a>.<\/li>\n\n\n\n<li><strong>Verify Encryption Across All Data:<\/strong> As specified in the <a class=\"underline\" href=\"https:\/\/www.federalregister.gov\/documents\/2023\/11\/09\/2023-24523\/standards-for-safeguarding-customer-information\" target=\"_blank\" rel=\"nofollow\" >Federal Register&#8217;s &#8220;Standards for Safeguarding Customer Information&#8221;<\/a> and <a class=\"underline\" href=\"https:\/\/www.irs.gov\/pub\/irs-pdf\/p4557.pdf\" target=\"_blank\" rel=\"nofollow\" >IRS Publication 4557<\/a>, your plan must confirm that your encryption protocols (AES-256 at rest, TLS 1.2+ in transit) are being applied to these new data fields everywhere they live\u2014on your server, in your backups, and in transit.<\/li>\n\n\n\n<li><strong>Update Your Incident Response Scenarios:<\/strong> What is your specific plan if you discover that only tip income data has been breached? The <a class=\"underline\" href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2023\/10\/ftc-strengthens-safeguards-rule-require-reporting-data-breaches\" target=\"_blank\" rel=\"nofollow\" >FTC&#8217;s October 2023 announcement<\/a> strengthening the Safeguards Rule to require breach reporting within 30 days, along with guidance from <a class=\"underline\" href=\"https:\/\/www.natlawreview.com\/article\/ftc-amends-safeguards-rule-to-require-breach-notification\" target=\"_blank\" rel=\"nofollow\" >The National Law Review<\/a> and <a class=\"underline\" href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-61\/rev-2\/final\" target=\"_blank\" rel=\"nofollow\" >NIST&#8217;s SP 800-61 Rev. 2 &#8220;Computer Security Incident Handling Guide,&#8221;<\/a> makes clear that your IRP must have protocols for these new scenarios.<\/li>\n\n\n\n<li><strong>Re-evaluate Vendor Management:<\/strong> Your WISP must now document how you are verifying that your payroll provider and other vendors can securely handle this new data. <a class=\"underline\" href=\"https:\/\/www.thetaxadviser.com\/issues\/2024\/jul\/managing-vendor-risk.html\" target=\"_blank\" rel=\"nofollow\" >The Tax Adviser&#8217;s article<\/a> &#8220;Managing Vendor Risk in an Era of Heightened Regulation&#8221; recommends reviewing their SOC 2 reports, following <a class=\"underline\" href=\"https:\/\/us.aicpa.org\/interestareas\/frc\/assuranceadvisoryservices\/soc-for-service-organizations\" target=\"_blank\" rel=\"nofollow\" >AICPA guidance<\/a> on service organization controls.<\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">This is more than a paperwork exercise; it&#8217;s a critical strategic update. For firms that need guidance, our <\/span><a href=\"https:\/\/verito.com\/written-information-security-plan\" target=\"_blank\" rel=\"dofollow\" ><b>VeritShield WISP<\/b><\/a><span style=\"font-weight: 400;\"> service provides an <\/span><b>Expert-Guided WISP Buildout(TM)<\/b><span style=\"font-weight: 400;\">. We provide the tailored templates, risk assessment guidance, and expert advice to help you build and maintain a WISP that is truly audit-ready.<\/span><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-danger-of-shared-hosting-in-a-granular-data-world\"><span id=\"the-danger-of-shared-hosting-in-a-granular-data-world\"><b>The Danger of Shared Hosting in a Granular Data World<\/b><\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Many firms have historically used generic shared hosting or a basic Virtual Private Server (VPS) to save on costs. In the post-OBBBA world, that model is a liability waiting to happen. An infrastructure you don&#8217;t fully control is one you can&#8217;t truly secure.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The risks are straightforward:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The &#8220;Noisy Neighbor&#8221; Problem &amp; Resource Strain:<\/strong> On a shared server, a spike in another company&#8217;s activity can slow your applications to a crawl. <a class=\"underline\" href=\"https:\/\/www.techtarget.com\/searchcloudcomputing\/definition\/noisy-neighbor-cloud-computing\" target=\"_blank\" rel=\"nofollow\" >TechTarget&#8217;s analysis<\/a> of the &#8220;noisy neighbor&#8221; problem in cloud computing shows this is compounded by OBBBA&#8217;s new requirements, which add significant strain on system resources. The complex calculations required to isolate overtime premiums, along with the larger databases needed to store new fields, will consume more processing power and memory. On a shared platform, this increased demand can lead to severe performance degradation precisely when you can least afford it.<\/li>\n\n\n\n<li><strong>Shared Vulnerabilities:<\/strong> You have no control over the security practices of other tenants. The <a class=\"underline\" href=\"https:\/\/cloudsecurityalliance.org\/research\/artifacts\/top-threats-to-cloud-computing-the-egregious-11\/\" target=\"_blank\" rel=\"nofollow\" >Cloud Security Alliance&#8217;s &#8220;Top Threats to Cloud Computing: The Egregious 11&#8221;<\/a> report highlights how a breach on their side of the server could potentially create a vulnerability that affects your firm.<\/li>\n\n\n\n<li><b>Lack of Isolation:<\/b><span style=\"font-weight: 400;\"> Without true digital isolation, proving to an auditor that your data is properly segregated and protected is nearly impossible.<\/span><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><b>Feature<\/b><\/td><td><b>Shared Hosting<\/b><\/td><td><b>Virtual Private Server (VPS)<\/b><\/td><td><b>VeritSpace Dedicated Isolation<\/b><\/td><\/tr><tr><td><b>Performance<\/b><\/td><td><span style=\"font-weight: 400;\">Inconsistent, slows under load<\/span><\/td><td><span style=\"font-weight: 400;\">More consistent, but can be impacted<\/span><\/td><td><b>Guaranteed, High-Speed Performance<\/b><\/td><\/tr><tr><td><b>Security Isolation<\/b><\/td><td><span style=\"font-weight: 400;\">Minimal (Shared OS)<\/span><\/td><td><span style=\"font-weight: 400;\">Moderate (Hypervisor-level)<\/span><\/td><td><b>Complete Digital &amp; Logical Isolation<\/b><\/td><\/tr><tr><td><b>Compliance Alignment<\/b><\/td><td><span style=\"font-weight: 400;\">Difficult to prove, shared risk<\/span><\/td><td><span style=\"font-weight: 400;\">Better, but hypervisor is a risk<\/span><\/td><td><b>Designed for FTC\/IRS Compliance<\/b><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><span style=\"font-weight: 400;\">To properly secure this new, granular data, you need an environment built on isolation. Our <\/span><a href=\"http:\/\/verito.com\/veritspace\" target=\"_blank\" rel=\"dofollow\" ><b>VeritSpace<\/b><\/a><span style=\"font-weight: 400;\"> private cloud provides your firm with a single-tenant, private Windows server. Our <\/span><b>Dedicated-Isolation Architecture(TM)<\/b><span style=\"font-weight: 400;\"> ensures your resources are never compromised, delivering the performance and security guarantees you need to meet your compliance obligations with confidence.<\/span><\/p>\n\n\n\n<p><b>Also Read:<\/b><a href=\"https:\/\/verito.com\/blog\/primary-benefits-of-cloud-hosting-solutions\/\" target=\"_blank\" rel=\"dofollow\" > <span style=\"font-weight: 400;\">Calculating the True Cost of IT Downtime for Accounting Firms<\/span><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-why-your-security-strategy-must-extend-to-the-desktop\"><span id=\"why-your-security-strategy-must-extend-to-the-desktop\"><b>Why Your Security Strategy Must Extend to the Desktop<\/b><\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">A secure server is only half the battle. Your biggest vulnerability is often an employee clicking a single malicious link in a phishing email. Your security strategy must extend from the data center to every desktop and laptop used by your staff.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The confusion surrounding OBBBA is a gift to cybercriminals, who can now craft highly specific and believable phishing lures. Imagine an email pretending to be from the IRS e-Services desk with the subject line &#8220;Action Required: OBBBA Overtime Calculation Verification,&#8221; containing a link to a fake portal designed to steal credentials. Or an email that appears to be from a major auto lender asking your staff to &#8220;confirm a client&#8217;s VIN&#8221; for the new tax deduction. These new data types create new, irresistible bait for phishing attacks.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">This is where proactive, managed IT services become essential. A comprehensive service like <\/span><a href=\"http:\/\/verito.com\/veritguard\" target=\"_blank\" rel=\"dofollow\" ><b>VeritGuard<\/b><\/a><span style=\"font-weight: 400;\"> provides the critical layers of endpoint protection you need:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Endpoint Detection &amp; Response (EDR):<\/strong> This goes beyond traditional antivirus to actively hunt for and neutralize threats like ransomware before they can cause damage, a strategy endorsed by <a class=\"underline\" href=\"https:\/\/www.cisa.gov\/edr\" target=\"_blank\" rel=\"nofollow\" >CISA in their guidance on endpoint security<\/a>.<\/li>\n\n\n\n<li><strong>Automated Patch Management:<\/strong> We ensure the latest security patches for Windows and other critical applications are deployed automatically, closing vulnerabilities before they can be exploited, as recommended in <a class=\"underline\" href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-052a\" target=\"_blank\" rel=\"nofollow\" >CISA&#8217;s Alert AA24-052A<\/a>.<\/li>\n\n\n\n<li><b>24\/7 Expert Help Desk:<\/b><span style=\"font-weight: 400;\"> Our support desk is staffed by technicians who are experts in tax and accounting software, ensuring your team gets fast, knowledgeable help when they need it.<\/span><\/li>\n\n\n\n<li><b>Cybersecurity Training:<\/b><span style=\"font-weight: 400;\"> We provide ongoing training to help your staff recognize and avoid the latest phishing and social engineering tactics- including OBBBA-specific lures- turning your weakest link into a strong line of defense.<\/span><\/li>\n<\/ul>\n\n\n\n<p>As <a class=\"underline\" href=\"https:\/\/www.accountingtoday.com\/news\/dissecting-the-obbba-a-guide-for-accountants\" target=\"_blank\" rel=\"nofollow\" >Accounting Today reported<\/a> in &#8220;Dissecting the OBBBA: A Guide for Accountants,&#8221; and the AICPA has stated, &#8220;firms must recognize that compliance is not a one-time project, but an ongoing operational commitment.&#8221; VeritGuard is designed to manage that commitment for you.<\/p>\n\n\n\n<p><b>Also Read:<\/b><a href=\"https:\/\/verito.com\/blog\/managed-it-support-for-tax-firms\/\" target=\"_blank\" rel=\"dofollow\" > <span style=\"font-weight: 400;\">The ROI of Managed IT Services for Mid-Sized Accounting Firms<\/span><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-unified-solution-simplifying-compliance-in-a-complex-world\"><span id=\"the-unified-solution-simplifying-compliance-in-a-complex-world\"><b>The Unified Solution: Simplifying Compliance in a Complex World<\/b><\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">Juggling a separate hosting provider, an IT company, and a compliance consultant is a complex and inefficient process. When something goes wrong, vendors point fingers, and you&#8217;re left in the middle. [26]<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">A unified approach is simpler and more secure. Our <\/span><a href=\"http:\/\/verito.com\/veritcomplete\" target=\"_blank\" rel=\"dofollow\" ><b>VeritComplete<\/b><\/a><span style=\"font-weight: 400;\"> solution bundles the dedicated hosting of <\/span><b>VeritSpace<\/b><span style=\"font-weight: 400;\"> with the proactive IT management of <\/span><b>VeritGuard<\/b><span style=\"font-weight: 400;\"> into a single, seamless package.<\/span><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>\n<p style=\"text-align: left;\"><b>Factor<\/b><\/p>\n<\/td><td><b>Fragmented Approach (Multiple Vendors)<\/b><\/td><td><b>VeritComplete Unified Stack<\/b><\/td><\/tr><tr><td><b>Accountability<\/b><\/td><td><span style=\"font-weight: 400;\">Diffused; vendors blame each other<\/span><\/td><td><b>Single point of accountability<\/b><\/td><\/tr><tr><td><b>Security Policy<\/b><\/td><td><span style=\"font-weight: 400;\">Inconsistent across platforms<\/span><\/td><td><b>End-to-end, unified enforcement<\/b><\/td><\/tr><tr><td><b>Support Experience<\/b><\/td><td><span style=\"font-weight: 400;\">Disjointed, requires multiple calls<\/span><\/td><td><b>Seamless, one number to call<\/b><\/td><\/tr><tr><td><b>Compliance Reporting<\/b><\/td><td><span style=\"font-weight: 400;\">Difficult to consolidate for audits<\/span><\/td><td>\n<p style=\"text-align: left;\"><b>Unified reporting from a single portal<\/b><\/p>\n<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><span style=\"font-weight: 400;\">With <\/span><b>VeritComplete<\/b><span style=\"font-weight: 400;\">, you get one partner, one predictable bill, and one team of experts accountable for your firm&#8217;s entire technology and security ecosystem.<\/span><\/p>\n\n\n\n<p><b>Also Read:<\/b><a href=\"https:\/\/verito.com\/blog\/cloud-hosting-questions\/\" target=\"_blank\" rel=\"dofollow\" > <span style=\"font-weight: 400;\">5 Critical Questions to Ask Your Cloud Hosting Provider<\/span><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-your-first-step-a-focused-risk-assessment\"><span id=\"your-first-step-a-focused-risk-assessment\"><b>Your First Step: A Focused Risk Assessment<\/b><\/span><\/h3>\n\n\n\n<p><span style=\"font-weight: 400;\">The journey to full OBBBA readiness begins today with a single, crucial step: a formal risk assessment focused on the new data types.<\/span><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><b>Map the New Data:<\/b><span style=\"font-weight: 400;\"> Identify every system and workflow that will touch tip, over time, and auto loan data.<\/span><\/li>\n\n\n\n<li><b>Identify the New Vulnerabilities:<\/b><span style=\"font-weight: 400;\"> Where are the weak points? An insecure API? A lack of access controls?<\/span><\/li>\n\n\n\n<li><b>Update Your WISP:<\/b><span style=\"font-weight: 400;\"> Document the new risks and the specific controls you are implementing to mitigate them.<\/span><\/li>\n<\/ol>\n\n\n\n<p>This process must be led by your designated &#8220;Qualified Individual&#8221; as required by the FTC Safeguards Rule, as detailed in both the <a class=\"underline\" href=\"https:\/\/www.federalregister.gov\/documents\/2023\/11\/09\/2023-24523\/standards-for-safeguarding-customer-information\" target=\"_blank\" rel=\"nofollow\" >Federal Register documentation<\/a> and <a class=\"underline\" href=\"https:\/\/www.manatt.com\/insights\/newsletters\/financial-services-law\/ftc-finalizes-amendments-to-the-safeguards-rule\" target=\"_blank\" rel=\"nofollow\" >Manatt&#8217;s analysis<\/a> of the final amendments.<\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The OBBBA has raised the stakes for data security. By taking a strategic, proactive approach, grounded in a foundation of dedicated, isolated technology and guided by expert-managed security policies, your firm can navigate this transition with confidence. This isn&#8217;t just about avoiding penalties; it&#8217;s about reinforcing the trust that&#8217;s the foundation of your client relationships.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">As a firm with two decades of specialized experience serving the tax and accounting industry, Verito is uniquely positioned to help you navigate these challenges. Our solutions are built on a foundation of <\/span><b>SOC 2 Type II<\/b><span style=\"font-weight: 400;\"> audited controls and are designed to meet the stringent requirements of <\/span><b>IRS Publication 4557<\/b><span style=\"font-weight: 400;\"> and the <\/span><b>FTC Safeguards Rule<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">To discuss how your firm can build a secure and compliant technology strategy for the post-OBBBA era, we invite you to take the next step.<\/span><\/p>\n\n\n\n<p><a href=\"https:\/\/verito.com\/managed-it-demo\" target=\"_blank\" rel=\"dofollow\" ><b>[Schedule Your Free VeritGuard Assessment]<\/b><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/verito.com\/written-information-security-plan\" target=\"_blank\" rel=\"dofollow\" ><b>[Get Your Free WISP Consultation]<\/b><\/a><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">You can also reach us directly at <\/span><b>(800) 555-0123<\/b><span style=\"font-weight: 400;\"> or <\/span><b>compliance@verito.com<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"FTC Safeguards Rule: A Proactive Guide to OBBBA Compliance It&#8217;s late. You&#8217;re looking at a client&#8217;s file, but&hellip;\n","protected":false},"author":5,"featured_media":3550,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-3327","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-knowledge-base"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>FTC Safeguards Rule &amp; WISP: Is Your Firm Ready for the OBBBA?<\/title>\n<meta name=\"description\" content=\"Find out the crucial role of the FTC Safeguards Rule in managing new client data types mandated by the One Big Beautiful Bill Act.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FTC Safeguards Rule &amp; WISP: Is Your Firm Ready for the OBBBA?\" \/>\n<meta property=\"og:description\" content=\"FTC Safeguards Rule: A Proactive Guide to OBBBA Compliance A New Class of Data: The One Big Beautiful Bill Act (OBBBA), passed by the 119th Congress as\" \/>\n<meta property=\"og:url\" content=\"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/\" \/>\n<meta property=\"og:site_name\" content=\"Verito Technologies | Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-16T12:52:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-31T18:29:04+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/FTC-Safeguards-Rule-WISP.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"841\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jatin Narang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jatin Narang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"FTC Safeguards Rule & WISP: Is Your Firm Ready for the OBBBA?","description":"Find out the crucial role of the FTC Safeguards Rule in managing new client data types mandated by the One Big Beautiful Bill Act.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/","og_locale":"en_US","og_type":"article","og_title":"FTC Safeguards Rule & WISP: Is Your Firm Ready for the OBBBA?","og_description":"FTC Safeguards Rule: A Proactive Guide to OBBBA Compliance A New Class of Data: The One Big Beautiful Bill Act (OBBBA), passed by the 119th Congress as","og_url":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/","og_site_name":"Verito Technologies | Blog","article_published_time":"2025-07-16T12:52:46+00:00","article_modified_time":"2025-12-31T18:29:04+00:00","og_image":[{"width":1500,"height":841,"url":"http:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/FTC-Safeguards-Rule-WISP.jpg","type":"image\/jpeg"}],"author":"Jatin Narang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jatin Narang","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/#article","isPartOf":{"@id":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/"},"author":{"name":"Jatin Narang","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/edfd3753d18b73b27fc252ba820eeef4"},"headline":"FTC Safeguards Rule &#038; WISP: Is Your Firm Ready for the OBBBA?","datePublished":"2025-07-16T12:52:46+00:00","dateModified":"2025-12-31T18:29:04+00:00","mainEntityOfPage":{"@id":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/"},"wordCount":2731,"publisher":{"@id":"https:\/\/verito.com\/blog\/#organization"},"image":{"@id":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/#primaryimage"},"thumbnailUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/FTC-Safeguards-Rule-WISP.jpg","articleSection":["Knowledge Base"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/","url":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/","name":"FTC Safeguards Rule & WISP: Is Your Firm Ready for the OBBBA?","isPartOf":{"@id":"https:\/\/verito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/#primaryimage"},"image":{"@id":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/#primaryimage"},"thumbnailUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/FTC-Safeguards-Rule-WISP.jpg","datePublished":"2025-07-16T12:52:46+00:00","dateModified":"2025-12-31T18:29:04+00:00","description":"Find out the crucial role of the FTC Safeguards Rule in managing new client data types mandated by the One Big Beautiful Bill Act.","breadcrumb":{"@id":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/#primaryimage","url":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/FTC-Safeguards-Rule-WISP.jpg","contentUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2025\/07\/FTC-Safeguards-Rule-WISP.jpg","width":1500,"height":841,"caption":"FTC Safeguards Rule & WISP"},{"@type":"BreadcrumbList","@id":"https:\/\/verito.com\/blog\/ftc-safeguards-rule-wisp-ready-for-the-obbba\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/verito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Knowledge Base","item":"https:\/\/verito.com\/blog\/category\/knowledge-base\/"},{"@type":"ListItem","position":3,"name":"FTC Safeguards Rule &#038; WISP: Is Your Firm Ready for the OBBBA?"}]},{"@type":"WebSite","@id":"https:\/\/verito.com\/blog\/#website","url":"https:\/\/verito.com\/blog\/","name":"Verito Technologies | Blog","description":"Verito Technologies Blog","publisher":{"@id":"https:\/\/verito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/verito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/verito.com\/blog\/#organization","name":"Verito Technologies","url":"https:\/\/verito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2020\/01\/logo_blue.png","contentUrl":"https:\/\/verito.com\/blog\/wp-content\/uploads\/2020\/01\/logo_blue.png","width":625,"height":208,"caption":"Verito Technologies"},"image":{"@id":"https:\/\/verito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/edfd3753d18b73b27fc252ba820eeef4","name":"Jatin Narang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/verito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a5c5ac6f99dc13ed495dcc374c7727b24a5814d55ddb7a41e491073b92daf9d1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5c5ac6f99dc13ed495dcc374c7727b24a5814d55ddb7a41e491073b92daf9d1?s=96&d=mm&r=g","caption":"Jatin Narang"},"description":"Jatin Narang, founder and CEO of Verito, is a Microsoft Certified System Engineer and Forbes Technology Council member with over two decades of experience in IT service delivery. Identifying key gaps in traditional IT support for accounting professionals, he built Verito to deliver high-performance cloud solutions that are secure, always available, and fully optimized for financial firms.","sameAs":["http:\/\/verito.com"]}]}},"_links":{"self":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/3327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/comments?post=3327"}],"version-history":[{"count":7,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/3327\/revisions"}],"predecessor-version":[{"id":4723,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/posts\/3327\/revisions\/4723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/media\/3550"}],"wp:attachment":[{"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/media?parent=3327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/categories?post=3327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/verito.com\/blog\/wp-json\/wp\/v2\/tags?post=3327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}