Smith Office Solutions Logo

Home    Clouds    About Us    Blog    Services    Payroll    Intuit Products    Interview    Rentals    Training     

 
Smith Office Solutions Newsletter
Changes abound!                                          April 2012
In This Issue
Important Dates
Bookkeeping Services
Important Dates
April 17 1040 Due
April 17 P/R Tax Dep Due
May 15 P/R Tax Dep Due

May 31 Intuit sunsets 2009 QB & Ent you need to move up if you have regular payroll or Merchant account

June 15 P/R Tax Dep Due

 

Want more information?

 

Bookkeeping Services
logo           QB Certifications
 

The year-end has been tough.

Let's think ahead for next year.

Our QuickBooks is different from yours.

We have accounting tools that you don't.

We have some that you could have.

Clue: keep in touch during the year.

If you need Statement for the bank & you want them professional we can do that too.

Call us & find out what we can do for you.   503-579-8059

QuickBooks Tips
QuickBooks Logo 

Icon Bar Magic I

Remove icon or center:

     Go to View on the menu bar

     Go to Customize the icon bar

     Click the icon

     Click Remove

     Click OK

 

Type caption text here.

Spotlight Company
 
Picture your Logo here.

Join us in the Cloud

 

Check with us for the current promotion!

Greetings!

 

Changes are coming
 

Unfortunately, there were not as many responses to our survey as I would have liked, but what we heard was important.  This what we heard:
  • Important things
    • You are interested in specific newsletters that affect your industry
    • You want us to keep:
      • Important Dates
      • Bookkeeping and Business Services
      • Tax Changes
      • QuickBooks Tips
    • Some of you might be interesting in contributing information
  • To better meet your needs:
    • Occasional Special Interest newsletters will be sent to those of you that are in specific industries
    • We will publish important dates throughout the quarter
    • The newsletter will be more concise with links to more in-depth articles
    • We have updated the look of our newsletter
    • Company Spotlight featuring a link to your website & your logo

 

Preventing Fraud and Identity Theft - Part Three

 

A sound data security plan to prevent fraud and identity theft is built on 5 key guidelines.  Last month, we shared the second guideline and steps to ensuring the security of your client's and employee's information.  This month, we present the next guideline you need for ensuring the security of your client's and employee's information. Smith Office Solutions wants you and your customers to be protected from these costly issues.

 

 

Guideline three: Protect the information that you keep - Electronic Security

  

Computer security isn't just the responsibility of your IT staff. Make sure you understand the vulnerabilities of your computer system, and follow the advice of experts in the field.

General Network Security

  • Identify the computers or servers, where sensitive personal information is stored, and the connections to them, such as the Internet and wireless devices.
  • Assess the vulnerability of each connection to commonly known or reasonably foreseeable attacks by running security software or having an independent professional conduct a full-scale security audit.
  • It is a good idea not to store sensitive consumer data on any computer with an Internet connection unless it is necessary for conducting your business.
  • Encrypt sensitive information that you send over the Internet. Consider encrypting sensitive information that is stored by the company, and e-mails that contain personally identifying information. Caution employees against transmitting sensitive personally identifying data such as Social Security numbers, passwords, or account information, via e-mail. Unencrypted email is not a secure way to transmit any information.
  • Regularly run up-to-date anti-virus and anti-spyware programs on individual computers and on servers on your network.
  • Consider restricting your employees' ability to download software. Software downloaded to devices that connect to your net­work (computers, smartphones, and tablets) could be used to distribute malware.
  • Check the computers in your company to identify the operating system and services. If you find services that you don't need, disable them to prevent potential security problems. For example, if e-mail service or an Internet connection is not necessary on a certain computer, consider disabling those services on that computer to prevent unauthorized access.
  • When you receive or transmit credit card information or other sensitive financial data, use Secure Sockets Layer (SSL) or another secure connection that protects the information in transit.
  • Pay particular attention to the security of your web applications-the software used to give information to visitors to your website and to retrieve information from them. Web applications may be particularly vulnerable to a variety of hack attacks. Relatively simple defenses against these attacks are available from a variety of sources.

Password Management

  • Require employees to use "strong" passwords. Experts say the longer and more complex the password, the better. Because simple passwords can be guessed easily, employees should choose passwords with a mix of letters, numbers, and special characters. An employee's user name and password should be different, and require passwords to be changed frequently.
  • Make it company policy to prohibit the sharing of passwords or posting them near their workstations.
  • Use password-activated screen savers to lock employee computers after a period of inactivity.
  • Lock out users who don't enter the correct password within a designated number of log-on attempts.
  • Let employees know that IT will never call asking them to reveal their passwords, and these attempts are always fraudulent.
  • When installing any new software, immediately change vendor-supplied default passwords to a more secure strong password.  

Firewalls

  • A firewall is software or hardware designed to block hackers from accessing your computer. Use a firewall to protect your computer while it is connected to the Internet. A properly configured firewall makes it tougher for hackers to locate your computer and get into your programs and files.
  • Use settings to allow only trusted employees with a legitimate business need to access the network. Since the protection a firewall provides is only as effective as its access controls, review them periodically.
  • If only some of the computers on your network store sensitive information, consider using additional firewalls to protect the computers with sensitive information.

 

 
Our main services are to help small to medium size business' become more successful in the accounting needs whatever that means to them.
 
Sincerely,
 
Meredith & Amanda
Smith Office Solutions