Keeping Safe

Cloud accounting is awesome, we all love the advantages of accounting on-the-go.. access your data and financials anywhere anytime. However, with leaps of technology comes risks of security and for many people the nerves of keeping data safe

Here are some great tips on keeping your data safe;

  • Use Two-Way Authentication

Most cloud-based software now give you the option of two-way authentication, some mandate it to ensure your data is secure. Two-Way authentication places an additional layer of security when you login. This means that in addition to your standard login, you’re required to provide another factor to authenticate your identity. This could be a unique code generated by a separate application, service or device, or something unique to you – like your fingerprint or voice. This reduces the risk of your account being accessed if your password is compromised.

  • Keep Track on movements

All security conscious cloud software allows users to run activity reports to show who has logged on, when and what they have done. This is a great way to keep an eye for any unauthorized access to your system and also keeps track on what is being done by those with access.

  • Secure Passwords

Everything now has a password, pin or unique identifier and keeping track of which password goes with what application can be quite challenging. Many users write their password down and keep it near their computer or use the one password for all their login. Although quite useful to remember password it is quite dangerous and unsafe. It is best to have unique passwords for each application being used and change it every three months or whenever the system requests it. Use a combination of capital, numbers and special characters.

  • Be Aware

Hacking can happen through people, not just computers. Calls are made to individuals pretending to be IT support and asking for passwords so that they can help you. Remember no one will ever have a need for your password. Another method of hacking is called ‘phishing’ and this happens by email. Often the email will contain links that the hacker wants you to click on. Without training, your staff might give away vital security information via phone or email.

Scroll to Top