SlideShare une entreprise Scribd logo
1  sur  16
Security for
                           QuickBooks and
                             QuickBooks
                              Enterprise




                                   perform
          Jim Savage
Certified QuickBooks Pro Advisor
    Intuit Solution Provider
                                             June 17, 2009
   Intuit Community Expert

                                                    Intuit Confidential
Speaker Bio – Jim Savage
•QB Certified Pro Advisor since 2002
•QB Enterprise Certified Pro Advisor
•Intuit Solution Provider
•Intuit Community Expert
•Controller/CFO in private sector
•IT Director up until 1999 for Fortune 500 company,
networks, software development, PC technology
•Specializes now in Small/Medium Size Businesses (SMB)



                                perform
                                           Community Expert




                                                        Intuit Confidential
Agenda (Part 1)


•Identify Security Issues Facing SMB
   •External
      •Spyware
      •Phishing
      •Viruses
      •Spam
   •Internal
      •Fraud
      •Risky Online Behavior
      •Wasted Productivity
                               perform


                                         Intuit Confidential
Agenda (Part 2)


• Steps to Take to Protect Your Business
   • Develop a Training and Security Policy
   • Deploy Integrated Security Protection
       • QuickBooks Enterprise vs. Pro and Premier
       • Trend Micro vs. Other Security Products




                                          perform


                                                     Intuit Confidential
External Threats


•   Spyware
    – Spyware is a software application that monitors a
      user’s computing habits and personal information
    – This information is sent to third parties without the
      user’s authorization or knowledge.
•   Phishing
    – Phishing attacks aim to “fish” or obtain personal
      information or financial information.
•   Viruses
    – Viruses can corrupt or destroy data
                                 perform
•   Spam
    – Spam is a threat because it is a means for planting
      malware on user’s computers

                                                       Intuit Confidential
Internal Threats - Fraud
• Fraud
  – Stealing Money or goods
  – Misusing Company Credit Card Accounts
  – Falsifying Checks or Payroll (Phantom
    Employees)
  – Bribes or Kickbacks
  – Embellishing Expense Accounts
  – Stealing or Selling Company Trade Secrets

                                         perform
 Protect Your Business from Fraud: Keep Your Financial Information Secure by
 Joe Woodard




                                                                     Intuit Confidential
Internal Threats – Risky Online Behavior

•   More Likely to Happen in SMB*

•   Employees in SMB companies took more online risks while on the company
    network compared to their counterparts in larger organizations

•   Risky activities include:
      –    Browsing Web sites unrelated to work
      –    Making online purchases
      –    Visiting social networking sites
      –    Downloading executable files
      –    Checking personal Web-based email

•   Despite a higher level of risky online behavior taking place, only about 50
    percent or fewer end users within SMB companies said they had an IT
    department.
•                                                                               perform
    *Results from 6/2/08 Trend Micro a study that explores computer users’ perceptions of and experiences with security threats.




                                                                                                                                   Intuit Confidential
Internal Threats – Wasted Productivity
• Inc. Magazine Study - More than half (52%) of the
  2,706 people surveyed admitted that their biggest
  distraction during work hours is surfing the Internet for
  personal use. Other distractions cited by respondents
  included socializing with co-workers (26.3%), running
  errands outside the office (7.6%) and spacing out
  (6.6%).
• The survey also found that older employees wasted
  less time at work than their younger counterparts.
  People born between 1950 and 1959 waste 0.68
  hours at work each day, while those born between
  1980 and 1985 admit they waste 1.95 hours.
                               perform


                                                    Intuit Confidential
Training and Security Policy
• Create a security policy
       – Internet Acceptable Use Policy
       – PC Security Protection
       – Handling/Dissemination of customer/company data

• Train employees on the company’s security policy



    Resources:


    BBB program: Security and Privacy – Made Simpler   perform
    FTC brochure: Protecting Personal Information: A Guide for Business


    Payment Cardholder Industry Data Security Standard: https://www.pcisecuritystandards.org/




9                                                                                   Intuit Confidential
Deploy Integrated Security Protection



     • Use packages that bundle protection for Conventional
       Threats:
        – Anti-Virus
        – Anti-Spyware
        – Anti-Spam

     • Lock Down QuickBooks Program Files
        – Any data store with confidential information needs
          protection

     • Keep protection current
                                              perform
        – Subscription
        – Vendor capability
             Adequate Protection Removes Security as a Top-of-Mind Concern



10                                                                           Intuit Confidential
Benefits of QuickBooks Enterprise
• QBES offers much more protection than Pro & Premier
   –   14 pre-defined roles
   –   Can control 115 functions within 11 functional areas
   –   Controlled access to specific lists/reports
   –   Controlled access to specific bank accounts
   –   Permissions Access by Users Report




                                     perform


                                                              Intuit Confidential
Protection Suites




              perform


12                       Intuit Confidential
Industry Recognition for Trend Micro


                               Product/Service
Business Recognition
                                 Recognition




Software Business
 Innovative SaaS
    Company




                          perform


                                             Intuit Confidential
Unique Advantages Vs. Key Competitors


                                                                 Standard/     Key Competitors
                            Features
                                                                Advanced 6.0    (SYMC, MFEE)


Smart Scan- New!                                                                    X
URL Filtering- New!                                                                 X
Web Threat Protection
                                                                                    X
                Intuit QuickBooks Protection                                        X
  Identifies vulnerable computers without latest Microsoft patches
                                                                                    X
  Automatically remove threats, repair system files,
        and remove threat files left behind                                         X
             and multiple products (for resellers) perform
  Support for a single console to manage multiple customers,
                                                                                    X
         Filter outbound IM content (ICQ) and mail
                                                                                    X
   Includes hosted mail filtering and integrated Exchange
           protection               and anti-spam               (Advanced)          X


                                                                                  Intuit Confidential
Recap
• Identified Security issues facing SMB
  – External
  – Internal
• Steps you can take to protect your business
  – Develop a training and security policy
  – Deploy integrated security protection
     • QBES vs. Pro/Premier
     • Trend Micro vs. other security products
• For more information contact:
  – QuickBooks Pro/Premier
     • www.quickbooks.com, Training and Learning, Find a Local
                                     perform
       Quickbooks Expert (to find a local Pro Advisor)
  – QuickBooks Enterprise
     • www.qbes.com, Support, Get Help (to find an Intuit Solutions
       Provider)



                                                               Intuit Confidential
Contact information



Jim Savage aka The QuickBooks Guy
          951-541-9205
     jim@thequickbooksguy.com
    www.thequickbooksguy.com




                  perform


                                    Intuit Confidential

Contenu connexe

Tendances

Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
 

Tendances (19)

Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Byod
ByodByod
Byod
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
Windows intune
Windows intuneWindows intune
Windows intune
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Mobile marketing meltdown
Mobile marketing meltdownMobile marketing meltdown
Mobile marketing meltdown
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working Together
 

Similaire à Security for QuickBooks and QuickBooks Enterprise

Secure Your Business 2009
Secure Your Business 2009Secure Your Business 2009
Secure Your Business 2009
RCioffi
 

Similaire à Security for QuickBooks and QuickBooks Enterprise (20)

Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Secure Your Business 2009
Secure Your Business 2009Secure Your Business 2009
Secure Your Business 2009
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
 

Plus de Scott K. Wilder

G+ partners hoa (10 24-2013)
G+ partners hoa (10 24-2013)G+ partners hoa (10 24-2013)
G+ partners hoa (10 24-2013)
Scott K. Wilder
 
Millennial Leaders - Pivot Conference 2010
Millennial Leaders - Pivot Conference 2010Millennial Leaders - Pivot Conference 2010
Millennial Leaders - Pivot Conference 2010
Scott K. Wilder
 
Social media and product dev process
Social media and product dev processSocial media and product dev process
Social media and product dev process
Scott K. Wilder
 
Data warehousing social media webinar v2 skw
Data warehousing social media webinar v2 skwData warehousing social media webinar v2 skw
Data warehousing social media webinar v2 skw
Scott K. Wilder
 

Plus de Scott K. Wilder (20)

MBO's Independent Workfroce 2015 Study
MBO's Independent Workfroce 2015 StudyMBO's Independent Workfroce 2015 Study
MBO's Independent Workfroce 2015 Study
 
Jam's class action procedures
Jam's class action proceduresJam's class action procedures
Jam's class action procedures
 
PWC Report on the Future of Work:
PWC Report on the Future of Work: PWC Report on the Future of Work:
PWC Report on the Future of Work:
 
G+ partners hoa (10 24-2013)
G+ partners hoa (10 24-2013)G+ partners hoa (10 24-2013)
G+ partners hoa (10 24-2013)
 
Hyper Social Recruiting
Hyper Social RecruitingHyper Social Recruiting
Hyper Social Recruiting
 
Millennial Leaders - Pivot Conference 2010
Millennial Leaders - Pivot Conference 2010Millennial Leaders - Pivot Conference 2010
Millennial Leaders - Pivot Conference 2010
 
Social media and product dev process
Social media and product dev processSocial media and product dev process
Social media and product dev process
 
Data warehousing social media webinar v2 skw
Data warehousing social media webinar v2 skwData warehousing social media webinar v2 skw
Data warehousing social media webinar v2 skw
 
Digital Crisis Management
Digital Crisis ManagementDigital Crisis Management
Digital Crisis Management
 
Snap shot of Generation Y
Snap shot of Generation YSnap shot of Generation Y
Snap shot of Generation Y
 
Diamonds in the Rough (Sentiment(al) Analysis
Diamonds in the Rough (Sentiment(al) AnalysisDiamonds in the Rough (Sentiment(al) Analysis
Diamonds in the Rough (Sentiment(al) Analysis
 
Social Media Dashboarding (reporting)
Social Media Dashboarding (reporting)Social Media Dashboarding (reporting)
Social Media Dashboarding (reporting)
 
Tapping into Employees Wisdom
Tapping into Employees WisdomTapping into Employees Wisdom
Tapping into Employees Wisdom
 
RUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis ManagementRUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis Management
 
Social Media 101: Facebook, LinkedIn, Twitter
Social Media 101: Facebook, LinkedIn, TwitterSocial Media 101: Facebook, LinkedIn, Twitter
Social Media 101: Facebook, LinkedIn, Twitter
 
SEO and Social Search on Facebook, LinkedIn, and Twitter
SEO and Social Search on Facebook, LinkedIn, and TwitterSEO and Social Search on Facebook, LinkedIn, and Twitter
SEO and Social Search on Facebook, LinkedIn, and Twitter
 
SEO and Social Search: Facebook, LinkedIn and Twitter
SEO and Social Search: Facebook, LinkedIn and TwitterSEO and Social Search: Facebook, LinkedIn and Twitter
SEO and Social Search: Facebook, LinkedIn and Twitter
 
How to measure Social Media ROI
How to measure Social Media ROIHow to measure Social Media ROI
How to measure Social Media ROI
 
Sole Proprietor and Accounting
Sole Proprietor and AccountingSole Proprietor and Accounting
Sole Proprietor and Accounting
 
A The Zero Sum Sales Receipt
A The Zero Sum Sales ReceiptA The Zero Sum Sales Receipt
A The Zero Sum Sales Receipt
 

Dernier

Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 

Dernier (20)

Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 

Security for QuickBooks and QuickBooks Enterprise

  • 1. Security for QuickBooks and QuickBooks Enterprise perform Jim Savage Certified QuickBooks Pro Advisor Intuit Solution Provider June 17, 2009 Intuit Community Expert Intuit Confidential
  • 2. Speaker Bio – Jim Savage •QB Certified Pro Advisor since 2002 •QB Enterprise Certified Pro Advisor •Intuit Solution Provider •Intuit Community Expert •Controller/CFO in private sector •IT Director up until 1999 for Fortune 500 company, networks, software development, PC technology •Specializes now in Small/Medium Size Businesses (SMB) perform Community Expert Intuit Confidential
  • 3. Agenda (Part 1) •Identify Security Issues Facing SMB •External •Spyware •Phishing •Viruses •Spam •Internal •Fraud •Risky Online Behavior •Wasted Productivity perform Intuit Confidential
  • 4. Agenda (Part 2) • Steps to Take to Protect Your Business • Develop a Training and Security Policy • Deploy Integrated Security Protection • QuickBooks Enterprise vs. Pro and Premier • Trend Micro vs. Other Security Products perform Intuit Confidential
  • 5. External Threats • Spyware – Spyware is a software application that monitors a user’s computing habits and personal information – This information is sent to third parties without the user’s authorization or knowledge. • Phishing – Phishing attacks aim to “fish” or obtain personal information or financial information. • Viruses – Viruses can corrupt or destroy data perform • Spam – Spam is a threat because it is a means for planting malware on user’s computers Intuit Confidential
  • 6. Internal Threats - Fraud • Fraud – Stealing Money or goods – Misusing Company Credit Card Accounts – Falsifying Checks or Payroll (Phantom Employees) – Bribes or Kickbacks – Embellishing Expense Accounts – Stealing or Selling Company Trade Secrets perform Protect Your Business from Fraud: Keep Your Financial Information Secure by Joe Woodard Intuit Confidential
  • 7. Internal Threats – Risky Online Behavior • More Likely to Happen in SMB* • Employees in SMB companies took more online risks while on the company network compared to their counterparts in larger organizations • Risky activities include: – Browsing Web sites unrelated to work – Making online purchases – Visiting social networking sites – Downloading executable files – Checking personal Web-based email • Despite a higher level of risky online behavior taking place, only about 50 percent or fewer end users within SMB companies said they had an IT department. • perform *Results from 6/2/08 Trend Micro a study that explores computer users’ perceptions of and experiences with security threats. Intuit Confidential
  • 8. Internal Threats – Wasted Productivity • Inc. Magazine Study - More than half (52%) of the 2,706 people surveyed admitted that their biggest distraction during work hours is surfing the Internet for personal use. Other distractions cited by respondents included socializing with co-workers (26.3%), running errands outside the office (7.6%) and spacing out (6.6%). • The survey also found that older employees wasted less time at work than their younger counterparts. People born between 1950 and 1959 waste 0.68 hours at work each day, while those born between 1980 and 1985 admit they waste 1.95 hours. perform Intuit Confidential
  • 9. Training and Security Policy • Create a security policy – Internet Acceptable Use Policy – PC Security Protection – Handling/Dissemination of customer/company data • Train employees on the company’s security policy Resources: BBB program: Security and Privacy – Made Simpler perform FTC brochure: Protecting Personal Information: A Guide for Business Payment Cardholder Industry Data Security Standard: https://www.pcisecuritystandards.org/ 9 Intuit Confidential
  • 10. Deploy Integrated Security Protection • Use packages that bundle protection for Conventional Threats: – Anti-Virus – Anti-Spyware – Anti-Spam • Lock Down QuickBooks Program Files – Any data store with confidential information needs protection • Keep protection current perform – Subscription – Vendor capability Adequate Protection Removes Security as a Top-of-Mind Concern 10 Intuit Confidential
  • 11. Benefits of QuickBooks Enterprise • QBES offers much more protection than Pro & Premier – 14 pre-defined roles – Can control 115 functions within 11 functional areas – Controlled access to specific lists/reports – Controlled access to specific bank accounts – Permissions Access by Users Report perform Intuit Confidential
  • 12. Protection Suites perform 12 Intuit Confidential
  • 13. Industry Recognition for Trend Micro Product/Service Business Recognition Recognition Software Business Innovative SaaS Company perform Intuit Confidential
  • 14. Unique Advantages Vs. Key Competitors Standard/ Key Competitors Features Advanced 6.0 (SYMC, MFEE) Smart Scan- New!  X URL Filtering- New!  X Web Threat Protection  X Intuit QuickBooks Protection  X Identifies vulnerable computers without latest Microsoft patches  X Automatically remove threats, repair system files, and remove threat files left behind  X and multiple products (for resellers) perform Support for a single console to manage multiple customers,  X Filter outbound IM content (ICQ) and mail  X Includes hosted mail filtering and integrated Exchange protection and anti-spam (Advanced) X Intuit Confidential
  • 15. Recap • Identified Security issues facing SMB – External – Internal • Steps you can take to protect your business – Develop a training and security policy – Deploy integrated security protection • QBES vs. Pro/Premier • Trend Micro vs. other security products • For more information contact: – QuickBooks Pro/Premier • www.quickbooks.com, Training and Learning, Find a Local perform Quickbooks Expert (to find a local Pro Advisor) – QuickBooks Enterprise • www.qbes.com, Support, Get Help (to find an Intuit Solutions Provider) Intuit Confidential
  • 16. Contact information Jim Savage aka The QuickBooks Guy 951-541-9205 jim@thequickbooksguy.com www.thequickbooksguy.com perform Intuit Confidential