SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Security for
                           QuickBooks and
                             QuickBooks
                              Enterprise




                                   perform
          Jim Savage
Certified QuickBooks Pro Advisor
    Intuit Solution Provider
                                             June 17, 2009
   Intuit Community Expert

                                                    Intuit Confidential
Speaker Bio – Jim Savage
•QB Certified Pro Advisor since 2002
•QB Enterprise Certified Pro Advisor
•Intuit Solution Provider
•Intuit Community Expert
•Controller/CFO in private sector
•IT Director up until 1999 for Fortune 500 company,
networks, software development, PC technology
•Specializes now in Small/Medium Size Businesses (SMB)



                                perform
                                           Community Expert




                                                        Intuit Confidential
Agenda (Part 1)


•Identify Security Issues Facing SMB
   •External
      •Spyware
      •Phishing
      •Viruses
      •Spam
   •Internal
      •Fraud
      •Risky Online Behavior
      •Wasted Productivity
                               perform


                                         Intuit Confidential
Agenda (Part 2)


• Steps to Take to Protect Your Business
   • Develop a Training and Security Policy
   • Deploy Integrated Security Protection
       • QuickBooks Enterprise vs. Pro and Premier
       • Trend Micro vs. Other Security Products




                                          perform


                                                     Intuit Confidential
External Threats


•   Spyware
    – Spyware is a software application that monitors a
      user’s computing habits and personal information
    – This information is sent to third parties without the
      user’s authorization or knowledge.
•   Phishing
    – Phishing attacks aim to “fish” or obtain personal
      information or financial information.
•   Viruses
    – Viruses can corrupt or destroy data
                                 perform
•   Spam
    – Spam is a threat because it is a means for planting
      malware on user’s computers

                                                       Intuit Confidential
Internal Threats - Fraud
• Fraud
  – Stealing Money or goods
  – Misusing Company Credit Card Accounts
  – Falsifying Checks or Payroll (Phantom
    Employees)
  – Bribes or Kickbacks
  – Embellishing Expense Accounts
  – Stealing or Selling Company Trade Secrets

                                         perform
 Protect Your Business from Fraud: Keep Your Financial Information Secure by
 Joe Woodard




                                                                     Intuit Confidential
Internal Threats – Risky Online Behavior

•   More Likely to Happen in SMB*

•   Employees in SMB companies took more online risks while on the company
    network compared to their counterparts in larger organizations

•   Risky activities include:
      –    Browsing Web sites unrelated to work
      –    Making online purchases
      –    Visiting social networking sites
      –    Downloading executable files
      –    Checking personal Web-based email

•   Despite a higher level of risky online behavior taking place, only about 50
    percent or fewer end users within SMB companies said they had an IT
    department.
•                                                                               perform
    *Results from 6/2/08 Trend Micro a study that explores computer users’ perceptions of and experiences with security threats.




                                                                                                                                   Intuit Confidential
Internal Threats – Wasted Productivity
• Inc. Magazine Study - More than half (52%) of the
  2,706 people surveyed admitted that their biggest
  distraction during work hours is surfing the Internet for
  personal use. Other distractions cited by respondents
  included socializing with co-workers (26.3%), running
  errands outside the office (7.6%) and spacing out
  (6.6%).
• The survey also found that older employees wasted
  less time at work than their younger counterparts.
  People born between 1950 and 1959 waste 0.68
  hours at work each day, while those born between
  1980 and 1985 admit they waste 1.95 hours.
                               perform


                                                    Intuit Confidential
Training and Security Policy
• Create a security policy
       – Internet Acceptable Use Policy
       – PC Security Protection
       – Handling/Dissemination of customer/company data

• Train employees on the company’s security policy



    Resources:


    BBB program: Security and Privacy – Made Simpler   perform
    FTC brochure: Protecting Personal Information: A Guide for Business


    Payment Cardholder Industry Data Security Standard: https://www.pcisecuritystandards.org/




9                                                                                   Intuit Confidential
Deploy Integrated Security Protection



     • Use packages that bundle protection for Conventional
       Threats:
        – Anti-Virus
        – Anti-Spyware
        – Anti-Spam

     • Lock Down QuickBooks Program Files
        – Any data store with confidential information needs
          protection

     • Keep protection current
                                              perform
        – Subscription
        – Vendor capability
             Adequate Protection Removes Security as a Top-of-Mind Concern



10                                                                           Intuit Confidential
Benefits of QuickBooks Enterprise
• QBES offers much more protection than Pro & Premier
   –   14 pre-defined roles
   –   Can control 115 functions within 11 functional areas
   –   Controlled access to specific lists/reports
   –   Controlled access to specific bank accounts
   –   Permissions Access by Users Report




                                     perform


                                                              Intuit Confidential
Protection Suites




              perform


12                       Intuit Confidential
Industry Recognition for Trend Micro


                               Product/Service
Business Recognition
                                 Recognition




Software Business
 Innovative SaaS
    Company




                          perform


                                             Intuit Confidential
Unique Advantages Vs. Key Competitors


                                                                 Standard/     Key Competitors
                            Features
                                                                Advanced 6.0    (SYMC, MFEE)


Smart Scan- New!                                                                    X
URL Filtering- New!                                                                 X
Web Threat Protection
                                                                                    X
                Intuit QuickBooks Protection                                        X
  Identifies vulnerable computers without latest Microsoft patches
                                                                                    X
  Automatically remove threats, repair system files,
        and remove threat files left behind                                         X
             and multiple products (for resellers) perform
  Support for a single console to manage multiple customers,
                                                                                    X
         Filter outbound IM content (ICQ) and mail
                                                                                    X
   Includes hosted mail filtering and integrated Exchange
           protection               and anti-spam               (Advanced)          X


                                                                                  Intuit Confidential
Recap
• Identified Security issues facing SMB
  – External
  – Internal
• Steps you can take to protect your business
  – Develop a training and security policy
  – Deploy integrated security protection
     • QBES vs. Pro/Premier
     • Trend Micro vs. other security products
• For more information contact:
  – QuickBooks Pro/Premier
     • www.quickbooks.com, Training and Learning, Find a Local
                                     perform
       Quickbooks Expert (to find a local Pro Advisor)
  – QuickBooks Enterprise
     • www.qbes.com, Support, Get Help (to find an Intuit Solutions
       Provider)



                                                               Intuit Confidential
Contact information



Jim Savage aka The QuickBooks Guy
          951-541-9205
     jim@thequickbooksguy.com
    www.thequickbooksguy.com




                  perform


                                    Intuit Confidential

Weitere ähnliche Inhalte

Was ist angesagt?

Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Securityeircom
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iotCaston Thomas
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
 
Mobile marketing meltdown
Mobile marketing meltdownMobile marketing meltdown
Mobile marketing meltdownMobile March
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...Agora Group
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working TogetherCarahsoft
 

Was ist angesagt? (19)

Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Byod
ByodByod
Byod
 
eircom Managed Security
eircom Managed Securityeircom Managed Security
eircom Managed Security
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
Windows intune
Windows intuneWindows intune
Windows intune
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
Laptop management
Laptop managementLaptop management
Laptop management
 
Mobile marketing meltdown
Mobile marketing meltdownMobile marketing meltdown
Mobile marketing meltdown
 
How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...How can maximize your storage capabilities by using IBM backup & restore solu...
How can maximize your storage capabilities by using IBM backup & restore solu...
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working Together
 

Ähnlich wie Security for QuickBooks and QuickBooks Enterprise

Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolioPatrick Bouillaud
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity nado-web
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIBM Security
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with WatsonSylvia Low
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingSPI Conference
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Security For Free
Security For FreeSecurity For Free
Security For Freegwarden
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseShwetank Jayaswal
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
Secure Your Business 2009
Secure Your Business 2009Secure Your Business 2009
Secure Your Business 2009RCioffi
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceChristopher Gerritz
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM Security
 

Ähnlich wie Security for QuickBooks and QuickBooks Enterprise (20)

Ibm security products portfolio
Ibm security products  portfolioIbm security products  portfolio
Ibm security products portfolio
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
MaaS360 with Watson
MaaS360 with WatsonMaaS360 with Watson
MaaS360 with Watson
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Security For Free
Security For FreeSecurity For Free
Security For Free
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Secure Your Business 2009
Secure Your Business 2009Secure Your Business 2009
Secure Your Business 2009
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence QuarterlyIBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
IBM X-Force: Insights from the 1Q 2015 X-Force Threat Intelligence Quarterly
 

Mehr von Scott K. Wilder

MBO's Independent Workfroce 2015 Study
MBO's Independent Workfroce 2015 StudyMBO's Independent Workfroce 2015 Study
MBO's Independent Workfroce 2015 StudyScott K. Wilder
 
Jam's class action procedures
Jam's class action proceduresJam's class action procedures
Jam's class action proceduresScott K. Wilder
 
PWC Report on the Future of Work:
PWC Report on the Future of Work: PWC Report on the Future of Work:
PWC Report on the Future of Work: Scott K. Wilder
 
G+ partners hoa (10 24-2013)
G+ partners hoa (10 24-2013)G+ partners hoa (10 24-2013)
G+ partners hoa (10 24-2013)Scott K. Wilder
 
Millennial Leaders - Pivot Conference 2010
Millennial Leaders - Pivot Conference 2010Millennial Leaders - Pivot Conference 2010
Millennial Leaders - Pivot Conference 2010Scott K. Wilder
 
Social media and product dev process
Social media and product dev processSocial media and product dev process
Social media and product dev processScott K. Wilder
 
Data warehousing social media webinar v2 skw
Data warehousing social media webinar v2 skwData warehousing social media webinar v2 skw
Data warehousing social media webinar v2 skwScott K. Wilder
 
Digital Crisis Management
Digital Crisis ManagementDigital Crisis Management
Digital Crisis ManagementScott K. Wilder
 
Snap shot of Generation Y
Snap shot of Generation YSnap shot of Generation Y
Snap shot of Generation YScott K. Wilder
 
Diamonds in the Rough (Sentiment(al) Analysis
Diamonds in the Rough (Sentiment(al) AnalysisDiamonds in the Rough (Sentiment(al) Analysis
Diamonds in the Rough (Sentiment(al) AnalysisScott K. Wilder
 
Social Media Dashboarding (reporting)
Social Media Dashboarding (reporting)Social Media Dashboarding (reporting)
Social Media Dashboarding (reporting)Scott K. Wilder
 
Tapping into Employees Wisdom
Tapping into Employees WisdomTapping into Employees Wisdom
Tapping into Employees WisdomScott K. Wilder
 
RUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis ManagementRUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis ManagementScott K. Wilder
 
Social Media 101: Facebook, LinkedIn, Twitter
Social Media 101: Facebook, LinkedIn, TwitterSocial Media 101: Facebook, LinkedIn, Twitter
Social Media 101: Facebook, LinkedIn, TwitterScott K. Wilder
 
SEO and Social Search on Facebook, LinkedIn, and Twitter
SEO and Social Search on Facebook, LinkedIn, and TwitterSEO and Social Search on Facebook, LinkedIn, and Twitter
SEO and Social Search on Facebook, LinkedIn, and TwitterScott K. Wilder
 
SEO and Social Search: Facebook, LinkedIn and Twitter
SEO and Social Search: Facebook, LinkedIn and TwitterSEO and Social Search: Facebook, LinkedIn and Twitter
SEO and Social Search: Facebook, LinkedIn and TwitterScott K. Wilder
 
How to measure Social Media ROI
How to measure Social Media ROIHow to measure Social Media ROI
How to measure Social Media ROIScott K. Wilder
 
Sole Proprietor and Accounting
Sole Proprietor and AccountingSole Proprietor and Accounting
Sole Proprietor and AccountingScott K. Wilder
 
A The Zero Sum Sales Receipt
A The Zero Sum Sales ReceiptA The Zero Sum Sales Receipt
A The Zero Sum Sales ReceiptScott K. Wilder
 

Mehr von Scott K. Wilder (20)

MBO's Independent Workfroce 2015 Study
MBO's Independent Workfroce 2015 StudyMBO's Independent Workfroce 2015 Study
MBO's Independent Workfroce 2015 Study
 
Jam's class action procedures
Jam's class action proceduresJam's class action procedures
Jam's class action procedures
 
PWC Report on the Future of Work:
PWC Report on the Future of Work: PWC Report on the Future of Work:
PWC Report on the Future of Work:
 
G+ partners hoa (10 24-2013)
G+ partners hoa (10 24-2013)G+ partners hoa (10 24-2013)
G+ partners hoa (10 24-2013)
 
Hyper Social Recruiting
Hyper Social RecruitingHyper Social Recruiting
Hyper Social Recruiting
 
Millennial Leaders - Pivot Conference 2010
Millennial Leaders - Pivot Conference 2010Millennial Leaders - Pivot Conference 2010
Millennial Leaders - Pivot Conference 2010
 
Social media and product dev process
Social media and product dev processSocial media and product dev process
Social media and product dev process
 
Data warehousing social media webinar v2 skw
Data warehousing social media webinar v2 skwData warehousing social media webinar v2 skw
Data warehousing social media webinar v2 skw
 
Digital Crisis Management
Digital Crisis ManagementDigital Crisis Management
Digital Crisis Management
 
Snap shot of Generation Y
Snap shot of Generation YSnap shot of Generation Y
Snap shot of Generation Y
 
Diamonds in the Rough (Sentiment(al) Analysis
Diamonds in the Rough (Sentiment(al) AnalysisDiamonds in the Rough (Sentiment(al) Analysis
Diamonds in the Rough (Sentiment(al) Analysis
 
Social Media Dashboarding (reporting)
Social Media Dashboarding (reporting)Social Media Dashboarding (reporting)
Social Media Dashboarding (reporting)
 
Tapping into Employees Wisdom
Tapping into Employees WisdomTapping into Employees Wisdom
Tapping into Employees Wisdom
 
RUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis ManagementRUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis Management
 
Social Media 101: Facebook, LinkedIn, Twitter
Social Media 101: Facebook, LinkedIn, TwitterSocial Media 101: Facebook, LinkedIn, Twitter
Social Media 101: Facebook, LinkedIn, Twitter
 
SEO and Social Search on Facebook, LinkedIn, and Twitter
SEO and Social Search on Facebook, LinkedIn, and TwitterSEO and Social Search on Facebook, LinkedIn, and Twitter
SEO and Social Search on Facebook, LinkedIn, and Twitter
 
SEO and Social Search: Facebook, LinkedIn and Twitter
SEO and Social Search: Facebook, LinkedIn and TwitterSEO and Social Search: Facebook, LinkedIn and Twitter
SEO and Social Search: Facebook, LinkedIn and Twitter
 
How to measure Social Media ROI
How to measure Social Media ROIHow to measure Social Media ROI
How to measure Social Media ROI
 
Sole Proprietor and Accounting
Sole Proprietor and AccountingSole Proprietor and Accounting
Sole Proprietor and Accounting
 
A The Zero Sum Sales Receipt
A The Zero Sum Sales ReceiptA The Zero Sum Sales Receipt
A The Zero Sum Sales Receipt
 

Kürzlich hochgeladen

Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 

Kürzlich hochgeladen (20)

Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 

Security for QuickBooks and QuickBooks Enterprise

  • 1. Security for QuickBooks and QuickBooks Enterprise perform Jim Savage Certified QuickBooks Pro Advisor Intuit Solution Provider June 17, 2009 Intuit Community Expert Intuit Confidential
  • 2. Speaker Bio – Jim Savage •QB Certified Pro Advisor since 2002 •QB Enterprise Certified Pro Advisor •Intuit Solution Provider •Intuit Community Expert •Controller/CFO in private sector •IT Director up until 1999 for Fortune 500 company, networks, software development, PC technology •Specializes now in Small/Medium Size Businesses (SMB) perform Community Expert Intuit Confidential
  • 3. Agenda (Part 1) •Identify Security Issues Facing SMB •External •Spyware •Phishing •Viruses •Spam •Internal •Fraud •Risky Online Behavior •Wasted Productivity perform Intuit Confidential
  • 4. Agenda (Part 2) • Steps to Take to Protect Your Business • Develop a Training and Security Policy • Deploy Integrated Security Protection • QuickBooks Enterprise vs. Pro and Premier • Trend Micro vs. Other Security Products perform Intuit Confidential
  • 5. External Threats • Spyware – Spyware is a software application that monitors a user’s computing habits and personal information – This information is sent to third parties without the user’s authorization or knowledge. • Phishing – Phishing attacks aim to “fish” or obtain personal information or financial information. • Viruses – Viruses can corrupt or destroy data perform • Spam – Spam is a threat because it is a means for planting malware on user’s computers Intuit Confidential
  • 6. Internal Threats - Fraud • Fraud – Stealing Money or goods – Misusing Company Credit Card Accounts – Falsifying Checks or Payroll (Phantom Employees) – Bribes or Kickbacks – Embellishing Expense Accounts – Stealing or Selling Company Trade Secrets perform Protect Your Business from Fraud: Keep Your Financial Information Secure by Joe Woodard Intuit Confidential
  • 7. Internal Threats – Risky Online Behavior • More Likely to Happen in SMB* • Employees in SMB companies took more online risks while on the company network compared to their counterparts in larger organizations • Risky activities include: – Browsing Web sites unrelated to work – Making online purchases – Visiting social networking sites – Downloading executable files – Checking personal Web-based email • Despite a higher level of risky online behavior taking place, only about 50 percent or fewer end users within SMB companies said they had an IT department. • perform *Results from 6/2/08 Trend Micro a study that explores computer users’ perceptions of and experiences with security threats. Intuit Confidential
  • 8. Internal Threats – Wasted Productivity • Inc. Magazine Study - More than half (52%) of the 2,706 people surveyed admitted that their biggest distraction during work hours is surfing the Internet for personal use. Other distractions cited by respondents included socializing with co-workers (26.3%), running errands outside the office (7.6%) and spacing out (6.6%). • The survey also found that older employees wasted less time at work than their younger counterparts. People born between 1950 and 1959 waste 0.68 hours at work each day, while those born between 1980 and 1985 admit they waste 1.95 hours. perform Intuit Confidential
  • 9. Training and Security Policy • Create a security policy – Internet Acceptable Use Policy – PC Security Protection – Handling/Dissemination of customer/company data • Train employees on the company’s security policy Resources: BBB program: Security and Privacy – Made Simpler perform FTC brochure: Protecting Personal Information: A Guide for Business Payment Cardholder Industry Data Security Standard: https://www.pcisecuritystandards.org/ 9 Intuit Confidential
  • 10. Deploy Integrated Security Protection • Use packages that bundle protection for Conventional Threats: – Anti-Virus – Anti-Spyware – Anti-Spam • Lock Down QuickBooks Program Files – Any data store with confidential information needs protection • Keep protection current perform – Subscription – Vendor capability Adequate Protection Removes Security as a Top-of-Mind Concern 10 Intuit Confidential
  • 11. Benefits of QuickBooks Enterprise • QBES offers much more protection than Pro & Premier – 14 pre-defined roles – Can control 115 functions within 11 functional areas – Controlled access to specific lists/reports – Controlled access to specific bank accounts – Permissions Access by Users Report perform Intuit Confidential
  • 12. Protection Suites perform 12 Intuit Confidential
  • 13. Industry Recognition for Trend Micro Product/Service Business Recognition Recognition Software Business Innovative SaaS Company perform Intuit Confidential
  • 14. Unique Advantages Vs. Key Competitors Standard/ Key Competitors Features Advanced 6.0 (SYMC, MFEE) Smart Scan- New!  X URL Filtering- New!  X Web Threat Protection  X Intuit QuickBooks Protection  X Identifies vulnerable computers without latest Microsoft patches  X Automatically remove threats, repair system files, and remove threat files left behind  X and multiple products (for resellers) perform Support for a single console to manage multiple customers,  X Filter outbound IM content (ICQ) and mail  X Includes hosted mail filtering and integrated Exchange protection and anti-spam (Advanced) X Intuit Confidential
  • 15. Recap • Identified Security issues facing SMB – External – Internal • Steps you can take to protect your business – Develop a training and security policy – Deploy integrated security protection • QBES vs. Pro/Premier • Trend Micro vs. other security products • For more information contact: – QuickBooks Pro/Premier • www.quickbooks.com, Training and Learning, Find a Local perform Quickbooks Expert (to find a local Pro Advisor) – QuickBooks Enterprise • www.qbes.com, Support, Get Help (to find an Intuit Solutions Provider) Intuit Confidential
  • 16. Contact information Jim Savage aka The QuickBooks Guy 951-541-9205 jim@thequickbooksguy.com www.thequickbooksguy.com perform Intuit Confidential