• Schedule a Discovery Call
  • Client Portal
  • Blog
  • Schedule a Discovery Call
  • Client Portal
  • Blog
BOOKKEEP & PROSPER
  • Schedule a Discovery Call
  • Client Portal
  • Blog

Blog

Schedule Your Discovery Call

    Author

    Conner Schryver is the founder and CEO of Bookkeep & Prosper


    Picture
    This guide to the top 10 accounting mistakes and solutions is the launch board to getting your accounting on the right track.
    learn more

    Archives

    January 2025
    August 2023
    September 2022
    October 2020
    September 2020
    July 2020
    November 2019
    September 2019
    August 2019

    Categories

    All
    Accounting
    Outsourcing

    RSS Feed

Back to Blog

4 Steps to Military Grade Cyber Security

9/17/2019

 

Are your internet dealings secure? 

​Yes, you have antivirus? That’s great!

What about password protection and virtual private networks? Hard drive encryption? . . . ​Is your data safe?
​​

Picture
​Consider the following list of the top 5 largest data breaches as of July, 2019.
 
1. Yahoo: 3 billion accounts in 2013
2. Yahoo: 500 million accounts in 2014
3. Marriott/Starwood: 500 million guests in 2018
4. Friend Finder Networks: 412 million accounts in 2016
5. Equifax: 146 million accounts in 2017

​The truth is that in the age of internet, cyber security is of the utmost importance. Not only is it important for you to secure your data but if you share information with your vendors and outsourced business partners then you must ensure that they secure their data as well.

​To ensure military grade protection Bookkeep & Prosper uses a four-step protection method to protect not only our company’s information but also our client's.

Step 1: Anti-Virus

Picture
Anti-virus for your computer and internet is required to guard against, find, and eliminate malware. This software constantly monitors the websites you visit and regularly scans your computer to remove suspicious files. Files which could be designed to steal files, transmit key-strokes, and copy browser history. Installing an antivirus software is the first step to protecting your data.

Companies like Kaspersky, Norton, and others provide powerful antivirus suites. Review the available options and choose a software that meets your needs.

Step 2: Password Management

The next question to ask is what happens when your information is hacked? If you think you can be careful enough to protect your information remember that hackers will get your information from somewhere else. Consider that Yahoo! has been hacked multiple times giving up over 3 billion users information. Also Capital One, Equifax, Marriott, Home Depot, and the list goes on.

Password management software stores your passwords for you. This allows you to create much more complex passwords and to create a unique password for every account you have. In the case of a data breach by a company like Capital One any password stolen is the password for one account only. Using password management software is a crucial element of comprehensive cyber security.

Companies like Lastpass, Roboform, Dashlane, 1password, and Keeper Password offer powerful password management at various subscription and free levels.

Step 3: Virtual Private Network

Picture
A virtual private network is a software that redirects your internet access. Normally when you connect to the internet you first connect to your internet service provider or isp (see AT&T, Verizon, Comcast Xfinity, Time Warner Cable, etc.). Then your isp directs you to the website you requested. The issue with this is that all your information first passes through your isp and they have access to all the information passing between your computer and the website.

Now this doesn’t typically create issues when you are at home on your protected network but, if you enjoy accessing public wifi at places like starbucks you may be exposing your information to hackers.

​This is where the virtual private network comes in. It protects you from hackers trying to view your information while connected to the same internet service provider.

Step 4: Hard Drive Encryption

Imagine that somehow all your previous measures failed and your computer has been hacked. Now keep imagining but add this: the hacker can’t read your computer files . . . 

The final step to protecting your data in the event of a breach is to Encrypt your computer’s hard drive. Hard drive encryption uses complex mathematical functions to make files unreadable by anyone who does not have the encryption key. For the user or owner of the computer everything functions as normal but someone who steals your files will not be able to open or use them. 

Some computers like the newer Apple computers have this functionality included while others require a third party software like Symantec’s Encryption Desktop or BitLocker’s Encryption Desktop software.

Take Action

It may feel like just another chore but it’s an important one. First make sure that you are utilizing cyber security best practices. After you have secured your own company follow up with your vendors to find out how they are protecting your data. If they don’t have an answer for you it may be time to find help elsewhere.

Bookkeep & Prosper

Picture
Here at Bookkeep & Prosper we specialize in outsourced remote bookkeeping with services starting at $315 per month. Response time is guaranteed with 36 hours or the next month of service is free. We take cyber security seriously using military grade systems for anti-virus, data encryption, and password management. Each month after closing out your books we will review the financial statements including the Income Statement, Balance Sheet, and Statement of Cash Flows so that you have a clear view of how your business is performing. If you do not yet have budget and budget review as a standard part of your business then we will work to create a budget over the course of the first year of service.

If you are reading this article then you want to get serious about your books. Why not start today by scheduling an introductory phone call with me, Conner Schryver, and see if Bookkeep & Prosper is a good fit for your company.

Schedule Your Free Call
2 Comments
Read More
Jason Jensen link
11/12/2022 06:46:32 pm

Popular admit threat question. Follow next card than area attorney half summer.
Indeed ago standard simple positive.

Reply
Addie F link
11/10/2024 10:23:04 am

Thhis is great

Reply



Leave a Reply.