The Cloud Accounting Blog
-Simplify, Techify, Solve-
Loads of useful information and advice for your business.
Resources to create respectful client relationships, learn best practices, vet applications and general cloud knowledge.
Client Engagement - Cloud Security - Cloud Technology - Efficiency - Marketing - Musings - QuickBooks Online
What Are Your Security Holes?
Cyber threats lurk where we least expect. Uncover your security blind spots and safeguard what matters most.
Eight Key Security Elements To Look For In Your Cloud Applications
Discover the essential security elements to look for in cloud applications: bank-level encryption, DDoS prevention, data storage locations, internal security policies, login/logout options, SOC2 compliance, and user permissions. Protect your business and client data by ensuring these key features are in place.
Secure Your Cloud Applications - Best Practices for Data Protection
Many businesses have converted their apps and software to cloud-based ones, and robust data protection measures are more critical than ever. Whether you're an accountant, bookkeeper, or business owner, these strategies will help you confidently navigate the complexities of cloud security.
Is Your Password Manager Secure?
There is simply nothing that is 100% security-proof. The baddies are constantly upping their nefarity; you will be compromised sooner or later. Nothing is foolproof, but you need not be a fool about how you manage your passwords.
Create a Safe Word for Your Business - Right Now
Create a safe word - or whatever you want to call it - passphrase, secret code, secret word, security phrase…
Do it right now.
Protect Your Mobile Devices - Six Lessons Learned From A Stolen Phone Adventure
In September, amidst the joy of celebrating a wedding in Ireland, my husband and I encountered a hiccup: his phone was stolen. As we navigated through the aftermath, we gleaned valuable insights that I'd like to share with you to safeguard your devices and data. Here are six key lessons learned from our stolen phone adventure.
Email Myths and Misconceptions - Part Three
This is part three in a three-part series, I talked about the misconceptions of email campaigns that can lead to ineffective strategies or missed opportunities.
Part One focused on using email campaigns, Part Two looked at deliverability, and Part Three is about maintaining good email campaign health.
Securing Your Social Media - For The Sake Of You And Others
Securing your social media accounts is not just for your benefit; it’s for the benefit of everyone around you. Tight security allows you to feel comfortable joining all the fantastic Groups that give so much joy to our lives, knowing you have done your darndest to safeguard others in them.
Email Myths and Misconceptions - Part Two
In a three-part series, I will run through several misconceptions about email campaigns that can lead to ineffective strategies or missed opportunities. Part One focused on using email campaigns, today - Part Two - looks at deliverability, and Part Three will be about maintaining good email campaign health.
Email Myths and Misconceptions - Part One
In a three-part series, I will run through several misconceptions about email campaigns that can lead to ineffective strategies or missed opportunities. Today in Part One, we focus on using email campaigns.
DDoS Prevention and Mitigation
What the what is DDoS!? And why you should care.
A DDoS attack is like an unexpected traffic jam clogging up the digital highway, preventing regular traffic from arriving at its destination.
Seven Simple Systems For Security Strength
Let’s wade through what are the systems you can implement right now. And to engage your team and clients in the processes, ensure they understand the “why” of your systems.
Accessing Apps When You Don’t Have Your 2FA Authenticator - Using 2FA Backup Codes
I recently realized that not everyone knows about app-generated, copy/paste 2FA back up codes.
I was posting about sharing 2FA codes with team members in my FBGroup and an inquiry came up asking what these wee bits of magical security are (the inquirer didn’t call them “wee bits of magical security”, that’s all me). I couldn’t find a good article to reply with about them that wasn’t app-specific.
So I decided a quick overview - right here, right now - was in order.
Going All In on a Password Manager App
"If you aren’t going all the way, why go at all?"- Joe Nameth
I have chatted before about back-ups, data location redundancy and internet security. Some of you may have listened to me go on about the need to adopt a cloud security policy and communicating it - some of you have done my workshop on it.
Cloud Data Location Redundancy
I can’t stress enough the importance of backing up your cloud data and implementing 3 location redundancy
“Redundancy for the sake of redundancy was my salvation.”
In 2005 my business was in a building that suffered a fire, and it burned to the ground.
I was already on my way to internet-based file management but more importantly, I was practicing 3 location data redundancy.
It was my saving grace for having my business up and running the next day, and client files intact.