Safety and Cloud-Based Accounting Software

By Kevin Stewart
Updated: September 29, 2011

Safety and Cloud-Based Accounting Software

Cloud computing is becoming the standard delivery mode for most enterprise software applications. While security is a consideration for any application, it is particularly important for accounting software. The major areas to consider when evaluating cloud computing accounting applications are:

•         Identity management
•         Application security
•         Data security
•         Privacy protection

Any cloud computing vendor should be able to provide satisfactory answers to questions regarding each of these security requirements.

Managing identities within cloud computing

Identity management controls access to the system that holds your data. In some cases the application provider will supply the identity management, or you can use your own identity management data through single sign-on (SSO) or other user authentication techniques. It is important to maintain appropriate security levels through standards for password length, complexity, and expiration.

Securing applications in the cloud

Application providers must create secure areas for their clients to store and manage their data. Usually firewalls are used to prevent unauthorized users from seeing or manipulating data that does not belong to them. Make sure that your provider has the appropriate controls in place to segregate and protect your data. Usually there are firewall specifications or other protections that vendors can provide to establish that adequate protections are in place.

Promoting data security in hosted applications

Data redundancy and backup are just as important in cloud computing as any other software environment. Accounting application providers should definitely have adequate backup procedures in place to handle your critical data. Ask for evidence of backup and restore procedures, and test these procedures on a regular basis. Also, it is a good idea to maintain your own backup data in a secure location.

Protecting privacy for users in hosted environments

Most accounting applications provide ways to mask critical customer data, such as account numbers, credit card numbers, birth dates, etc. Access to unmasked data should be restricted to only top level administrators who should have access to that information. You can review with your service provider how data privacy is controlled and protected in their application, and verify that their procedures meet the appropriate standards for privacy.

Using cloud computing for accounting systems does not present a different security risk from using any other type of hosted software. But there are certain controls and standards that must be met by vendors who offer accounting services in their hosted environments. Make sure that you investigate the security requirements listed above, and that you can establish that your data and application environment are adequately protected.


 

Featured Research
  • How to Buy an ERP Solution

    Congratulations on making the decision to beginning the process to research and ultimately purchase an ERP solution for your business. Studies have shown that through accurate information about daily operations, companies can make decisions that reduce operational costs by as much as 23% AND administrative costs by 22%. more

  • The Future of ERP

    Today's business decisions are data-driven and the difference between success and failure can be boiled down to utilizing the correct data. Now more than ever, companies have access to not only robust data but consumable data as well, through Enterprise Resource Planning (ERP) software. more

  • Top ERP Trends of 2017

    No matter the size, success or industry in which you do business, data is vital. Because of this, data-driven technologies such as Enterprise Resource Planning (ERP) systems are becoming more important for the streamlining of quantitative data and gaining/analyzing key insights. Even better, as of 2017, ERP tools aren’t only for enterprise companies in the manufacturing and distribution sectors—they’re for everyone. But that’s not the only keynote change that’s taken place this year … Download our latest guide to see what else is happening with ERP! more

  • Making a Business Case for ERP

    Are you in the market for an ERP solution but hesitant to purchase due to the potential financial risks associated with implementing such a tool? While costs may seem prohibitive, and make it difficult to get stakeholders on board, an ERP system can add SIGNIFICANT value to your organization, regardless of what industry you are in. more

  • CIO eGuide

    Data is becoming increasingly important in business. As a result, more and more organizations are becoming attractive targets for hackers. Data breaches caused by stolen credentials are on the rise. You need smarter tools to protect your organization against the monetary and reputational damage caused by a data breach. This guide will explain how Okta Adaptive Multifactor Authentication (MFA) provides the security that IT needs, while also providing the simplicity end users want. more