Our challenge was how to securely interconnect 52 locations in seven countries to improve collaboration across the enterprise while insuring the integrity and security of the information we needed to share to support our growth. These locations had pretty good security measures by themselves, but these tended to be isolated from their counterparts. Our solution has been to adopt a worldwide networking scheme utilizing dynamic point-to-point VPN tunnels across the public Internet. This scheme provides for all inter-location traffic to be fully encrypted between any two locations while being transparent to our user community. Lindsey Mundy
Like what you see? Click here to sign up for Accounting Today's daily newsletter to get the latest news and behind the scenes commentary you won't find anywhere else.
Ours is far and away spam. Our biggest problem is the whitelist/blacklist filtering software. We have many cases of unauthorized messages coming in and even more cases of authorized messages being blocked. The system never seems to get it correct on a consistent basis. We're thinking of scrapping the I Hate Spam system for the features in Outlook 2003.
Bryan L. Wilton, CPA, CITP
InterDyn Progressive Group
I would have to say Spyware/Phishing/Pharming, as they can bypass current security by attacking social engineering. We are educating users, upgrading patching software, implementing Norton Corporate 10.0 when it comes out, and evaluating other options that are available.
Yeo & Yeo Computer
The biggest concern is how do we or our clients provide access at the right time to the right people without opening up too much access or access to malicious people? Particularly with the ERP software we sell and implement clients want to provide access to data based on roles. Certain roles need to access certain data, reports or files. But, providing that access to the right people on the network or web site is becoming harder and harder as IT is required to lock down more and more and also comply with Sarbanes-Oxley.
Not to be flip about it, but I can't say. We have some hundreds of pounds of very sensitive data that we will have to physically destroy. We will probably burn the data to personally ensure its complete destruction. However, we do have issues with anti-virus, firewalls, and spam. The biggest time waster is spam, and we plan to purchase a hardware appliance to sit between the Internet and us to cut it down.
Precision Computer Methods
West Chicago, Ill.
Accounting Technology July's Coming Attractions|
Back to the Web
Remember Internet-based applications and how they were going to change the world? There are indications that Web-based packages are gaining more acceptance.
Tax Software Preview
Professional tax preparers are already looking at the features of the packages that they will be using during the 2006 tax season. This article looks at the key developments in the leading tax software titles.
Conference, trade shows, user-group meetings? Whether they are large or small in attendance, these tools are a big part of many successful marketing campaigns.
Not-for-profit and governmental organizations remain fertile ground for accounting professionals. What technology needs are these bodies seeking to answer?
Online Payroll Review
The Web makes entering payroll data a lot easier. Here are the vendors and the products who are changing how payroll is done.
Frankly, the biggest challenge is getting our clients to understand the scope of the problem. It is difficult to overcome their apathy.
Richard Paul Thomas
Viruses are the biggest technology security issue that we need to deal with today. Before the prevalence of the Internet, users could control their virus risk because at that time, viruses were brought about by internal activities, such as copying files from floppy disks and installing software from this medium. These days, viruses are spread through email and web sites; users do not know when they are at heightened risk. Anti-virus programs are effective, but they have limitations, as the development of their ability to stop viruses follows the introduction of new virus signatures. We have circumvented this problem, to a large extent, by using a hosted desktop/server solution.
One of the major issues that I have found facing organizations today is the ability of their IT departments to maintain a high enough degree of security knowledge. It is not that they do not want to. It is because there is no time and there is so much information to disseminate. They need outside help. It is more cost-effective for an IT department to manage a deployed security strategy, than to research, discover, educate, certify, and then deploy. This gives them the ability to manage the exceptions and breaches, instead of the day-to-day documentation of every security transaction.
Don Reeves Jr.
SCSI Business Solutions