Preventing Data Theft in QuickBooks

Data breaches of personal information increased dramatically over the past several years. You’ve probably read about–or perhaps experienced first-hand–what happens when major corporate entities like Target and Home Depot get hacked.

As a small business owner, your customers trust you enough to provide you with private information like email addresses and credit card numbers. And while you may not have hundreds of thousands of customer information files, it’s still possible to be targeted by external hackers or even your own employees.

Are you taking the necessary measures to ensure that the data stored on your hard drive and/or in the cloud is protected?

Your Inner Circle

The last thing you want to imagine is that one of your own employees has been tampering with your QuickBooks company data. It happens, though, and you need to protect yourself from potential internal attacks.

One of your internal controls, then, should include the establishment of boundaries for every employee who has access to QuickBooks. You can restrict each staff member to specific areas of the program instead of sharing a master password and giving everyone free rein. Go toCompany | Set Up Users and Passwords | Set Up Users to do this.


Figure 1: If you click on Selective Access in this window, you can restrict your employees’ activities to specific areas and actions.

The User List window opens, which will display all users who have been set up already, including you as the Admin. Click Add User and enter a name and password. Click the box in front of Add this user to my QuickBooks license, then click Next. Click on the button in front ofSelected areas of QuickBooks. Click Next.

The next 10 screens break QuickBooks down into separate activities and activity areas, like Sales and Accounts Receivable, Checking and Credit Cards, and Sensitive Accounting Activities. On each screen, click on the button in front of the correct option:

    • No Access

 

  • Full Access

 

  • Selective Access (lets you specify what areas and actions will be allowed for that employee)

Other Internal Controls

QuickBooks’ Audit Trail is your friend. It records everything that is entered or changed in the software, by whom, and precisely when. To view it, open the Reports menu, then click on Accountant & Taxes, then Audit Trail. Like all QuickBooks reports, it can be customized to display the entries you need to see.


Figure 2: QuickBooks’ Audit Trail provides a detailed history of all activity in the software.

There are other reports that you should review frequently, and some that we should create and analyze for you at least every quarter if not monthly. We can suggest reports that would help you look for fraud and tell you what to look for.

Common Sense Practices

  • It goes without saying that protecting your entire hardware/software/cloud configuration will help keep your QuickBooks company file safe from external marauders. You must employ state-of-the-art antivirus and anti-malware applications and keep them updated. Talk to us if you need recommendations and/or help implementing them.
  • If you’re a sole proprietor or you work from your home, restrict the computer where QuickBooks resides to business software and websites only. Never let anyone install applications, play interactive games, etc. on it.
  • Change your own QuickBooks password at least every 90 days and do backups to secure drives or websites.
  • When you run into problems with QuickBooks’ functioning, please let us help. Even a computer troubleshooting specialist will not understand the program well enough to solve problems, and he or she may compromise your data file further.

As security software and systems get smarter, so do the hackers. Don’t let your company and its customers be victims of data theft.

Scroll to top