Securing Business Data When Mobility is the Target

driving1-ANIMATIONToday’s workforce is a mobile workforce. Technology has enabled businesses to allow their employees to reach beyond the office walls, doing business and operating effectively from just about any location.  SaaS, online access to business data, and smart phone technologies have brought flexibility in working models previously only imagined by the workforce tethered to business locations and office computers. Yet this flexibility comes at a price if the business is to keep up with securing and protecting data assets as readily as it extends access to them.  The bad guys are well aware that mobile computing and remote access working models are growing in adoption with businesses, and are finding ways to take ever-greater advantage of the situation.

Teleworking, which is not quite the same thing as telecommuting, is on the rise and it doesn’t look to be a trend that will slow down any time soon. According to GlobalWorkplaceanalytics.com, “telework is defined as the substitution of technology for travel”.  Those who work sometimes from an office, but sometimes not, are teleworkers. Working at the office during the day and then taking work home at night makes you a teleworker. The primary tool of the teleworkforce is the smart phone – the mobile computer with built-in connectivity and enough processing power to handle many basic office workloads.

  • 50% of the US workforce holds a job that is compatible with at least partial telework and approximately 20-25% of the workforce teleworks at some frequency
  • 80% to 90% of the US workforce says they would like to telework at least part-time. Two to three days a week seems to be the sweet spot that allows for a balance of concentrative work (at home) and collaborative work (at the office).
  • Fortune 1000 companies around the globe are entirely revamping their space around the fact that employees are already mobile. Studies repeatedly show they are not at their desk 50-60% of the time.  http://globalworkplaceanalytics.com/telecommuting-statistics

The number of teleworking employees is on the rise, and so is the variety of devices used to facilitate mobile working.  Smartphones, tablets and phablets and, of course, laptop computers are used by mobile workers – often in addition to the company-supplied desktop in the office. The variety and number of computing devices per user is growing. Knowing this, businesses must take increasingly expansive steps to strengthen and secure remote access systems and business data, yet many organizations are just beginning to fully realize that the mobility they extend to their users is part of the reason for the increasing number of data breaches and attacks against business information systems.

Cybercriminals and their crafty programs are often able to steal important information or access a network by first infecting computers and devices used for telework.  Many of the devices available to the attackers are not company-owned, but are introduced to the system by contractors, vendors and employees (BYOD or bring-your-own-device users).

Even if the device isn’t a vehicle delivering a nasty payload into the network, data breaches may still occur when business information is stored on an improperly secured device. Most people who work with computers have some recognition of the potential for virus attacks and malware, but far fewer recognize the threat potential of attacks against mobile devices such as phones and tablets, and even fewer may implement meaningful protections on those devices.

“To prevent breaches when people are teleworking, organizations need to have stronger control over their sensitive data that can be accessed by, or stored on, telework devices,” said Murugiah Souppaya, a NIST computer scientist. [1]

Providing guidance and information to the public on such topics, NIST (National Institute of Standards and Technology) is revising its publications on telework to cover growing use of BYOD and how contractor and vendor devices are increasingly used to access company information resources.  Two new publications – one for organizations and one for users – are now available for review and comment.  You can find them here.

“As one of the major research components of the National Institute of Standards and Technology, the Information Technology Laboratory (ITL) has the broad mission to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology through research and development in information technology, mathematics, and statistics.”  [NIST Information Technology Laboratory Mission]

The rising number of threats, attacks and breaches caused by compromised devices used for teleworking is nothing to take lightly, and protecting against them shouldn’t be approached as a merely perfunctory obligation. Organizations must create and consistently update policies and requirements relating to protecting information accessible by remote workers if they intend to reduce business risk and provide assurances to stakeholders and customers that the information is adequately guarded.  But it doesn’t stop with the policy; businesses must also make an effort to properly educate their users (employees, contractors, vendors, etc.) on those policies, ensuring that all parties involved understand the responsibilities and requirements and strictly adhere to them.

jmbunnyfeetMake Sense?

J

[1] http://www.nist.gov/itl/csd/attackers-honing-in-on-teleworkers-how-organizations-can-secure-their-datata.cfm

Intuit Ended QuickBooks Remote Access Service: The Time to Host is Now

Intuit Ended QuickBooks Remote Access Service: The Time to Host is Now

accountingCloudAccountants, bookkeepers and small business consultants have recognized the benefits of accessing client information remotely, where all parties can work on the same data in real-time, creating the opportunity to maintain more timely and accurate financial data for the business client.  The Internet has become the network, facilitating a variety of different working models which allow users, regardless of location, to access business information and data to get their work done.

For accountants and their business clients, it is essential that there is some type of virtualized working model, else the client is relegated to accepting after-the-fact reporting and outdated information.  Especially in smaller businesses where many of the accounting and finance processes are handled by an outsourced professional, time and distance is the enemy.

Just about anything that helps remove those barriers to real-time efficiency is worth looking at – which made it particularly unfortunate when Intuit, the  makers of QuickBooks, discontinued the QuickBooks Remote Access Service which was a tool that had addressed the remote access requirement for many businesses and their accounting and bookkeeping providers.

There are a wide variety of options for accountants to work closer with their small business clients, and jumping into a SaaS or web-based application is just one of them; other proven options include secure remote PC access or hosted application services.  Hosting in particular is beneficial as it allow businesses to continue the use of the software and processes they have already invested in while enabling a remote access and mobile capability.

If the problem is access, the solution isn’t necessarily a complete change in software – the solution is to create access. With Intuit’s end of QuickBooks Remote Access services in sight, the time to explore QuickBooks hosting is now.

Make sense?

J

Licensing the Cloud: Software Distribution and Use in a Remote Access World

Licensing the Cloud: Software Distribution and Use in a Remote Access World

Whether we like it or not, and whether we agree or not – software developers have a right to decide how and where their licensed products are run.  There have always been arguments in this area, where software license purchasers take the position that they should be able to do what they want with their licenses, and where commercial software developers believe they have the rights to dictate authorized usage.  Truly, when it comes down to the legalities of it all, the software companies will win because they have the legal footing to fall back on  – the EULA containing use rights and terms which licensed users have agreed to.

The problem has been ongoing, with software developers constantly and consistently seeking methods to reduce unauthorized software distribution and unsupported use, and users spending amazing amounts of time and resources finding ways to break the rule.  Copy protection, “phone home” license validation models and all sorts of approaches have been developed to prevent software theft and unauthorized distribution.  But it happens anyway – a lot – and the cloud is turning into a great facilitator.  Surprisingly, it’s an “in your face” approach, too, where the previous iteration of web-enabled software theft (unauthorized digital downloads and license cracking) was fairly quiet and tried to be secretive to stay out of the gun sights of the developer.  Today’s “flavor” is right out there, being marketed to any and all who care to view the ads.

With businesses more frequently turning to “cloud” server providers to run business applications, it is no wonder that the IaaS and PaaS companies would want to make their services easier and more valuable to acquire than the next guy’s.  Aside from a groovy control panel and great networking and VM pricing, the added value from these providers is in the applications they are able to service.  More frequently, hosting service providers are marketing their solutions in the context of the applications customers run on the service (which makes sense, because the application’s what really matters).  Leveraging the brand value and recognition of popular commercial software products makes sense, as it improves overall visibility and increases the potential of the “right” kind of prospect engaging and becoming a customer.

The problem arises when these service providers sell hosting services for, or which support, applications they are not authorized or licensed to deliver, and this is where the argument comes full circle.  The hosting provider wants to host applications customers use, customers have licenses for those applications, but not a right to have them hosted.  The host deploys the application anyway, because that’s what the customer wants.  “What’s the risk?” they ask… “the customer has the software license”.

The risk is, unfortunately, greater for the service provider than for the customer.  Even if the customer has a license for the software product, that license may not actually be eligible to run on a hosted server.  “Businesses lease computer equipment all the time, and they can run the software on those systems” is the next argument generally offered by the service provider.  But, in the eyes of the software developer, there may be a big difference between leased equipment run in-house versus subscribed platform services deployed via a commercial hosting provider.  Even Microsoft recognizes the benefit and value of providing “mobility” of application licensing, and has specific licensing models to allow commercial hosts to deploy customer-owned licenses.  While many service providers understand and recognize the requirements to ensure that customer applications are properly licensed for hosted delivery, there are a great many who think the rules simply do not apply to them.  These folks are introducing a great deal of risk into their hosting businesses, even if they are not willing to recognize it.

When a customer runs their software in an unauthorized manner, they risk losing the rights and benefits associated with their software license.  When a commercial hosting company runs software on their servers that they have no right to install and run… they are potentially guilty of unauthorized software distribution and copyright theft.

Actions against facilitators of unauthorized content distribution – you can equate “software” with “content” – have received much press in past months, yet much of the discussion centers on music and video content (as in the Megaupload story).  Actions involving commercial software products tend to be somewhat less visible, probably due to reluctance by commercial developers to have what could be perceived as negative press flowing through social media venues.  It’s popular to protect music and videos, but hosting providers aren’t seeing the wisdom of preserving the integrity of a commercial software product license.  Instead, they’re relying on the customer to indemnify them (the customer has a license, remember?).   But the customer can’t protect the host; the host must protect the host – it’s the prudent business approach.

Infrastructure providers, platform providers and businesses operating as application hosting companies should pay close attention to the content living on their servers.  Taking a position that the customer has the right to do whatever they want with the system is not a viable position; the precedent has been set that the hosting provider is responsible for the content on their systems.  In the case of hosts offering service for small business applications like Microsoft Office and Intuit QuickBooks, for example, it is essential that a service model which conforms to and supports proper license usage be in place, and that any required authorizations are, too.

Software is just another form of content, and the cloud makes distribution of and access to content a lot easier, even when it shouldn’t be.

Make sense?

J

The Cloud for Your Firm: 3 Initial Considerations for Cloud Enabling Accounting and Bookkeeping Firms Working With Small Businesses

The Cloud for Your Firm

3 Initial Considerations for Cloud Enabling Accounting and Bookkeeping Firms Working With Small Businesses

dscn0903.jpgThe potential benefits of a real-time, lean collaborative working model are too great to argue with.  Accounting professionals, bookkeepers and their small business clients are all hearing about the value of working together in the cloud, and how cloud technologies and solutions can reduce cost and improve efficiency.  There is a great deal of truth in these statements, just as there was a truth in the value of implementing computers, networks and other technologies in business.  What is not clear is exactly what businesses need “in the cloud”, and how they should approach this shift from local IT to outsourced managed service.  Initially, there are 3 issues which warrant consideration, if not deep discussion, prior to making any significant move to relocate internal IT and shift business applications to the cloud: internal use systems, client interaction, and operational support for both.

With all the discussion about cloud computing and remote access, it would seem that all the applications and solutions businesses need are now available online and paid for in low monthly subscription fees.  Anyone working with small businesses, however, comes to understand that the vast majority of these businesses are still using more traditional modes of information management and computing.   For the most part, these businesses are using PCs and local networks, possibly with a little hosted email thrown in.  Almost certainly they have a website and maybe even a fairly sophisticated e-commerce system that allows them to sell products online.  But when it comes to general office functions, and particularly back-office functions like bookkeeping and accounting, the software and the data generally reside on the office PC and server.

Accounting and bookkeeping professionals who work with small businesses are often in the same position as their business clients when it comes to information technology.  Since so much of the work involved requires the same programs and data formats as those used by the client, service providers find that they spend as much in management of software licensing and systems to support working with client data as they do on systems intended for internal use only – sometimes more.  Many of these service providers are also small businesses, and it becomes challenging to find a way to handle internal IT needs while at the same time trying to address those of the client. Where e-commerce solutions are readily available to handle operational aspects of product based businesses, the best tool set for a professional accounting firm or bookkeeping business working with small business clients may not be so easily defined.

The solution for many providers has been revealed through cloud computing and hosted application models.  With Cloud Servers, Remote Desktops, and Virtual Desktop Infrastructure now widely available as affordable alternatives to capital-intensive implementations of locally installed products, businesses are finding new abilities to manage applications and data, provide mobility and enhance collaboration.  The additional benefit is in how accounting service providers may engage with their clients in more efficient and effective ways, without the burdens of replicating data or trying to share access to a single machine or application resource.

There are a number of elements to consider before taking the file server to the parking lot and running it over with a truck.  Moving to the cloud is not a one-step process, and it is important to do a little research and collect some important information before making the final decision on how to proceed.

Internal Use Systems

Among the first of the questions to ask when considering a change in IT management approaches is “which software do we need”?  Implementing an outsourced IT arrangement, which is really what “cloud” is about”, does not necessarily mean throwing away all the existing software and starting with new.  The software in use within the firm may be exactly what it needs right now and adding full IT management, fault tolerance, and remote or mobile access could be the main scope of the requirement.  Moving from locally installed solutions to hosted solutions provides quite a number of benefits while removing many of the direct costs and frustrations of IT management and administration. The greatest benefit of this type of approach is the ability to preserve the “body of knowledge” existing in the business, knowledge invested in the people and processes already developed.

On the other hand, there may be new tools or services only available as “cloud” service, and it makes sense to explore how they may benefit the business more than the in-use applications.  The important element is to remember that the solution must address real business problems, and whether it runs in the cloud or not isn’t the first or most important thing to ask.  For example, a discussion about whether QuickBooks Online might be a better choice than QuickBooks Pro, Premier or Enterprise should be focused on the functionality provided by the applications and not which servers they are running on.  With application hosting for QuickBooks now being an available option, there is a managed IT and remote access capability for both solutions, rendering the fact that QBO is a SaaS solution almost irrelevant in terms of being a differentiator.

Client Interaction

An important aspect of adopting new technologies or working models is the consideration of how the firm and the client businesses will work together, and whether or not there is (or could be) a standardized approach that might work for most clients.  Certainly, it makes sense to standardize as much as possible.  Treating every issue or engagement as a singular event – a one-off – is the least efficient way to do business.  The key to profitability is in the firm’s ability to produce high quality work consistently and in a timely fashion.  This requires that the business be well-structured in terms of the standard processes and methods which will be used to work with client information.  When the firm and the client can work seamlessly together as and when required, and when each is responsible for their own systems and data, it is a best-case scenario. The questions relating to client interactions focus on how the firm works with clients and which tools or solutions are required to improve that situation.

It is likely that the firm will need to be able to address working relationships with various client and engagement types – where clients do some of the work, where the bookkeeper does the work, or where the participants work collaboratively together in the same systems.  While it may seem that the best way to create a dependency on your services with the client is to keep them out of the systems, empowering the client is really the key to a close and long-standing engagement.  This means that the client needs to have their own solutions and approach to cloud-enabled IT, and the accounting or bookkeeping service provider should be able to access and work within that environment.

It is rare that a small business can effectively operate without computers and software to manage information and support operations, so it makes sense that the business should have its own accounting and financial systems, too.  For the accounting service provider, it is essential that a level of understanding be gained around the use of today’s available remote and mobile access technologies, as it is with these solutions and tools that participation in client systems will be enabled.  When the client accounting solution sits on their office PC, there are limited options for working together in any real collaborative form.  Connecting to their PC via remote control is a widely recognized means of gaining access to client systems, but if the bookkeeper is on the system when there is a problem of some sort, all eyes go directly to that remote user as the likely cause of the problem.

The considerations relating to remote access to client systems focus not just on enabling a collaborative working environment, but also on mitigating risk and improving client perception.  The risk issue comes in when the accounting service provider is exposed to systems and information not relevant to their task, and the perception issue becomes material when the accounting professional becomes the software or IT service provider.  It makes sense for the accounting professional to make recommendations or suggestions about software and IT service which might benefit the business, but not to necessarily be the reseller or direct provider of the product or service.  The moment the accounting professional attempts to sell the client a software product or IT service, the relationship is changed and the client is more likely to view their accounting pro as another vendor rather than a trusted advisor.  It’s also not necessarily a great move to start a new client engagement by telling the client they have to switch accounting products to allow the accountant to work closer.  Rather, professionals need to help their clients position those products for more efficient use, which may include enabling remote or mobile access granted via deployment in the cloud.

Operational Support

When businesses outsource their IT management and administration, there is often an initial belief that all responsibilities in these areas will be handled by the IT service provider.  What is often overlooked is the reality that the firm still needs to have people attending to IT related tasks, just doing different levels of work with the technology. It is important to recognize that someone in the firm will end up dealing with various IT and process support issues, and it still makes sense to have personnel dedicated to these tasks (*Note: here’s where I suggest that the cloud changes the focus of internal IT personnel, but it doesn’t eliminate the need for them).  The service provider and solution evaluation and selection process, as well as the actual deployment and administration of services, will take valuable time away from actually performing client accounting or bookkeeping work, and there should be people attending to these issues while the business continues operating.

Where an internal IT department or contract technicians may once have supported internal systems, an operational role within the business is still required to manage outsourced IT activities, including and particularly those where clients are involved with the firm systems.  Delivering new benefits with a minimum of business disruption is the goal, and can be achieved through proper planning and coordination with team members and clients alike.

Closing Thoughts

“The Cloud” is just another way to run software and implement computing resources.  It still takes servers and software, it uses processors and storage and networking, just like more “traditional” computing models.  The difference is in how these resources are purchased and provisioned, and the impact is a change in how businesses of all types can benefit from technologies which enable collaboration, lean process, and mobilityThe Cloud for Your Firm addresses your internal business requirements, lends itself to client collaboration, and has internal operational support to ensure the firm is fully leveraging the available benefits to improve business performance and profitability.

Make sense?

J

Read more about Accountants and Bookkeepers Working With QuickBooks Clients: App Hosting Approaches That Work

technorati-top-100-small-business-blog

Moving Your Systems to the Cloud

The IT industry is promoting Software as a Service and online applications as the new normal for computing, and unless you’ve been living under a rock for the past few years you have heard how it is supposed to make our computing lives ever so much better.  Hiding under that rock might also have spared you from reading about the various failures and outages which impact users, forcing them to make do without the online applications and data they have become so reliant upon.  It’s surprising, but not unimaginable, that businesses rely so heavily on applications and services that didn’t even exist a few short years ago.

The potential benefits of a SaaS model are many, but the risks are equally significant and should not be minimized.  This assessment should center on a review of the application software in use, considering whether or not it is meeting the needs of the business.  Where and how the software runs is much less of an issue than the functionality and process support it provides – most “legacy” applications can be run in a cloud server environment, making remote access and managed service part of the service model.

There is risk in changing business applications – risk of data loss, changed or broken data relationships, lost productivity, and more.  Many businesses would benefit by running their applications in a cloud model while continuing to utilize the software solutions their operation relies on.

Application hosting models where desktop applications are delivered on cloud servers is  often overlooked when businesses go looking for cloud software because they are shopping for software and not the platform.

With Software as a Service (SaaS), the software and the platform are combined and together represent the solution. With application hosting on a cloud server, the software is the same software a business would traditionally run on PCs and servers, but the they are installed and managed on the cloud server rather than the local computers.

The big benefit is the agility of the platform and the user mobility it allows.  The unspoken benefit is that you can still “take your ball and go home” if the service doesn’t work out.

Removing the barriers for adopting an online working model allows the business to experience the benefits attached to cloud computing without introducing unnecessary risk through unneeded changes in software and applications.

Make sense?

J

 

Hosting All My Applications in the Cloud

Many business owners will recall when their first in-house computer networks were installed.  When the PCs were networked together in an office, it made file sharing and collaboration among team members easier and more efficient.  Installing additional applications on the PC was a relatively simple process, and when the new application came with the ability to integrate with another app already on the PC, it was often a fairly simple process to get the two “talking” together.  But installing and integrating applications on your personal computer is a bit different from getting multiple applications installed and integrated with a cloud hosting service provider.

In almost all cases, integrating multiple desktop software solutions requires installing those solutions on the same computer so that they can share certain program elements or, at least, share .ini or data files.  Application integration is important because it allows different software solutions to work together, communicating data from one application to the other so the information may be used in different ways or for different purposes.

An example of this might be a Microsoft Office integration with QuickBooks, which allows the user to perform a one-click export of QB financial data to an Excel spreadsheet.  Another example is the integration between QuickBooks and Fishbowl Inventory, which synchronizes information from the Fishbowl inventory system into the QuickBooks financial software.

In nearly every case where a software program has a software-based integration with another solution, the integration must be installed in the same system as the core solution.  In the QuickBooks world, this means that the programs which integrate with QuickBooks must be installed on the same computer as QuickBooks.

In a conventional PC network, the necessity of installing the various software solutions on the same machine is not a big problem as PC software and integrations have been implemented in this manner for years.  On the other hand, when the business is considering the option of moving desktop applications to the cloud, it is important to make sure the provider and service will allow all of your products to be hosted.  In most cases, this requirement highlights the main difference between a shared service versus a dedicated or server-based solution.

With shared services, the servers are generally configured to offer a strict and limited set of applications to be hosted.  The applications on the servers are used by subscribers of the service, and users are limited to accessing only those applications available in the environment.  The shared approach is popular with some application hosting providers as it creates an economy of scale which helps providers to earn more revenue on their infrastructure.    The trade-off is that a shared hosting solution only works well for businesses with a limited application requirement, and is generally fairly expensive when more users are added to the service.

The need for diversity in hosted application choices, coupled with the need for businesses to keep costs down even as the number of business users increases, are the primary drivers for adoption of dedicated and server-based cloud hosting solutions.  When the solution is managed as an entire environment rather than on an exclusively per-user basis, an economy of scale is developed within the organizational IT infrastructure.  As the business grows and adds more users and applications, the incremental costs to bring each user or application onto the platform is often far less than a user subscription in a shared solution.

For any business planning to migrate their server and systems to the cloud, the first step is to have a thorough understanding of the applications and integrations the business needs in the host environment, and then to find a hosting provider that can deliver the infrastructure and baseline system administration required.  It is unreasonable to expect a hosting provider to be an expert with every software product available, but skilled and experienced hosting providers understand how to generally install and implement most standard business applications and will rise to meet the customer demand.

While no business can guess what their future software needs may be, decisions can be reasonably made based on the solutions currently in use.  Finding a provider with a service to meet immediate needs is useful, but businesses change and therefore business requirements change, and it is good to know that the hosting infrastructure and IT services supporting the business can adjust to those changing needs.  After all, cloud hosting of applications and data just means the servers and infrastructure are with the service provider and not in the office, but it doesn’t mean businesses can’t have the feature-rich and functional applications their businesses have come to rely on.

Make sense?

J