Deadline Approaching for QuickBooks Desktop Users

All QuickBooks Desktop Users Are Required to Upgrade to a Current Subscription Model by Sep 30. Yes, the time has come to buy in to the software subscription model or lose access to your books. But at least you get to keep using QuickBooks desktop software, which is worth a lot of you’re already invested in QuickBooks.

Effective Sep 30, 2024, all existing users of QuickBooks Desktop Pro, Premier, Mac, and Enterprise Solutions v21 (and earlier) must transition to the annual subscription model. For Pro and Premier users, this is a short reprieve. Previously Intuit had announced a July deadline for renewing Pro/Premier licenses. After the now-September deadline, there won’t be any new sales of Pro or Premier licenses. With some of the recent price increases it almost becomes a moot point, as QB Enterprise is now priced similarly (less?) than Premier.

Something notable in all of this is that versions sold under non-subscription one-time licenses will be discontinued entirely. That is just fine for many users, however, as the much older versions don’t “phone home” to authorize the license, so they can keep working. The downside to that is vulnerability. Outdated and unpatched software is more vulnerable to risk than software that is actively updated to protect against various exploits. Best practices demand keeping software updated and patched. Being out of support with your business financial and accounting software is not a position you want to find yourself in.

Starting Oct 1, 2024, QuickBooks Enterprise will be the only QuickBooks Desktop version available for new purchases. For very small businesses, this is going to be a challenge as QB Enterprise is not as affordable as Pro was. These businesses may find that QuickBooks Online works for them, but they will not only miss out on a great deal of QB Desktop functionality that is not present in Online, but they will also be locked into the QuickBooks Online service model of receiving product updates without announcement, not having a backup of your company data, getting bombarded with a revolving door of add-on apps, and having literally no control whatsoever of where your data lives and how Intuit and its companies are accessing it.

If you are using an older version of QuickBooks Desktop, upgrading to the subscription model before the deadline is crucial to avoid any interruption of services.

What does this mean?

  1. Service Discontinuation:
    Failure to upgrade will result in the discontinuation of services such as QuickBooks Desktop Payroll, Payments, Online Backup, online banking, system updates, security patches, and live support. This could potentially disrupt your business operations.
  2. Immediate Action Needed:
    To ensure uninterrupted business operations, we strongly recommend planning your upgrade without delay.
  3. Advantages of Upgrading:
    Intuit encourages existing Desktop subscribers to upgrade to the current version (Desktop 2024) to benefit from the latest features, improvements, security updates, and bug fixes. Updated software also improves compatibility with current versions of Windows, Microsoft Office applications, Gmail services and other solutions that use modern methods of account protection and authentication.

At that time, you may also want to consider your alternatives to how and where you run your QuickBooks Desktop software.

Intuit offers “cloud access” with their QuickBooks Enterprise licensing, but this option is not your only or best option for running your QuickBooks Desktop/Enterprise software in the cloud.

With the bad guys (hackers) and malware being as prevalent as they are, businesses must be vigilant in securing their business and financial information. Shared hosting platforms where service providers allow many users from many businesses to operate on the same servers simply cannot provide the level of security or protection most businesses need.

Noobeh QBonAzure offers some limited shared hosting, but only for customers that have limited requirements and only for a few users. When a company needs more than just “vanilla” hosting for their valuable financial data, we strongly recommend going the private route and having your own cloud server.

Not just a “dedicated” server in a service provider’s network, Noobeh works only in the private Microsoft account of each customer, ensuring that there is absolutely no sharing of any resources with other customers. This allows us to build a system that works specifically for your business, with all the applications and services needed to support all aspects of operation. There aren’t different levels of service or service packages; each system is built and sized for the customer’s unique requirements, and we don’t charge per-application or silly things like that. You need what you need to run your business, and we host that.

Connect with us if you have any questions or need assistance during this transition. We will help you navigate the changes and understand how best to proceed for your business and circumstances, engaging with the right products and services to ensure continuity and set you up for greater future success.

jm bunny feetMake Sense?

J

Help Your Business Streamline Operations and Bolster Agility

The landscape of information management is swiftly evolving, demanding that businesses prioritize enhanced efficiency and innovation within their IT infrastructure to attain peak performance and profitability. Cloud platforms emerge as indispensable allies in this pursuit, empowering businesses to streamline operations and bolster agility across various workflows, from finance to customer service and beyond.

In today’s technology-driven business environment, a modernized IT framework is imperative. While web-based applications and cloud-based software are often seen as panaceas, they frequently fall short of expectations, leaving businesses entangled in a web of inadequate solutions. The crux lies not just in software, but in establishing a robust IT foundation that seamlessly integrates applications and processes, enabling efficient data flow without the risk of errors or loss.

Cloud platforms not only facilitate seamless collaboration and remote access but also provide centralized data access, enhancing workflow efficiency and inclusivity (no more data silos!). Furthermore, the integration of connectivity solutions ensures smooth data flow throughout the system, minimizing errors and maximizing accuracy.

As businesses increasingly rely on interconnected data ecosystems, there arises a demand for professionals who are adept at navigating and optimizing these connections. Traditionally the realm of IT specialists, this responsibility is now shifting towards accounting and finance teams, reflecting the profound financial implications of every business operation.

Noobeh cloud services and Mendelson Consulting teams work with accountants, CFOs and operations professionals who wish to transform business activities into digital workflows and dynamic sources of intelligence and insight.

Using platforms such as Microsoft Azure, PowerBI and more, plus leveraging solutions such as Clearify’s QQube for QuickBooks, Noobeh helps growing businesses implement the platforms and services that support greater efficiency now, and which have the agility to adjust and adapt to changing conditions, ensuring future support and service.

Gone are the days when accounting and finance were mere repositories of historical data; today, they serve as frontline guardians of business viability. Microsoft Azure cloud platform and services from Noobeh, your business applications, and direct data integrations furnish businesses with real-time insights, transcending conventional silos of historical data and illuminating the intricacies of business performance.

jm bunny feetMake Sense?

J

Taking a Hybrid Technology Approach is Most Advantageous for Many Small Businesses

When discussing technology and cloud, most IT resellers and MSPs serving small businesses equate “cloud” with web-based applications (SAAS) and web-based file sharing and assume that any talk of cloud desktops means desktop-as-a-service (DAAS). Unfortunately, web applications and file sharing services, and especially DAAS, are often NOT the best or most advantageous solutions available to the SMB/SME organization.

Rather than taking an “all or nothing” approach to cloud, small businesses benefit more from a strategic combination of cloud servers and desktop software, a hybrid model where the business gains the best of both worlds.

It is sometimes frustrating that small business IT personnel are the drivers behind migrating businesses from desktop applications to their web-based counterparts.

Most SMB software purchases are solely handled by IT, disregarding other important stakeholders.

Capterra’s 2023 SMB Software Buying Trends Survey

These non-business users pave the way for moving the business to cloud-based applications rather than modernizing the platform for existing applications to enable improved processes and workflows. This is especially challenging for accounting and finance operations where the businesses are being encouraged to migrate without first considering the underlying business processes or the accessibility of the impacted and associated data.

Businesses have developed an appreciation for the stability and predictability of desktop applications, along with the recognition of the challenges of transitioning from a system that is deeply integrated into existing workflows. Training users and adapting the work while migrating to cloud applications can be complex and costly without delivering significantly new or increased business benefits.

Data control and security are also large considerations. Most desktop applications allow businesses to retain direct access to and control over their data. Sensitive information remains within their reach rather than under the direct control of a 3rd party SAAS provider from whom they must gain permission and access to retrieve their data.

Rather than pushing the business towards web-based application services, a hybrid approach that modernizes the server and network platform as well as the user working environment may make more sense and provide the organization with greater advantage. This allows businesses to leverage their investments in desktop software, processes, training, and data and still make significant operational improvements and transformations.

Even more, some businesses rely on specialized software that isn’t easily replicated in a web-based environment. Existing desktop applications, especially industry-specific or custom-built tools, may not have cloud equivalents. Migrating these to the cloud server platform allows for uninterrupted productivity even as the business transitions from local to cloud-based platform and operations. Employees comfortable with existing software can maintain productivity without significant adjustments.

Using a cloud server to replace on-premises servers and user desktops, and keeping desktop and network applications working more securely, with improved access and management is the hybrid approach most advantageous for small and medium size businesses.

Noobeh works with Microsoft Azure, providing cloud servers that are scalable so small businesses can adjust their computing resources based on demand. Whether it’s expanding during peak seasons or downsizing during quieter periods, cloud servers offer flexibility that on-premises machines can’t.

Businesses can continue to use the critical desktop application tools they rely on and retain direct control over their data at the same time. Sensitive information remains within their cloud network, but users can access it from anywhere.

This hybrid model combines the benefits of cloud servers, including scalability, cost-effectiveness, agility, and security, with the benefits of keeping existing desktop software, including functionality, stability, data investment and control.

A hybrid approach to modernization allows small businesses to leverage the advantages of both cloud servers and desktop software, tailoring their technology stack to the unique needs of their businesses and in a way that is most advantageous to the business.

jm bunny feetMake Sense?

J

Cybersecurity and Retail Should Always Go Together

Retail cybersecurity is a critical concern for every business in the retail industry, which is why cybersecurity and retail should always go together. Retailers are prime targets for cyberattacks due to the valuable customer data they collect, which usually includes personally identifiable information (PII) and credit card numbers. Retailers can handle large volumes of customer data, which becomes an attractive target for cybercriminals seeking to profit from selling it on the dark web.

Recent statistics from various sources suggest that more than 24% of cyberattacks specifically target retailers, making it one of the most heavily targeted industries. Roughly one third of retailers cite cybersecurity concerns as their primary obstacle in transitioning to e-commerce, with cost and technology barriers coming close behind.

For the bad guys, however, it is all about the money. Almost all retail cyberattacks are driven by financial motives. When consumer data is compromised, most of the information exposed consists of payment information and personally identifiable data which can fetch a good price on the dark web.

Retail cybersecurity threats occur because the environment tends to have a lot of elements. The hybrid nature of many retail businesses introduces additional risk, where brick-and-mortar stores are combined with e-commerce platforms and services.

NFC (Near Field Communications) vulnerabilities exist in some payment systems, and many Point of Sale (POS) systems still do not use point-to-point encryption for their communications. Even if communication streams are encrypted, it makes little difference if the software has known vulnerabilities or if insecure plugins or add-ons are being used.

Cloud-based storage and mobile apps increase the presence of stored data online, which increasingly leads to new threat vectors like cloud-based botnets and more.

The key is for businesses to prioritize security and invest in platforms and solutions that will help protect customer and business data. Critical in this effort is the implementation of IT best practices in regularly updating operating system and application software, limiting the access users have for installing or modifying software on their devices, and always monitoring the systems for vulnerabilities.

Like cybersecurity and retailers, Noobeh and secure IT go together. We help retail and other businesses proactively address cybersecurity challenges so they can protect both their business and their customers. Noobeh cloud services helps retailers secure their business servers and systems, delivering scalable, high availability and highly agile solutions that keep business and finance operations running.

Noobeh provides services for Microsoft 365 and Microsoft Azure platform and deploys solutions for manufacturing, inventory management, multi-channel commerce, EDI, financial and more. Get together with Noobeh and find out how we can help your business operate more securely and with better, more agile and resilient IT.

jm bunny feetMake Sense?

J

Prey or Empowered? Small Businesses and IT Security

Now more than ever, small businesses need to be vigilant with their information technology security. Small businesses may not be the big fish in the sea, but there are plenty of them out there to catch. Small businesses tend to make the best targets because they often fail to perform security audits, they may not be willing to invest in the resources needed to protect themselves, and they frequently don’t even carry the right insurance coverages. To hackers, small businesses are easy prey.

“Don’t think you are too small to be affected,” says Erik Knight, the founder and CEO of SimpleWAN. “Every place you have an employee or office is a potential entry point. Take it seriously; if you have something worth taking, a hacker will try to take it.”

https://www.forbes.com/…

There are a few things every business can do to improve the security and privacy of their data. It isn’t an option any longer; these are essential elements in an overall security strategy that can make the difference between staying in business and not.

Use strong passwords, not easy-to-guess words, phrases or sequences (1234 is not a strong password). Passwords should be unique, more than 8 characters in length, and have a mix of numbers, letters, and special characters.

Keep software updated. Whether it is the operating system on your computer or the software you use to write letters, having up-to-date software matters. Developers don’t just upgrade software to fix bugs or introduce new features; software often gets updated because of security issues or vulnerabilities.

Keep networks and connected devices secure to make sure that the computers and connections aren’t introducing weaknesses into your system. Not only are password controls and software updates needed, but firewall security and good anti-virus/anti-malware solutions are also a must. Keeping an eye on the server matters, but the connecting points and end points are where many vulnerabilities exist.

Set up two-factor or multi-factor authentication to further secure logins. 2FA and MFA is like having ID besides just your driver’s license to prove you are who you say you are. Your password, like your DL, is just one factor; you need one more thing to prove your identity for 2FA, like a code from your phone or maybe your fingerprint. The point is that there should be more than just a username and password to access important data.

Restrict use of personal email or social media on work devices. This gets a little trickier with smaller businesses, as many don’t or can’t support providing users with all company-owned devices. There are tradeoffs to allowing users to bring their own devices (byod) versus using company-owned devices. When mobile devices are part of the mix along with desktop and portable computers, it becomes even more complicated and the risk potential increases.

Use encryption for data in transit and data at rest. Encryption is like scrambling the data and then unscrambling it when you access it. In transit, data may be encrypted by a VPN so that it is protected over the wire (in motion) as it is sent and received on the network. RDP is also encrypted, but this remote access method’s main purpose is to keep the data from leaving the server in the first place. At rest, like when it is sitting on a hard drive or other storage location, data can also be encrypted. To open the file or file system, you need a key to decrypt it.

Keep all data backed up and create a way to rapidly recover your server and systems in the event of failure or compromise. Backups are great right up until you find they are as damaged or unrecoverable as your main system, so make sure to have a policy of testing your backups periodically. There are many ways to back up and protect your data, including external drives and cloud storage. If data gets lost or corrupted, you want to be able to restore it from a backup. Regularly audit your backup and data security practices to help identify weaknesses that make the business vulnerable.

Educating employees on the importance of cyber security is among the most important steps a business can take to protect itself. Keeping passwords secure and secret, knowing how to spot a phishing email and what to do and not do with it, not clicking on suspicious links in emails, not sharing personal or confidential information online, and what to do in the event of a breach are all things that should be regularly discussed with workers and supported by written policies.

Managed Azure cloud servers from Noobeh help you keep your business information more secure. Our services demand high levels of security and privacy, and we help our customers keep their data and systems safer and more secure by handling some of the requirements for them.

  1. Strong password policies and MFA is our standard setup, and software updates and patching are part of the service.
  2. Working on the cloud server keeps data on the server and not traversing the network or downloading to individual PCs, so information stays secure and separate from whatever a user runs on their local devices.
  3. Data on the Azure virtual machines is encrypted at rest, and additional encryption is available to add more layers of protection. Data in motion is encrypted, but very little data actually traverses the wire.
  4. Servers and data are backed up regularly with snapshots and file level backups, allowing for simple file restores as well as comprehensive system recovery.

For small businesses, Noobeh has the solution for creating a more secure and better protected IT environment where applications and data can be available to those who need them without compromising the investments already made in training and process development. Moving software and data to a private cloud server allows companies to continue using the software they rely on, just in a better way. Instead of being easy prey to hackers, our customers benefit from higher levels of IT administration, management and protection that empowers them to work the way they need to – any time, anywhere.

jm bunny feetMake Sense?

J

ZERO TRUST – Every Email is Suspect

Electronic mail has become a standard for communications around the globe. Email can contain not just text, but can deliver documents, photos and videos and other media. Email allows people to contact others at any time and respond on their own schedule. Where previous methods of communicating with someone far away were expensive and time-consuming, email allows people to stay in touch no matter where they are as long as they can connect to the internet.

Yet email is not a fully secure communication medium, and a lot of people are just now figuring out just how vulnerable they may be. What was once considered a trusted means of communication has now become something to be suspicious of. For most users today, it is best to approach emails with a high degree of suspicion (zero trust), especially if they ask for personal information or contain links or attachments.

With email, someone could intercept the messages or even store messages without your knowledge or control. The smallest human error can have ripple effects that turn into waves of trouble because messages cannot usually be taken back. And then there are the threat actors, of which there are too many and they are far too clever.

Phishing has become a highly popular method of cyber-attack, probably because it works so well. It involves tricking people into giving away sensitive information like credit card numbers, social security numbers, and passwords. Phishing is fueling (phueling?) opportunities for malware infections and identity theft which can lead to financial loss, reputation damage and more. Any information an attacker can gain helps them get even more information and go deeper into the organization.

Protecting against phishing attacks requires vigilance and following best practices such as using strong and complex passwords, and two-factor or multi-factor authentication (MFA). Also, it is crucial that users avoid clicking on links in emails, and everyone should verify the email authenticity before responding, especially if sensitive information is involved.

To check the identity of the sender, mouse over (put your cursor over) the email address and it may show you the actual sender address. While the email may say the message came from somebody you know, you may find that the actual sender address is an obscure email address you don’t recognize.

Mouse over links in the email but don’t click on them. When you hover your cursor over the link, it may show you the actual url the link goes to. Like with email addresses, links can be named something other than the actual url. If it is a url or website name you recognize and trust, then type the url into your browser instead of clicking on the link, just in case.

Use multiple channels for communication. This means you should not just communicate with co-workers and others using email. It is always a good idea to have some other form of trusted means of communicating with someone, such as via telephone or a messaging application. When you receive an email requesting sensitive information or an email with file attachments, you should communicate with the sender on one of your other communication channels to verify the authenticity of the email or attachment.

Never ask the sender to verify their identity over the same channel as the original communication. If it is a hacker, you’ve just verified to them that they reached their target.

jm bunny feetMake Sense?

J