top 5 mobile device security best practices for accountants in la (slideshare)
TRANSCRIPT
Top 5 Mobile Device Security
Best Practices for Accountants in LA
Courtesy of FPA Technology Services, Inc.
http://www.TechGuideforLACPAs.com
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
It is inevitable that you or your
employees will want to, and
possibly even need to access
sensitive client data on a tablet
or smartphone
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
Who Should Be Able to
Access Client Data with
a Mobile Device?
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
If you are a CPA assigned
to a client’s file, and often
have offsite meetings with
a particular client,
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
you may have justification to
access a client’s information
on a tablet or smartphone
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
What Data Should You Access
on a Tablet or Smartphone?
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
From a security standpoint,
a dedicated software
application, protected by
a form of encryption with
a UserID and Password,
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
for a commercial off the shelf
product is the most secure way
to access documents, client
records, or financial data
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
When Should CPAs Wirelessly
Access Client Files?
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
If there is no real compelling
event which necessitates
logging in and sourcing
client info needlessly outside
of your secure network,
simply don’t do it
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
Where Should You Access
Customer Data without
a Wired Connection
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
Wait until you are safe within
the confines of your office or
home office secure Wi-Fi
environment
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
Why Would an Accounting
Professional Access Financial
Data on Public Wi-Fi?
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
Should a rogue wireless surfer
use a key logger or other
surveillance strategy to watch
the data you are browsing
online,
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
you are taking unnecessary
risks with their information
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
Ensure every wireless endpoint
outfitted to gain access to your
accounting applications
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
is “kitted” with a standardized
security arsenal of encryption,
anti-virus, anti-malware,
and other safeguards should
a device get stolen
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
Mobile device security best
practices, for the most part
entails limiting access to client
information for those who need
to access the information,
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
where they need to access
the information, and within
critical time parameters
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
Have we missed any mobile
device security best practices
that your accounting firms
uses?
Sponsored by http://www.TechGuideforLACPAs.com
Craig PollackFounder & CEO
Please share your thoughts
in the Comments section below
Copyright © FPA Technology Services, Inc.
Learn How Los Angeles CPAs
Keep Technology Current
Without Overspending
Download Your Free Guide
12 Ways for CPA Firms in LA to
Utilize Technology More Efficiently
Now at http://www.TechGuideforLACPAs.com