Thursday, November 6, 2014

Mobile Technology Reshaping Small Business


Mobile technologies are creating a big impact on small businesses, according to a recent report conducted by AT&T and the Small Business & Entrepreneurship Council. This report found that small business owners that have implemented smart phones and tablets in their daily business activities have gained $67.5 billion a year from this incorporation of mobile technology. The report shows that mobile technology saves businesses money ($32.3 billion dollars annually) and time (1.24 billion hours). Bizness Apps outlines a few more of the perks of mobile technology below:
·         Employee productivity: According to the report, small business owners and employees are using their smart phones seven days a week – even in companies that may only be open five days a week.
·         The use of smart phones is huge: Small businesses are using smart phones for just about everything, and the numbers are growing. In 2013, the number of small businesses using smart phones was 85%; this year it is 94%.
·         More apps are being used: The report recalled that approximately 77% of small businesses are using mobile apps, sometimes three or four at a time. GPS, navigation and map apps were the most popular.
·         Companies are also using apps: Many small businesses are using apps for every day functions like planning trips, GPS navigation, remote document access, banking and finance, and more.
·         Mobile Banking is the new thing: 34% of small businesses surveyed use mobile banking at least once a week, with only 18% opting out of mobile banking.
·         Smart phones aren’t the only device proving helpful: Tablets and other devices that use apps are also saving businesses money. Tablets saved small businesses 754.2 million hours and $19.6 billion a year, and apps themselves have saved businesses 599.6 million hours and $15.6 billion a year.

Monday, November 3, 2014

Smartphones and USB Flash Drives Should be Treated as Toothbrushes – Personal Use Only

Universal Serial Bus ports (USB) have become essential because they are just that, universal. Cell phone chargers, computer mice, printers, keyboards and more can all connect to your computer with ease because of the universality of USB ports. But that ease of connection may actually be considered a flaw, as anything that connects via USB to your computer can be reprogrammed to pose as another device. A USB stick could be programmed to pose as a keyboard, then type commands that allow complete control of your computer. USBs can also pose as network cards, which allow rerouting of your internet traffic so that everything you view may be viewed by someone else. These situations can lead to identity theft, bank fraud, extortion and more. Unfortunately, antivirus and protection software cannot catch these issues, as it is not technically a computer virus. To protect your computer and your personal information, do not let just anyone charge their phone or plug a USB drive into your computer. Security experts recommend considering your USB drives as personal use only, and to be extremely cautious when allowing others access.

Tuesday, September 9, 2014

5 Online Privacy Tips from an ex-FBI Agent


Mary Galligan is an ex-FBI agent who led the cyber and special operations team at the FBI’s New York office, which is the agency’s largest surveillance operation. She now works as a security and privacy consultant, and is sharing advice on how to protect your privacy. Galligan’s top 5 pieces of advice are listed below:
1.      Change your passwords once a month. If a criminal gets access to your email or any of your online accounts, it becomes very easy for them to worm into other aspects of your life. Galligan recommends to assume your passwords will periodically get compromised, and to change them accordingly.
2.      Give the wrong contact information at checkout. Anytime a store clerk asks for your zip code or phone number, that data gets aggregated. Retailers not only have databases that show where you live, they can also find out your salary, credit history and birthday. Recent big company data breaches show that companies cannot always be trusted to safeguard your information. Galligan recommends giving clerks phone numbers and zip codes that aren’t yours.
3.      Need photo ID? Don’t show your driver’s license. This is a general rule for privacy. Your driver’s license shows your birthday and address. Galligan suggests using another form of photo ID with less personal information if you have one available.
4.      No banking apps. Although most credit cards have fraud protection, your checking and savings accounts don’t. Because of how easy it is for a computer to get infected with a malware that spies on you, Galligan does not shop and bank on the same computer, and that includes her phone.
5.      Keep one email account for junk mail only. When companies demand an email address, Galligan gives them a dummy account reserved for marketing. It gets bombarded with spam and advertisements, but shields her real email from the junk. If those companies sending emails were to get hacked, her real accounts remain safe.

Tuesday, September 2, 2014

Microsoft Unveils New Webmail Encryption


Microsoft has recently pulled back the curtain on its implementation of tougher encryption standards for Web-based email and some cloud services. In the works for more than six months, Microsoft has now activated Transport Layer Security encryption (TLS) for its webmail services at Outlook.com, Hotmail.com, Live.com and MSN.com. This encryption makes it much harder for email originating from and being sent to a Microsoft account to be spied on, as long as the connecting email service also uses TLS. Microsoft also activated Perfect Forward Secrecy encryption (PFS) for its cloud storage service OneDrive. The OneDrive website, OneDrive mobile apps, and OneDrive syncing tools will now all use the tougher PFS encryption standard, which protects user confidentiality even when a third-party is eavesdropping on the network. And finally, Microsoft has opened a “transparency center” at its headquarters in Redmond, WA, where governments can review Microsoft source code for “key products” to confirm that no hidden backdoors have been added to the software. All these changes have come just a few weeks after a well-publicized Google webmail report that displayed Microsoft in less than flattering colors. Google scored Microsoft, along with ComCast and Apple, as webmail providers with inadequate levels of encryption to protect their users’ email. For more information about the new webmail encryption, click on this link here.

Wednesday, August 27, 2014

QuickBooks Online Users Can Now Accept Bitcoin Payments


Bitcoin payments have become increasingly more mainstream, and will continue to grow in popularity as QuickBooks now accepts the payment option. Intuit’s QuickBooks is the first web-based small business accounting solution that includes support for accepting Bitcoin payments through the PayByCoin service.  The PayByCoin service integrates QuickBooks Online with Coinbase, which is an online Bitcoin wallet service that is growing in popularity in the U.S. PayByCoin is now available as a free add-on to small business operators who use QuickBooks Online to generate electronic invoices. Here’s how it works:
·         Small business operators register with Coinbase and link their wallets to their existing QuickBooks Online account.
·         When a customer receives an invoice, they receive the option to pay by traditional methods, such as credit card, or by Bitcoin.
·         Intuit does not currently charge any fees for this new service, and there is no fee for small businesses that use Coinbase.
·         Intuit is providing the connectivity and software services to direct customers to the small business operators Coinbase wallet, and to record the transactions in QuickBooks Online. Intuit will not receive or hold any funds related to the PayByCoin transactions, either in USD or Bitcoins.

Monday, August 11, 2014

Sage Introduces New Exchange Payment Management System


Sage North America has introduced its new Sage Exchange Payment Management System, which is designed to help small and midsized businesses by consolidating all of their payment activity onto one platform. Sage Exchange can also be used to monitor and manage payments from all sales environments: on the web, over the phone, through mobile devices, or at their storefront. The consolidated activity and information can be accessed and administered online from anywhere. Businesses can manage not only credit card transactions, but also gift cards, mobile payments and checks in real time. Sage Exchange also allows businesses to connect their Sage accounting or enterprise resource planning (ERP) software to their payment devices for automated reconciliation activity, as well as access the Sage support group or self-service portal. The three core components the Sage Exchange Payment Management System was built on are:
1.      Consolidated access to all payment accounts and devices
2.      Advanced payments administration and reporting
3.      Simple integration tools to connect payment solutions with Sage accounting products
If you have any questions or would like more information about Sage services, please contact us.

Wednesday, August 6, 2014

McAfee Reports Mobile Malware Is On the Rise


According to the June 2014 McAfee Labs Threat Report, mobile threats are on the rise, and are expected to continue to increase. New mobile malware has increased for five straight quarters, with a total mobile malware growth of 167% in 2013 alone. Total mobile malware has increased steadily since the first quarter of 2012. The report also noted two key issues that are important to be aware of:
1.      Beware of Flappy Bird clones: After the original Flappy Bird app was pulled from app stores in February, clones of the app were created to meet demand and McAfee found that 79% of these apps contained malware. This malware could be used to make calls, install additional apps, send and receive messages, extract contact data, track geo-location, and establish root access (which would allow uninhibited control of the app). McAfee warns consumers to be wary of free, third-party apps.
2.      Mobile malware is attacking apps and services: Mobile malware traditionally attacked standard mobile platforms, but malware developers have recently started abusing vulnerability in apps and services. The McAfee report found malware that abuses Google account authentication, obtains money through VISA QIWI Wallet, and takes advantage of encryption weakness in the popular messaging app, WhatsApp. McAfee is urging consumers to be more careful when granting app permission requests, and developers to work harder to protect apps and services from malware.
This report from McAfee stresses that cyber threats are increasing and businesses and consumers need to be more alert and take greater precautions when using mobile application. The full report from McAfee can be accessed through this link.

Tuesday, July 29, 2014

Report Shows 18% of Small Businesses Still Using Windows XP


According to a new report, almost one in five small and midsized businesses worldwide are exposed to major security risks as they are still using Windows XP after Microsoft ended support for the operating system. This report was released after a three-month study conducted by Bitdefender, and showed that businesses around the world still rely on the legacy Microsoft OS despite major security concerns. Millions of malware attacks target companies every month and hackers try to steal confidential data by taking advantage of the unsupported system’s vulnerabilities. Since April 8th, the date Windows ended support, enterprises that continue to run Windows XP are more vulnerable to these cyber-attacks. Windows XP users no longer receive new security updates, non-security hotfixes, free or paid assisted support options or online technical content updates. Experts recommend that Windows XP users upgrade to a current and supported system as soon as possible to minimize security risks.

Monday, July 21, 2014

Cyber Attacks Cause Big Effects on Small Business


The data breaches that we most often hear about affect larger companies and compromise millions of customers, such as the attacks against Target and eBay. Data possessed by small businesses can be just as valuable and, in some cases, much more so. Small business owners know that the impact of an embarrassing or costly data breach can mean potentially losing their livelihood and/or the entire business enterprise. The majority of cyber-attacks actually target small and medium-sized businesses because they are typically much more vulnerable than large enterprises, and the effects can be much more devastating. Firewalls, spam blockers and antivirus software are always recommended, but these do not always work to keep criminals out. “The Verizon 2013 Data Breach Investigations Report found that 62 percent of breaches impacted smaller organizations, and that number is likely conservative because it assumes an organization is even aware it has been breached” (CPA Practice Advisor). Small businesses that do not have the IT resources or expertise to implement and manage security systems are prime targets for cyber criminals, as they might not even be aware that an attack has taken place.
 Monitoring where files exist, how they move inside and outside the network is critical to immediately identifying an attack and preventing information loss. It is also recommended that every business, regardless of size, create a comprehensive security training program in place for employees. This would involve not leaving files open or unattended and shutting down all unsecured devices at the end of every day. It is a good idea to also classify employees based on what they can and cannot access on the company system, and keep files as restricted as possible. Additionally, employees should have a different and strong password for all accounts or services. Unfortunately, cyber-attacks can occur despite a business owner’s best efforts. But the effects can be limited by relying on a crisis management plan that centers on transparent communication between management, employees, stakeholders, customers, and anyone else who may be affected.

Thursday, July 10, 2014

How to Keep Your Records Safe in Case Disaster Strikes


It is always a good idea to have a plan for what to do if and when disaster strikes. A disaster recovery plan is especially important when it comes to keeping your tax and financial records safe. The Internal Revenue Service provides taxpayers with some basic steps to take now to be prepared in case of emergency:
1.      Backup Records Electronically. Ask for your bank statements to be emailed rather than mailed, and scan tax records and insurance policies into an electronic format. Always remember to backup these files and keep them in a safe place.
2.      Document Your Valuables. Take photos or videos of the contents of your home and/or business. Visual records can help prove the value of lost items. They will also help with insurance claims or casualty loss deductions on your tax return. Store these pictures or videos with a friend or relative who lives away from the area.
3.      Update Emergency Plans. Review your family’s emergency plan every year, and update when changes are needed.
4.      Get Copies of Tax Returns or Transcripts. Visit IRS.gov to obtain a copy of Form 4506, the Request for Copy of Tax Return, to replace lost or destroyed tax returns.
Do you have a disaster plan for your important records? Let us know in the comments below.

Tuesday, July 8, 2014

New QuickBooks App for Mac Devices

 

Intuit, the maker of QuickBooks and many other business and financial technologies, has announced the availability of a new QuickBooks application for Mac OS devices. The QuickBooks app for Mac is the newest addition to the QuickBooks family, which is the number one cloud accounting solution for small businesses. The new app offers business management on multiple devices, as the data is available through the QuickBooks Online account, and users can access the data from their computer, iPhone or iPad. The app automatically syncs data between devices and users, so small businesses can manage their finances anytime and anywhere. The QuickBooks app for Mac also offers menu bar notifications that provide real-time alerts, multi-window support to streamline how users want to work in QuickBooks, and keyboard shortcuts that save business owners even more time.  If you have any questions about QuickBooks, contact us and a certified QuickBooks ProAdvisor will be happy to assist you!

Tuesday, July 1, 2014

Windows Key Shortcuts


Did you know that the Windows key on your keyboard can be used for time-saving shortcuts and quick access to Windows Explorer? This key can make navigating through Windows 7 much easier by using the following keystrokes:
·         Windows Key opens and closes the Start Menu
·         Windows Key + T scrolls through items on your taskbar
·         Windows Key + Ctrl + Tab advances through Windows using Aero Flip 3D
·         Windows Key + Up Arrow maximizes the activate window
·         Windows Key + Down Arrow  minimizes and restores the active window
·         Windows Key + Left Arrow snaps the window to the left side of the screen
·         Windows Key + Right Arrow snaps the window to the right side of the screen
·         Windows Key + Home minimizes all but the active window
·         Windows Key + (+/-) zooms in and out and opens Magnifier
·         Windows Key + M minimizes open windows
·         Windows Key + Shift + M restores all open windows
·         Windows Key + E opens Windows Explorer
Do you use other shortcuts for navigation ease? Share with us in the comments below.

Tuesday, June 24, 2014

Hackers New Targets are…Cars?


Cars are giant computers, and unfortunately, those computers can be hacked. In the 1990s, the cars being built were basically a closed box, so the computers were safe. But today, car’s computers are hooked up to the internet and the computers are much more complex than they used to be. CNN Money reports that “The space ship that put humans on the moon, Apollo 11, had 145,000 lines of computer code. The Android operating system has 12 million. A modern car? Easily 100 million lines of code” (CNN Money). With this much complexity, it is no surprise that there is room for error. Not only can hackers now hack into your car’s internal computer and tamper with brakes or steering, malicious apps can be downloaded through your car’s “infotainment” system (dashboard with tablet functionality). Car manufacturers are beginning to notice these problems, and are in the process of building firewalls and security chips for computer protection. All auto-makers are moving toward Internet-connected cars, and manufacturers will not separate the core controls from the car’s wireless communication hub due to federal regulations. Federal regulators will soon demand that cars automatically relay information wirelessly to one another as part of the United States government’s vehicle-to-vehicle communication program. These car-to-car messages will one day be able to engage brakes, which can be life-saving, but also will allow hackers to tamper with steering wheels and navigation. To read the full article from CNN Money, click here.

Tuesday, June 17, 2014

How to Recover from Viruses, Worms, & Trojan Horses


Unfortunately, many computer users will be victims of viruses, worms, and/or Trojan horses that will infect computers with malicious code. Some infections will be very obvious: files will be destroyed, your computer will be shut down, and programs will not function. Other infections might not be as obvious. Unless you are running anti-virus software, malicious code could slowly affect your computer over time until the system is completely useless. If your anti-virus software cannot remove the malicious code from your computer automatically, the United States Computer Emergency Readiness Team recommends following these steps:
1.       Minimize the damage: If a work computer is affected, contact your IT team immediately and have them investigate and treat your computer. If a home computer is affected, disconnect the computer from the internet. By removing the internet connection, you will prevent future attacks and viruses from being able to access your computer and perform tasks such as locating personal data, manipulating or deleting files, and using your computer to attack other computers. The most important factor is to act quickly.
2.      Remove the malicious code: “If you have anti-virus software installed on your computer, update the virus definitions (if possible), and perform a manual scan of your entire system. If you do not have anti-virus software, you can purchase it at a local computer store (see Understanding Anti-Virus Software for more information).” (U.S. Computer Emergency Readiness Team). If the software cannot locate and remove the virus, you may need to reinstall your operating system (using a system restore disk that is often supplied with a new computer). Reinstalling or restoring the operating system will typically erase all of your files and software installed on the computer. After reinstalling the operating system and any other software, install of the appropriate patches to fix known vulnerabilities (see US-CERT Understanding Patches for more information).

Thursday, June 12, 2014

States Seek Ways to Regulate Bitcoin


As bitcoin continues to grow in popularity, state regulators in Massachusetts and others around the country are taking a closer look at virtual currencies. Leading the regulations is The Emerging Payments Task Force, which is made up of nine state regulators from around the country. The task force will look at everything from bitcoin to mobile payments. Barbara Anthony, undersecretary of the Massachusetts Office of Consumer Affairs and Business Regulation, says that one of the key issues with regulating virtual currencies is that average consumers may be interested in bitcoin, but they are not aware of some of the risks. "Consumers and average consumers need to know that there are certain drawbacks to trading in a virtual currency," Anthony said. "The kinds of consumer protections that we're used to, people have to understand they are not available to virtual currencies." Anthony warns consumers to be aware that volatile worth and the fact that there is no central authority that guarantees bitcoin’s worth are major issues related to bitcoin.

Wednesday, June 4, 2014

Square Expands Partner Program, Integrates with Xero & QuickBooks


Mobile credit card acceptance vendor Square has launched a new software partner platform that includes integration with Xero and QuickBooks. The collaboration between Square and these companies is focused on building new applications that complement Square’s set of business services. The main integration objective is to simplify operation for small businesses in the United States. With data flowing automatically from point of sale to back-office accounting software, sellers using the software will save time spent manually inputting sales. Square initially connected with QuickBooks in November, and decided to team up with Xero as the integrations were working so well. Sellers can now link their Square and Xero accounts in mere minutes and pull past Square sales data into Xero. Essentially, the integration works the exact same as with QuickBooks. Once the software is connected, each day’s transactions will automatically import, summarize and populate the appropriate account within Xero’s general ledger, providing an accrual accounting view of cash flow. Sellers of all size are increasingly adopting Square’s business tools for their affordability and ease of use. Follow this link for more information.

Friday, May 2, 2014

Sage 50 Accounting Ending Support for Crystal Reports


With the launch of Sage 50 Accounting 2015-U.S. Edition, Sage will no longer support SAP Crystal Reports or include a license for its use within Sage 50. Customers who have a license for Crystal Reports from a previous version of Sage can continue to run Crystal Reports externally against a Sage 50 Accounting 2015 company.  Sage deems the change necessary, as customer adoptions of Crystal Reports have decreased, especially since the addition of Sage 50 Intelligence Reporting. Customers and partners who prefer to use SAP Crystal Reports may continue to do so, with Sage 50 Accounting 2015 and all other new releases, by using a Crystal Reports license that included with a previous version of Sage 50 or by purchasing a standalone license form SAP. The only change from Sage is that Sage 50 Accounting 2015 will no longer include a SAP Crystal Reports license with product purchase. Sage outlines the changes inside the software below:
  • SAP Crystal Reports viewer is no longer included in the installation.
  • SAP Crystal Reports is no longer listed in the Reports & Forms menu, Select a Report window, customized shorts cuts, or Select a Category for Find a Report.
  • The User Security Screen, Data Access/SAP Crystal Reports tab has changed:
    • Removed SAP Crystal Reports access from inside Sage 50.
    • Kept Sage 50 Data Functions so that customers with existing reports can continue to use them.
If you have any questions, please contact us!
518 Arbor Hill Rd.
 Kernersville, NC 27284
 Ph: 336-996-3338
 

Tuesday, April 29, 2014

IRS Warns Taxpayers of Phone Scan in the Piedmont


The Internal Revenue Service has released a warning about telephone scams that sound like legitimate phone calls. Scammers are impersonating IRS employees and calling taxpayers stating that money is due. The scammers will then ask for your credit or debit account number or will ask you to pay with a prepaid money card. According to Mark Hanson from the IRS, “Somebody calls you they have your name, they have your phone number, they have your social security number and they’ve also found a way to make caller ID make it appear like the call is coming from the IRS so it’s very convincing.” These scams have also been occurring through emails. The best thing to do is to not have any contact with the scammers at all. If you feel that your personal information has been compromised, you should file a report with your local law enforcement or with the Internal Revenue Service (the report can be found at www.irs.gov).
518 Arbor Hill Rd.
 Kernersville, NC 27284
 Ph: 336-996-3338
 

Friday, April 18, 2014

9 Cybersecurity Tips for Small Business Owners


Small businesses have become a large target for criminals seeking sensitive data, because they typically have limited resources or personnel dedicated to information system security. To combat cyber-attacks, the U.S. Small Business Administration recommends following these 9 tips to keep your business secure.
1.      Use the Federal Communications Commission’s Small Biz Cyber Planner: The Small Biz Cyber Planner is a security tool that walks users through a series of questions to determine which cyber security strategies should be included in their planning guide, and also generates a custom PDF that serves as a cyber-security strategy template.
2.      Establish cybersecurity rules for your employees: Establish rules regarding how to handle and protect personal information, and clearly detail the penalties for violating the policies.
3.      Protect against viruses, spyware, etc.: Install, use and regularly update antivirus and antispyware software on every computer used in your business.
4.      Educate employees about safe social media practices: Employees should be trained to post online in a way that does not reveal any trade secrets or sensitive information to the public or competing businesses.
5.      Manage and asses risk: Ask yourself what you have worth protecting, and assess the impact of that important information being compromised. Make a personalized cybersecurity plan according to what is important for your business.
6.      Download and install updates when they are available: All software vendors regularly provide updates to their products to correct security problems and improve functionality. It is best to configure all software to install updates automatically.
7.      Make backup copies of important business data and information: Regularly backup the data on every computer used in your business. It is best to backup data automatically if possible, at least once a week. Depending on your business, backups may need to be processed more frequently.
8.      Control physical access to computers and network components: Prevent access or use of business computer by unauthorized individuals, and always store and lock laptop computers, as they are the easiest targets for theft.
9.      Secure Wi-Fi networks: Always require a password for access to your business’ Wi-Fi network, and consider hiding the network so it does not broadcast the network name for further protection. Also, it is advised to change the administrative password that was on your router when it was first purchased.
518 Arbor Hill Rd.
 Kernersville, NC 27284
 Ph: 336-996-3338
 

Monday, April 7, 2014

Microsoft Ending Support for Windows XP and Office 2003


Earlier this month, Microsoft announced that it would end support for Microsoft Windows XP with Service Pack 3 Operating System and Microsoft Office 2003 products on April 8th. After April 8th, those software products will no longer receive security patches, assisted technical support from Microsoft, or software and content updates. Computer systems running the unsupported software will be exposed to cybersecurity dangers and/or electronic data loss. Users of the software may also encounter problems with software and hardware compatibility, since new software applications and hardware devices may not be built for Windows XP or Office 2003. If you are running Sage or Intuit products on a computer with a Windows XP operating system, you might want to consider upgrading your operating system to avoid any issues. For more information, click on this link. If you have any questions, please contact us!
518 Arbor Hill Rd.
 Kernersville, NC 27284
 Ph: 336-996-3338
 
 

Wednesday, April 2, 2014

Intuit Launches Intuit Apps.com


In an effort to help small business owners figure out what applications and add-ons they need to work with their software, Intuit has launched their new website: www.apps.com. This new website acts as an application depot, where current QuickBooks users can go to identify what apps would help maximize their QuickBooks Desktop or Online experience. Apps.com is available through a web browser and in QuickBooks. The group marketing manager of Small Business Financial Solutions for QuickBooks stated that the “goal with Apps.com is to generate content and create a community for small business owners to help each other better understand what apps are available to them, how these apps will improve their business and what they need to consider in order to make an informed decision when managing their business”. If you have used apps.com, tell us about your experience in the comments!
518 Arbor Hill Rd.
 Kernersville, NC 27284
 Ph: 336-996-3338
 

Tuesday, March 25, 2014

Keeping Your SSNs and TINs Secure


In 2012, the Internal Revenue Service identified more than 1.8 million incidents of identity theft, and the numbers for 2013 are expected to be even higher as the IRS increased investigations of tax-related identity theft by 66%. The most common situation that occurs during tax season is that a thief will use a stolen Social Security Number of Tax Identification Number to file a fake tax return and then subsequently claim a refund on that return. Your Social Security Number is the most important piece of your personal information, and should be protected.
 
Identity thieves can steal your Social Security Number by stealing your wallet or purse, going through your mail, hacking into your accounts on websites, rummaging through your trash, and conducting scams, such as impersonating legitimate businesses to retrieve personal information from you. To avoid the theft of your Social Security Number or Tax Identification number, store all personal information in a locked safe in your home, shred all mail and correspondence that has your personal information on it rather than throwing it away, and do not ever give out personal information over the phone unless you are the one contacting the company. If you believe that someone has stolen your identity, contact the Internal Revenue Service through this link. If you have any questions about keeping your Social Security Number or Tax Identification Number secure, please contact us!
 

Tuesday, March 18, 2014

Sage Unveils Mobile Solutions


Sage North America has officially released three new mobile solutions that connect with select Sage ERP systems: Sage Mobile Sales, Sage Mobile Service, and Sage Billing and Payment. Sage Mobile Sales and Sage Mobile Services are available through iTunes and Sage Billing and Payment is a web application that works with popular browsers. All three of these applications are delivered through the new Sage Data Cloud.
·         Sage Mobile Sales: Sage Mobile Sales allows you to link quotes, orders, and payments from Sage ERP system to the mobile app on your device. Salespeople out in the field will be able to view and edit customer information, create quotes and email to customers, check product availability, and enter orders and accept immediate payment.
·         Sage Mobile Service: Sage Mobile Service allows field technicians to optimize schedules, routes and assignments, attain customer sign-offs and take photos of projects, and allows access to the customer’s Sage ERP information. This app allows you to provide estimates and receipts through email, so customer contact is quick and efficient.
·         Sage Billing and Payment: Sage Billing and Payment gives you a choice of providing electronic or paper copies of invoices, as well as allowing the receipt of electronic payments. Electronic invoices and receipts can be sent to customers based on the preferences you choose.
If you have any questions about the new Sage Mobile Solutions, please contact us!
518 Arbor Hill Rd.
 Kernersville, NC 27284
 Ph: 336-996-3338
 

Monday, March 10, 2014

‘Glitch’ Blamed for Davidson County Overcharging Property Tax Bills


Davidson County officials have announced that a glitch is to blame for some county residents being overcharged on their vehicle tag tax bill. A new tag and tax law was started in July 2013 in North Carolina that made it mandatory for vehicle owners to pay vehicle property taxes when they purchase or renew a license tag. The glitch occurred due to the new software, which pulls addresses from the state system. If the addresses do not match exactly, by default the highest municipal tax rate in the county will be assessed on the vehicle tax bill. Prior to the new law, the county was averaging about 10 errors per month out of approximately 13,000 monthly bills. But now the county is averaging 60 refund requests each month due to the glitch. This glitch only affects vehicle property tax bills. Davidson county residents are urged to look at their bills, and contact the Davidson County Tax Office at 336-242-2160 as soon as possible if they notice the wrong tax rate listed.
518 Arbor Hill Rd.
 Kernersville, NC 27284
 Ph: 336-996-3338
 

Tuesday, March 4, 2014

Obama Administration Announces Cybersecurity Guidelines


Earlier this month, the Obama administration released its ‘cybersecurity framework’, which is a best practices guide for banking, defense, utilities and other industries to help protect against attacks by hackers. The guidelines were developed after President Obama signed an executive order that called on the Commerce Department to create cybersecurity guidelines. The framework is built around five categories: identify, protect, detect, respond and recover. The Department of Homeland Security has announced that it will start a program to help companies with the implementation of this framework, and recommends companies to take all five categories into consideration when developing cybersecurity guidelines. Major tech groups are rallying behind the framework as it increases awareness of the importance of cybersecurity, especially for big companies that have recently suffered attacks from hackers.
 
518 Arbor Hill Rd.
 Kernersville, NC 27284
 Ph: 336-996-3338
 

Wednesday, February 26, 2014

Scammers Targeting Job Seekers on Craigslist


Craigslist has become a popular tool for finding available jobs in your area. Unfortunately, not all of the jobs posted are legitimate. My Fox 8 recently posted an article concerning two separate individuals who found enticing job offers that turned out to be scams. In both cases, the “employer” sent the job applicants cashier’s checks for substantial amounts of money and asked them to deposit these checks into their personal accounts and buy money cards. If these applicants were to have followed the scammer’s instructions, the scammers would have received the money. Also, the job applicants would now have cashed a phony check and could be held responsible. If you see any suspicious job offers on Craigslist or any other website, it is best to not have any contact with the scammers at all. Experts recommend not giving out any personal information until you have confirmed that the posting is legitimate and have actually had contact with the company/person posting the ad. For the full article from My Fox 8, click here.
518 Arbor Hill Rd.
 Kernersville, NC 27284
 Ph: 336-996-3338
 

Friday, February 21, 2014

IRS App Shows Income Tax Refund Status


IRS2Go 4.0 is a mobile application from the Internal Revenue Service that was released earlier this month. This application is designed to give taxpayers access to tax information, most notably the ability to check the status of your income tax return refund. The IRS states that IRS2Go is fully encrypted so that personal information stays safe and secure. To check the status on your refund, simply enter your Social Security Number, your filing status and the anticipated amount of your refund, and IRS2Go will show the current status of your refund. Users can check the status of their e-filed return refund after 24 hours, and the refund for their paper return after four weeks.
518 Arbor Hill Rd.
 Kernersville, NC 27284
 Ph: 336-996-3338