DON’T GET HACKED – 10 STATS THAT WILL SURPRISE YOU & 5 WAYS TO PROTECT YOUR BUSINESS

At nearly $1 Trillion in earnings a year, hacking is now at record proportions. Your data is a valuable asset, not only to you but to criminals as well. Don’t get hacked.

Don't Get Hacked

Here’s what you need to know.

  • 1 in 3 Americans has been hacked.
  • A hacker attacks someone every 39 seconds.
  • 61% of small businesses experienced a cyber-attack within the past year.
  • The average cost of a data breach in the U.S. is $7.35 Million.
  • $5 Billion was lost due to hacking in 2017. This is more than 15 times the total losses in 2016. Most of this cost was due to data breach fines, downtime, and productivity losses.
  • 54% of breaches are caused by negligent employees who click on suspicious websites and emails.
  • 20% of businesses experienced downtime of over 100 hours due to ransomware attacks.
  • 64% of businesses paid ransoms even though paying doesn’t guarantee that data will be returned.
  • The anticipated cost of cybercrime in the next 3 years is $6 Trillion.

The pool of cybersecurity experts is shrinking. By 2021 there will be 3.5 Million jobs that can’t be filled. The demand for security experts is increasing and is outpacing the supply.

5 THINGS TO DO RIGHT NOW

 Ignore Ransomware Threat Popups and Don’t Fall for Phishing Attacks.

These attacks say that your data will be encrypted so you can’t access it, but in many cases, this isn’t true; it’s just a ploy to get you to click on something harmful. Once you click on the link, then you’re in trouble. You may have to pay a ransom to get your files unlocked.

Ransomware is a type of malicious software (malware) that blocks access to a computer. It infects, locks, or takes control of a system and demands a ransom to unlock it. It’s also referred to as a crypto-virus, crypto-Trojan or crypto-worm. It then threatens that your data will be gone forever if you don’t pay using a form of anonymous online currency such as Bitcoin.

Phishing is when a scammer uses fraudulent emails, texts, or copycat websites to get you to click a link so they can steal your confidential information. Thieves are looking for information like social security numbers, account numbers, login IDs, and passwords. They use this information to rob you of your money and your identity. The odds are good that phishing will work. A campaign of 10 messages has a better than 90% chance of getting clicked on. The majority of account takeovers come from simple phishing attacks where you or someone in your organization gets tricked into releasing private credentials and information.

Use Hard-to-Guess Passwords and Two-Factor Authentication.

Use complex passwords with 9+ characters and don’t reuse passwords across your different accounts. Consider using a password manager like LastPass. For accounts that support this, two-factor authentication is an extra step worth taking to ensure the privacy of your data. It requires both your password and an additional piece of information to log in to an account. The second piece could be a code the company sends to your phone or a random number generated by an application or token. Two-factor authentication will protect your account even if your password is compromised.

Secure Wi-Fi With a Virtual Private Network (VPN).

Hackers now emulate free open Wi-Fi to steal your IDs and passwords. You can be fooled when you try to login to free Wi-Fi in airports, restaurants, and other public areas. When this happens, everything that you type is copied and archived by these criminals and used against you. Using a VPN encrypts your Internet connection and protects your privacy. When you connect to the Wi-Fi over your Virtual Private Network, no one can see the information you send, and your privacy is safeguarded at all times.

 Back Up Your Data.

Store data both onsite and offsite in a secure Enterprise-Based Cloud System. Back up your files regularly to ensure you have a duplicate of all your files and applications if your network is compromised. Traditional data backups can’t always restore all of an IT system’s data and settings. This is why you need both an onsite backup and a reliable backup via the Cloud. An enterprise-based cloud backup solution safeguards your data and ensures that it’s recoverable under any circumstance.

 Hire a Reputable Technology Solutions Provider to Help.

A reputable Technology Solutions Provider can deploy a layered security protocol with regular software patches, vulnerability management, and continuously-updated endpoint protection. They can also provide Security Awareness Training for your employees to help them recognize potential threats. With the right provider, you’ll boost your defense posture and decrease the likelihood that a data breach will take down your business.

Don’t get hacked. Contact us, and we’ll keep your data secure.

Has Your Dallas Tech Company Told You To Buy Something But Never Helped You Set It Up?

It’s the same old story time and time again… your Dallas IT support provider tells you what to buy, then leaves you holding the bag. NCT Net, on the other hand, is here to help you – every step of the way.

Dallas IT Company

Don’t be embarrassed, it’s happened to everyone.

There was a new client I worked with just last year. They came to me with a problem I’ve encountered over and over.

They said, “My last IT company said I needed to buy this, but they never really helped me set it up or get it working right. It’s just been a waste of money”.

It doesn’t really matter what the technology is. Sometimes it’s a new firewall, sometimes it’s a Wi-Fi router. That’s not what’s important.

How Other Tech Companies Keep Failing You

Dallas IT companies like the one this client had to deal with making two huge mistakes when they do something like this:

They assume that the right technology is all that’s needed.

It’s a hallmark of bad IT support. You go to your Dallas IT support provider with a problem, they take a cursory, Tier-1 glance at it, and decide that the solution is just to throw money at it. Your money, not theirs.

There are a few things wrong with this scenario:

  • You have to go to them. The right partner in IT doesn’t wait for you to come to them with problems – they assess your business, identify your obstacles, monitor your systems, and do everything they can be proactive about support. They notice issues before you do, and eliminate them before it affects your work.
  • The solution is more money. While it may eventually be the solution, more often than not, a bad Dallas IT support provider is just going to tell you to spend money. New hardware, software, or something else.

    It’s like when you call tech support for your cable box at home. An engaged and capable technician will try a few options before deciding to roll a truck and incur further costs to you or the company they represent. Lazy technicians go right to rolling a truck and getting you off the line.

We’re not like lazy phone support technicians or other Dallas tech companies for that matter – NCT Net is proud to offer Proactive Managed IT Services that follow a proven process that identifies our many clients’ needs, matches them to effective solutions, and keeps their costs as low as possible.

They don’t help you set up the technology.

It seems like a no-brainer, but let me tell you, it’s extremely common for clients to be left fending for themselves when it comes to installation, configuration, and deployment of their new tech.

The reality – setting up your technology isn’t your job. It’d be like hiring someone to furnish your home, but instead, you’re left trying to interpret the IKEA instruction manuals for hours.

In the case where an investment in some kind of new technology really is necessary, we don’t ask you to front the bill and then leave you to figure it out on your own. Our team of expert engineers is available to help in person or over the phone as need be to ensure your new technology is properly installed, configured and deployed.

That way, you get the best possible ROI on your investment – both in our services and the new technology.

Dallas IT Consulting With Your Needs In Mind

With each step your Dallas business takes in becoming a more developed and profitable operation, you need to be sure that your IT systems can support its growth. Arranging one-off consultations with other Dallas IT companies is inconvenient and expensive, but without the right knowledge, your technology may fail to meet the requirements of the next stage of your business.

NCT Net is available to consult on every big decision that involves technology. Proper planning not only helps you to avoid technological missteps that can often result in IT issues, but it also adds further value to your company as it develops effectively.

With your specifics in mind, our team helps you to develop long-term IT plans that take into account important factors like your budget, projections, customer and employee needs and business goals. Ongoing assessments of your IT infrastructure will help to identify any risks or opportunities that should be accounted for as your company expands.

In a nutshell? Our Dallas IT Consulting services offer business and technology expertise that helps your company plan effectively for the future.

Just because you run a business that needs IT, that doesn’t mean you have to be an IT expert. Let NCT Net take the stress out of business technology by providing invaluable IT advice on each and every business decision you deal with.

For more information about our Proactive Managed Services and IT Consulting Services in Dallas, get in touch with NCT Net at (214) 544-3982 or support@nctnet.net.

Data Protection and Regulatory Compliance

In this age where cybercrime is on the rise, it has become increasingly important to ensure the protection of data. Much of the company data today contains critical and sometimes very personal information. The release of such information would expose the person responsible for liability for breach of confidentiality. Identity theft is on the rise. Sometimes it seems that no one’s private information is safe from intruders. These crimes have undesirable effects on the affected organization, the individual, and the economy. It is imperative that appropriate measures be taken to ensure data protection.

Measures in place

There are various measures that have been put in place to ensure data protection. Persons and organizations dealing in data are usually required to adhere to these measures. An example is the Data Protection Law. This Act mandates protection of all data and puts in place mechanisms to ensure the achievement of this objective. Secondly, this Act creates bodies which are authorized to confirm that these new laws are carried out correctly. It also punishes non-adherence, thus providing the right incentives for persons dealing with data to ensure that they comply with its requirements.

Apart from the Data Protection Law, various regulations have been passed that have a responsibility to protect data by providing guidelines for handling another entity’s information. Regulations are important drivers of laws. Basically, while laws provide the framework that needs to be adopted and followed, regulations provide enforcement and implementation mechanisms.

Without proper regulations, laws cannot be well understood and implemented. The regulations that govern data protection are clear as to the measures and standards that need to be employed for compliance with the Data Protection Law. Compliance with these regulations not only benefits the person whose data is at risk of exposure, it also protects the person holding the data. In the long run, compliance saves the organization and the country a lot in monetary losses. The cost of one data breach is about $1.3 million.

Compliance with regulations

Various measures have been adopted by data users and processers to comply with the rules and regulations. Data processors generally attempt to find the easiest and most cost friendly way of data protection. This may include the use of software specifically designed to make it hard for hackers to break into a computer system. While there are a variety of software programs for this type of data protection, the time-tested Microsoft Office 365 package provides a broad range of services.

Compliance with regulations has the following benefits:

  • Provides uniform benchmarks since the regulations and standards define the minimum bar for protecting data in the cloud.
  • It acts as a proof of security as organizations are motivated to design better security controls to build trust with the customers.
  • It is a proactive innovation since the regulatory bodies encourage and work with cloud service providers to create better technology.

Office 365 offers an inclusive set of certifications and proofs for any cloud service provider. They help organizations comply with national, regional, and industry-specific requirements governing the collection and usage of an individual’s personal information.

Shared responsibility

Unlike most software providing data protection services, the Microsoft Office Package allows for shared responsibility through the cloud. This responsibility is mutual between the data processor, known as the client and the cloud service provider. The client is required to manage the risks that are associated with inadequate data protection or data leakage for his or her end. This ensures responsibility and removes all risks of negligence by the client. At this point, data classification and data accountability is done. This shared responsibility model reduces the customer’s burden.

Shared responsibility may not be as easy as it sounds. The client has to know exactly what is required of him or her and how to meet these requirements. Since these are mostly technological and the client already has his or her hands full with the data processing, it may be difficult to find time to learn and implement shared responsibility.

While Microsoft is well equipped to maintain its end of the bargain, they understand the difficulty that clients face in maintaining their end of it. As such, Microsoft takes it upon themselves to equip their clients with the tools and knowledge required to ensure accountability on their part. An example of how this works is seen in Office 365. This software uses lockboxes to restrict access to data. Clients are given access thus making them a part of the chain-of-command required before access to the data is gained.

This business model helps to reduce the customer’s burden. Microsoft handles the larger part of accountability, which is 78% while the organization is responsible for 22% of the burden.

Wrap up

Microsoft Office 365 contains over 1,100 controls that coordinate with different regulatory requirements. This helps to counter any threat that can be imposed from anywhere across the globe. In addition, it assists individuals and businesses in staying up to date with the ever-evolving industry standards in data protection.

Office 365 Compliance Manager

Remember Why We Celebrate Memorial Day

When we think of Memorial Day, we have visions of parades, going to the beach, enjoying a picnic in the park, or gathering with family and friends for a barbeque. But, as most of us know, this is a special day to honor military members who made the ultimate sacrifice for our country. Many of us will be visiting the gravesites and memorials of the men and women who served and died performing military service for our country.

The History Of Memorial Day

This year, Memorial Day is on Monday, May 28th. Memorial Day was first known as Decoration Day. It originally honored only those who lost their lives while fighting in the Civil War. In the spring of 1865 at the end of the Civil War, people throughout the U.S. held tributes to fallen soldiers by decorating their graves with flowers on Decoration Day.

General John A. Logan of the Grand Army of the Republic, proclaimed that the first Decoration Day be observed each year on May 30th.  On the first Decoration Day, General James Garfield made a speech at Arlington National Cemetery where 5,000 attendees decorated the graves of the more than 20,000 soldiers from both the Union and Confederacy. It was during this time that the federal government established the first national cemeteries.

Americans in the northern states followed suit with their own commemorative events, and by 1890 each recognized Decoration Day an official state holiday. Southern states honored their dead on separate days.

After World War I, the holiday evolved to commemorate American military members who died in all wars. In 1966, the federal government declared Waterloo, New York as the official birthplace of Memorial Day. They chose this city because, on May 5, 1866, Waterloo closed businesses so residents had a day where they could decorate the graves of soldiers.

However, a number of other cities claim to be the birthplace of Memorial Day. These include:

  • Columbus, Mississippi
  • Richmond, Virginia
  • Macon, Georgia
  • Carbondale, Illinois
  • Boalsburg, Pennsylvania

In 1968, the U.S. Congress passed the Uniform Monday Holiday Act, which established Memorial Day as the last Monday in May. It went into effect in 1971 and Memorial Day has been designated a federal holiday ever since.

In the year 2000, President Clinton signed the “National Moment of Remembrance Act,” which designates 3:00 p.m. local time on each Memorial Day as the National Moment of Remembrance.

Today, cities and towns across America hold Memorial Day parades each year along with military personnel and members of veterans’ organizations. Some of the largest parades take place in Washington, D.C., New York, and Chicago.

What Will You Be Doing On Memorial Day?

When Congress made Memorial Day into a mandatory three-day weekend with the National Holiday Act of 1971, it, unfortunately, caused some to think of it as a vacation weekend and to be distracted from the spirit and meaning of the day.

Some people confuse Memorial Day with Veterans Day. Veterans Day is a commemoration of all the individuals who have served or are currently serving in the nation’s armed forces.

Memorial Day was specifically enacted to honor those who died while serving the country. Because we also think of it as a “beginning of summer” celebration, this can tend to minimize the true meaning of Memorial Day.

Because of this, Hawaii Senator Daniel Inouye, a World War II veteran, introduced a Congressional measure to return Memorial Day to May 30 in 1987. He continued to do so every year until his death in 2012. In 1999, he wrote:

“Mr. President, in our effort to accommodate many Americans by making the last Monday in May, Memorial Day, we have lost sight of the significance of this day to our nation. Instead of using Memorial Day as a time to honor and reflect on the sacrifices made by Americans in combat, many Americans use the day as a celebration of the beginning of summer.” 3

Honoring Our Fallen Military Members

Without the sacrifice of the men and women in our Armed Forces, we wouldn’t enjoy the freedoms we have today. Even if you’re having fun celebrating this Memorial Day holiday, we should all take a moment to remember them.

Civil War – Approximately 620,000 Americans died. The Union lost almost 365,000 troops and the Confederacy about 260,000. More than half of these deaths were caused by disease.

World War I – 116,516 Americans died, more than half from disease.

World War II – 405,399 Americans died.

Korean War – 36,574 Americans died.

Vietnam Conflict – 58,220 Americans died.

Operation Desert Shield/Desert Storm – 383 service members died.

Operation Iraqi Freedom – 4,411 service members died.

Operation New Dawn – 73 service members died.

Operation Enduring Freedom – 2,346 service members died.

Operation Freedom’s Sentinel – 48 service members have died as of May 2018.

Operation Inherent Resolve – 61 service members have died as of May 2018. 1

A national moment of remembrance occurs at 3:00 p.m. local time on Memorial Day. Please join us in taking the time to remember and thank all of our fallen military members.

  1. https://www.cnn.com/2013/05/23/us/memorial-day-fast-facts/index.html
  2. https://www.history.com/topics/holidays/memorial-day-history
  3. http://people.com/celebrity/why-happy-memorial-day-is-inappropriate/

Memorial Day

Codename Redstone 4, the New Windows 10 Version 1803: Key Changes and New Features for the April 2018 Update

Microsoft has released the fifth major update to its Windows 10 operating system, complete with a whole bevy of exciting changes and helpful features. This latest iteration is designed to improve performance and productivity while focusing more on security.

Microsoft Windows 10 Redstone

The Windows 10 April 2018 Update has been codenamed, Redstone 4 and is now available worldwide for updates to any device running a Windows operating system. It includes a better array of media creation tools in order to meet the growing demands of users who enjoy posting to Instagram and Pinterest.

There are quite a few solid features with this new release that should make life a little easier for those who use their smartphone for just about everything. However, there were major additions to desktop and laptop computers as well. Microsoft is focused on improving its browser, MS Edge, but Chrome is still the preferred choice for most users. Other improvements to Windows Subsystem for Linux and Windows Defender should increase the product’s flexibility and security.

Cortana carries the day on the desktop experience

There are substantial changes to the Cortana assistant. The new Windows version has experienced a complete overhaul of the Cortana Notebook. It now features tabs and card-based items making it more responsive and easier to use. Lists and reminders are now on the organizer tab and the options to change most of the Cortana settings are now on the Manage Skills tab.

The default skill in the Notebook on Cortana now features a set of tips for questions that you can ask Cortana to get you started. To use this feature, you can either type the question, tap the suggestion, or simply talk to Cortana and the information you want will pop up.

Cortana’s Notebook is now available in more countries and in more languages, with quite a few performance improvements. Not to mention that you’ll now see your account picture in the left rail going forward.

There is something else that’s new with the Lists experience on Windows 10: Cortana Collections. This is an addition that allows Cortana to notice and remember things like restaurants, recipes, movies, books, TV shows, and more for you without you necessarily having to do anything.

What’s new on the desktop

Right-clicking the Windows Defender Security Center icon on the desktop now brings new options including:

  • A quick scan
  • Update definitions
  • Change notifications
  • Launch the Windows Defender app

OneDrive in File Explorer now shows a cloud status icon that tells you the sync state of files on the various folders.

Windows 10 has introduced a new Game bar with a fresh design, settings that are easier to use, and an updated clock. You’ll also see new buttons to turn on the microphone and camera and capture and edit your Mixer stream title.

The Start menu now includes Reveal highlights, an interactive visualization feature that helps you navigate and interact with apps. This feature will be noticeable while hovering over items in Live Tiles and the “All apps” list. Furthermore, right-clicking the Microsoft Store app and selecting the More option now brings a menu with a Settings option included. Clicking this takes you straight to the settings page for that app.

Action Center on the new Windows now supports a two-finger touch gesture to dismiss all notifications. It also automatically saves as drafts any notification responses dismissed by accident. The “a” / “p” format for indicating the 12-hour clock timestamp has changed to “am” / “pm”.

Nearby Sharing. This is a new feature on the updated Windows 10 that allows for sharing of web links and files wirelessly to nearby devices via Wi-Fi or Bluetooth connectivity.

Changes and additions to settings experience

The Windows Settings app has received a major facelift. It now features an innovative homepage with smaller icons and their titles to the right.

Microsoft has introduced a house icon for the home button, acrylic material effects on the left side of sections, and a lot of other improvements and tweaks to various categories of settings. This includes three new automatic rules under Focus Assist (formerly Quiet hours), an option for changing the font that the system uses (under Pen & Windows Ink). You can now select your own security questions as an option for recovering your account in case of forgotten sign-in information.

Major change on input

Microsoft has updated its Emoji panel data so that it will show emojis as you type related words using the touch keyboard.

Microsoft system additions

Microsoft is phasing out the HomeGroup service in favor of the more contemporary sharing tools like Share, OneDrive, and Nearby Sharing.

Many users will love the introduction of Windows Defender Application Guard to their default antivirus program, Windows Defender. This addition is a security feature that isolates pages you are viewing on Microsoft Edge from Windows and from one another as a way to provide an additional layer of security from malware and zero-day attacks.

Finally, it is now possible for Windows Subsystem for Linux (WSL) on Windows 10 to run mixed instances of Linux. The process can also now run in the background even after closing the console.

As you can see, Microsoft has been working hard to make its Windows 10 software the best it can be. We hope that you find this guide informative and as useful as the Windows update itself.

It’s Hurricane & Tropical Storm Season On June 1st –But Alberto’s Already Here!

The Hurricane and Tropical Storm Season officially starts on June 1st. But we heard just now that Louisiana sent out storm and flood warnings for Alberto.

Tropical Storm Alberto

Alberto is a strong tropical storm that’s been gathering strength in the Gulf of Mexico for a few days. It’s not too late to prepare, especially if you live in New Orleans, Baton Rouge, anywhere in Louisiana or along the Gulf Coast.

It only takes one storm to change your life, your business, and your community.

Hurricanes are among nature’s most powerful and devastating storms. But, tropical storms can sometimes be just as bad. If you live or work in an area prone to hurricanes, or even areas well away from coastlines that can be hit with dangerous flooding, destructive winds, and tornadoes, you need to get ready now.

What should you do?

Follow these basic steps to protect your business:

  1. Establish a business-continuity/disaster-recovery plan for your technology. Back up your data to a secure offsite location. If a hurricane or tropical storm strikes your area, and you lose power, or your place of business is damaged, a properly implemented plan ensures you can retrieve your critical data and services.
  2. Consider cloud services. Data centers have systems in place to protect them from the most violent storms.  Almost everything can be stored in the cloud today, from email servers, desktop systems, telephone services and much more.  Storing your business data and services in the cloud ensures that if your office is out of commission, your business isn’t.
  3. Install power-protection systems and backup power. A generator is a great investment to provide alternate power if a hurricane shuts down your electricity. Generators can run for days, providing power to critical systems and battery-backup systems.  It allows for all systems to be properly shut down and protected from surges when power is cut and comes back on.

There are many more Hurricane and Storm Readiness strategies that your business should establish. 

We’re here to help. If you need confirmation that your computer systems, backups, and telephones can survive the next big storm, we can check this out for you.  

Delphi Systems Engineer Achieves Datto Certification

One of our talented staff members has gained a key certification that will allow our team to further improve service quality to clients: Level 2 Datto Specialist.

Datto

 

Delphi Systems is thrilled to announce that network engineer Alex Moore is now a Level 2 Datto Technical Specialist!

Alex passed the Datto Technical Specialist Level 2 certification exam with flying colors, earning a certification that will allow them to provide more insightful and skilled troubleshooting and networking services for businesses that rely on Datto solutions. When our technicians put in the time and effort needed to build new skill sets and expand their knowledge bases, our business — and more importantly, our clients — benefit from the results.

Datto is an industry leader in backup and business continuity thanks to their near-decade of experience and comprehensive expertise in the field. Many — including the Delphi Systems team — consider their systems to be the “next generation” of backup systems.

With more than 8,000 partners around the world, Datto offers a range of solutions to care for data requirements from 150 GB to 100 TB:

  • Datto SIRIS 3
  • Datto ALTO XL
  • Datto ALTO 2
  • Datto NAS.

The foundation of the majority of Datto’s solutions is the physical hardware appliance.  In most cases this appliance continuously takes snapshots of all servers (Windows/Mac/Linux), and maintains efficiency because it only synchronizes data that has changed since the last snapshot, therefore reducing the overall impact on the servers in question.

After checking the images for consistency, the Datto appliance uploads them to a data center on each coast. Once per night, the appliance mounts the images and runs them as a VM – checking to make sure they boot properly, as an automated backup integrity test. Should the images fail to boot, alerts are issued system-wide.

We do not hesitate to recommend Datto for nearly all typical business data protection needs. Recoverability is a focus with Datto, and you will definitely get your systems back up and running in the event of an outage.

Alex’s newly-gained level of expertise enhances the services we’re able to offer to our clients’ businesses, and we couldn’t be more proud of Alex’s accomplishment. Congratulations!

Want to learn more about our IT expertise and the many solutions we offer? Get in touch with Delphi Systems right away at (403) 380-3343 or info@delphisystems.ca.

Technological Challenges Faced by Accounting Firms

Changes in technology come with a variety of challenges. First, there is the need to change and adapt to the new advancements. There are always financial costs associated with this process. The effects of technology are often widespread. Some people are concerned that new products and programs will put them out of work. The new developments in robotics are a good example. Many workers are concerned that their jobs will be taken over by robots in the future.

Accounting Firms Technology

If the past is any indication, this will not happen. What usually occurs is that the human workers do see a shift in the type of work they do, but they rarely are put out of work completely. Often, technological changes are a good thing. They make everyone’s job easier and remove all those boring, redundant tasks that no one wanted to do in the first place.

Technology in the accounting sector

The world of accounting has attracted numerous technological discoveries. These new programs reduce the error margin which leads to a more reliable outcome. Accounting programs can perform most tasks much easier than human beings and with more accuracy. This saves time and money for both the accountant and their customer. In the past, errors in financial reports or tax returns could cause quite a bit of trouble for everyone involved. With a good accounting program and someone to input the correct data, these errors are greatly reduced.

Stiff competition

Technology has increased the competition for accounting firms. Before the adoption of technology, accounting firms depended mostly on the skills of the employees of the firms. This meant, therefore, that competition was shaped by the accuracy and expertise of the workers in a firm. The credentials of an accounting firm’s employees went a long way in attracting a clientele.

In the world today, however, competition among accounting firms is shaped by technology. The first question that today’s client wants to know is which accounting software do you use. Everyone has a favorite accounting software and some people have a distinct dislike of certain programs. The one thing that software developers have learned over the years is to make all software as user friendly as possible. Accounting programs that require a genius to figure out don’t last very long. Everyone is searching for something they can learn quickly.

Increases in accounting fees

Modern accounting firms have raised their fees over the years, but so have all the other professions. Just try finding a lawyer who will work for $100 per hour. This was once a huge amount of money but today’s attorney’s charge an average of $300 per hour. Technology hasn’t made their fees any cheaper but it does make the job of billing clients much simpler.

The increase in accounting fees is attributable to a wide range of factors. The software purchase, maintenance, and renewal of licenses can be a big initial expense. Of course, with each new program that is released, that expensive software you just purchased may become obsolete overnight. For this reason, many accounting professionals choose monthly subscriptions. This concept allows an accounting firm to get the most advanced software on the market. The monthly subscription fee includes regular updates. This means that your software will never be obsolete. Usually, regular maintenance and support is included in your monthly charge as well. Many websites include training for your employees.

Most accountants will say that they enjoy and appreciate this type of convenience. They can focus on working with their customers. They don’t even have to think about whether their software is working okay and contains the latest changes in tax law. Everything works like it’s supposed to and if you have a problem, simply call the vendor and they will fix things straightaway.

Accounting programs do everything from reconciling bank statements to sending invoices to customers. Though these programs will never replace humans, they make their work much easier. They give the accountant time to find ways to help their clients save money.

Filing taxes

This task has always been stressful for individuals and business owners alike. There’s just no getting around paying your taxes though. Benjamin Franklin said that nothing in this life is certain except for death and taxes. Whether you own a small business or work for an employer, doing your taxes on time and correctly each year is imperative. If accounting software didn’t do anything except our taxes, it would be well worth it.

A good accounting program can help you keep track of your expenses throughout the year. You no longer need a shoebox for all those receipts. When it’s time to file your taxes, you can import all that data into the tax filing software and save yourself lots of time. Many people are still not comfortable doing their own taxes and since IRS penalties are often severe, it may be best to hire a good accountant to do them for you. Tax time is the busiest time of year for accountants.

Final thoughts

For accountants, technology has overall been very positive. The role of accountants has changed because of reliable software programs like Xero. Your accountant has the time to talk to you about saving money on your tax return, investing in new property, and ways to save on supplies. The role of the accountant has changed some due to technological advancements, but the changes have all been good.

Non-Profit Digital Developments for 2018

Succeeding in a non-profit organization in this day and time requires unique strategies. Technology is advancing at ever-increasing speeds and challenges even the best organizations on every level. The world has seemingly gone completely digital with Millennials now using smartphones for everything they do.

Nonprofits digital

A recent survey showed that only one-fifth of all Millennials have ever written a check.  And yet, checks are the most popular way that people have given to charities in the past. Today’s consumers rely on electronic payment methods such as Paypal, Venmo and Apple Pay. This applies to their charitable giving as well. While Baby Boomers and Gen X are still largely using an organization’s website for their giving, the new generation of consumers uses their mobile phones.

People enjoy supporting a good cause

Surveys also show that Millennials are conscientious about charities. They have a deep abiding desire to help make the world a better place and they’re willing to give their time and money to make this happen. The best solution is to make it as quick and easy as possible. More and more charitable organizations are learning this lesson. Going mobile and digital provides you with unique ways to make the giving as painless as possible. Large organizations like the Red Cross, give you the ability to donate by texting an amount of money to a 5-digit number. It’s just that easy. There’s nothing to fill out. No credit card information to worry about.

In a highly digitalized world where new inventions amaze and amuse us all, nonprofits face a more critical challenge than others when it comes to fund-raising. In the past, non-profits have been seen as entities that were slow to accept change. Some charities continue to do business the way they always have. This has prevented them from maintaining proper relevance in our world. In order to influence social change, non-profits must stay ahead of the curve.

Dealing with a tight budget

If nothing else gets the attention of these older, less-flexible non-profits, their tight budgets will. Effective fundraising is all about appealing to today’s savvy consumer. It’s about getting their attention with a message that speaks to the heart.

On the journey to change the world, a non-profit must increase their revenue while continually managing their resources wisely. People don’t give to organizations who waste resources and ignore their relationship with constituents. Most charitable givers want to support organizations that strive to make every dollar count. Below are a few additional tips for today’s non-profit organization.

Tell a compelling story

Most charities do have a good story about how they began. Perhaps the Director went through a rough time and was homeless for a period. Now he or she is helping other homeless people turn their lives around. Many times, when people go through a really rough time in their lives, they want to somehow make things better for others who will travel the same road. Take the time and spend the money to hire a professional writer to flesh out this story so that it’s compelling and heartfelt. Sharing your story with others is a way to endear people. It’s an excellent method of moving from a distance right into someone’s true lifestyle.

Improve constituent relationships

Stay in constant contact with your givers. Be sure to make those communications as interactive as possible. Send regular updates about how your organization is doing or current projects you’re involved in. Don’t let your only contact with the public be all about donations. Make people feel like they are part of something dynamic, something that matters. It may be a good idea to have a team that focuses only on relationships with donors.

Stay relevant

Some organizations purposely stay out of politics, religion, etc. Though it’s difficult to walk that tightrope between staying relevant and remaining neutral, this is important for most people today. If there are earth-shaking events going on around the world, find a way to talk about these things in your monthly newsletter without being preachy. Many times, global disasters and political unrest can be a time to connect with your core base and see how they feel about these events. It can be a time to create stronger bonds with supporters if handled correctly.

Make it easy for supporters to give time and money

Make donating as flexible as possible. Meet people exactly where they are in their lives. An older person may want to mail a check, while a teenager will want to use a mobile wallet. Middle-aged people still pay bills, donate to charities and conduct other business online. They trust the internet and have become comfortable with surfing the web. Regardless of where someone is in terms of their technology level, meet them there where they feel safe.

Understand the demographics of givers

Demographics are an important tool used by marketing agencies. Specific data about consumers is collected and broken down so that it reveals personal information about customers. For instance, if you’re selling sports cars, you’ll want to reach a younger group of people with lots of expendable income. Paint a picture of exactly who your primary customer is. Someone looking for an expensive sports car might be a male 20-35 years old whose income is over $200k per year. Just the same way marketing agencies need this information about potential buyers, a charitable organization does as well. When you know your supporters personally, you can connect with them on a more human level. That’s when your organization will finally achieve its mission statement and goals. This is also where organizations begin to make the most difference in the world.

Final Thoughts

With the world changing so rapidly, it’s no wonder that technological advancements sometimes astound us. A non-profit cannot be seen as inflexible and antiquated if they want to compete. Though their values should always remain old-fashioned, the way they operate must be on a level with a Fortune 500 company. An organization must stay up to date on our evolving society. Attitudes change and they can do so quickly with the great flux of information coming at us each day. Stay in tune with these events and you’ll stay connected with a group of donors who are excited about supporting your cause.

GDPR AND AMERICAN COMPANIES

Today is the day…doing business in the EU?  You need to be compliant with GDPR.

Watch our informative GDPR training online today.

GDPR Compliance

The General Data Protection Regulations (GDPR) have made headlines for some time now and the deadline for compliance is fast approaching. Many have wondered why these regulations are so important and whether they will be affected. If your business is located in the United States or Canada, why do you need to be concerned?

What are the General Data Protection Regulations (GDPR)

The GDPR are European Union Data Protection Regulations designed to protect the personal data of consumers in Europe. The regulations have put in place various measures to ensure that personal data is well protected from hackers. In this age where the cases of hacking and cyber-crimes are on the rise, these measures are crucial. The new regulations will come into effect on 25th May, 2018.

These regulations govern various aspects of data handling. They govern methods of handling data collection, data storage, data processing and data destruction. These regulations apply even when there are no financial implications in the transaction. Many organizations will be affected including companies that monitor the behavior of EU residents. They also cover anyone in the world who does business with a company in Europe. This includes many Canadian and American companies. If your business buys, sells or transacts business with a European company, then you must adhere to the provisions of the GDPR.

What happens in the case of non-compliance?

The GDPR requires that all companies that handle or deal with personal data belonging to European Union citizens comply with the regulations. Companies that fail to comply with these regulations will receive penalties and fines. The penalty imposed is calculated based on the company’s global annual turnover of the preceding financial year. It is set at 4% of the global annual turnover of the company or €20 million whichever is greater for non-compliance. Companies that are found guilty of less serious breaches of the regulations are faced with a penalty of 2% of the company’s global annual turnover or €10 million, whichever is greater.

How do these regulations affect United States based companies?

The GDPR rules apply to all companies that deal with data affecting or belonging to EU citizens. This means that people who own data processing companies with a global outreach are affected by the regulations. As has been noted, simply collecting data, even before financial agreements are reached puts the company within the purview of these Regulations. The GDPR also affects companies that deal in surveillance and monitoring of behavior, so long as the data collected belongs to a citizen of the EU.

How to comply

Knowing that the GDPR applies to your company and that the penalties for non-compliance or for breach are dire, it is important that all companies affected by these regulations take steps to ensure compliance before the May 25th deadline. There are various ways of complying with these regulations including:

Conduct an audit of your company

This enables the owners of the company to decide exactly which steps to take to comply with the regulations. The questions that you need to ask yourself while conducting this audit include; how is your data collected, where do you store your data, why do you collect that particular kind of data and when you are done with the data, how is it destroyed?

Audit your data service providers

You need to be sure that your service providers are GDPR compliant. This will ensure that the services that they provide to your company adhere to the provisions of the regulations.

Be sure that you understand new regulations

One particular regulation that may differ from general data protection regulations is the right to be forgotten. This basically means that citizens of the European Union reserve the right to request that their data be deleted from computer servers. EU citizens also reserve the right to have their data kept in a particular format and to have it transferred to another company at their request.

Determine the data handler category in which you fall

The GDPR categorizes data in two distinct categories:

  • Data handler- defined as a company that processes personal data on behalf of a data controller
  • Data controller – the person with authority over the collected data

The controller decides which data should be collected, in what format the data should be collected, how the data is to be stored and used, and how it is to be destroyed. The GDPR stipulates different regulations for various categories of data handlers. Knowing the category in which you fall will thus enable you to know which regulations are applicable to you.

Final thoughts

If you have not read the General Data Protection Regulations, it’s important to do so as soon as possible. As you can see, the requirements for adherence are demanding and the cost of non-compliance is quite hefty. It’s vital for every company that does business in Europe to know and understand these regulations. European authorities have stated that they will impose stiff penalties to make an example of companies who do not comply.