Built-in Security in Sage Intacct Ensures Online Safety

Security isn’t something that can be taken lightly. It can’t be put on the back burner while you work diligently to serve your customers and clients.

According to Forbes, in 2023, more than 353 million people were impacted by data breaches, and the price tag for cybercrime is staggering:

  • The total cost of damages incurred by cybercrime is expected to reach $10.5 trillion by 2025.

  • An organization loses $1.3 million in the average data breach.

  • The average cost of an organization detecting and escalating a data breach is $1.58 million.

You can’t ignore these statistics, but what you can do is rely on your accounting software to have the security features you need, without worrying about something bad happening.

Certum Solutions recently began offering Sage Intacct as a solution for larger companies who may have outgrown QuickBooks Enterprise. One of the features built-in to Intacct is robust security. Here’s how it works (source: Sage):

Encryption and Key Management

Intacct provides protection of customer data through a combination of access controls and encryption. Encryption is required if:

  • Customer data is transmitted over public networks.

  • The use of encryption is mandated by law or regulation, such as how you handle credit cards via the Payment Card Industry Security Standards Council.

  • Intacct determines that encryption is necessary to protect customer data.

When data is transmitted over public networks, or private or public wireless networks, you can expect:

  • Use of strong cryptography and encryption techniques (at least 128 bit), such as Secure Sockets Layer (SSL/TLS) or Internet Protocol Security (IPSEC) to safeguard sensitive data.

  • For wireless networks transmitting customer data, the transmissions are encrypted using Wi-Fi Protected Access (WPA) technology if WPA capable, otherwise VPN or TLS at 128-bit.

When encryption at rest is mandated by law or regulation, or Intacct determines that encryption is necessary, sensitive customer data is rendered unreadable anywhere it is stored (at rest), by using some of the following approaches depending on these three circumstances:

  1. One-way hashes (hashed indexes) such as a secure hashtag algorithm.

  2. Truncation.

  3. Strong cryptography, such as Triple-DES 128-bit or AES 256-bit with associated key management processes and procedures.

When encryption is required:

  • Access to keys is restricted to the fewest number of personnel necessary.

  • Keys are stored in the fewest possible locations using measures designed to prevent unauthorized disclosure.

  • The software prevents an unauthorized substitution of keys.

  • Replacement of known or suspected compromised keys occurs.

What You Need to Know

We know that this information is very technical, but the good news is you don’t need to understand it as much as you need to be made more aware of the fact that Intacct’s built-in security will do the work for you.

At Certum, our goal is to help you scale gracefully. That means working with you to ensure we are providing the best possible solutions based on your business’ needs. No two companies are alike and there are no cookie-cutter solutions.

Contact us today for more information about Sage Intacct and learn how we can help you scale, gracefully.

Previous
Previous

Cash Flow is King with April Features in QuickBooks Online

Next
Next

7 Marketing Ideas to Support Your E-Commerce Brand