Monthly Archives: June 2011

2 posts

Hosted QuickBooks Secures Your QuickBooks Company Files

Hosted QuickBooks provides several opportunities to reduce hardware and associated costs. Hosted QuickBooks reduces the cost of purchasing a QuickBooks server, a server that needs space, additional security, high end network lines and skilled IT resources to keep operational. All of these costs are included in your monthly Hosted QuickBooks charge.

Hosted QuickBooks facilitates the ability of workers to access QuickBooks company files regardless of their location, reducing real-estate demands and increasing worker productivity. Access to Hosted QuickBooks uses the same security that banks provide their online banking customers. Hosted QuickBooks secures your QuickBooks company files behind an inpenetrable firewall and multiple layers of security.

Hosted QuickBooks helps companies save on the dollars they spend on providing high end workstations for their employees. These workstations can cost between $750 and $2,000 each, depending on the configuration. Hosted QuickBooks allows each user to have a retail consumer computer that costs $250 to $500 for a nice device. These laptops or PCs and broadband Internet connections provide access to the internet and to hosted applications like Hosted QuickBooks.

By using Hosted QuickBooks, no data is stored on any local computers or server, so if a computer is ever lost or stolen, only a replacement of that lost computer is required – without the fear or worry of lost information. Hosted QuickBooks is but a click away, from a QuickBooks shortcut on your desktop.

QuickBooks Network Security

Secure Internet access is mandatory in a network where QuickBooks operated. Let me give you a quick example of an instance that requires one to seriously consider a Unified Threat Management Scenario to secure your Internet gateway.

Application intelligence and controls are important because HTTP (port 80) has been a common method to bypass security, yet there are other protocols and ports that need to be reviewed in a basic security audit. For example, part of the background process a browser performs when going to http://www.google.com is making a request for the destination IP address of the domain www.google.com. This is similar to making a phone call. Unless you know the persons phone number, you can’t make the call. Domain Name Services (DNS) is the ‘phone book’ protocol of the Internet and is fixed on port 53.

In our example, DNS provides the IP address for www.google.com. A hacker knows this and can get around the security which is focused on the port 80 http traffic by redirecting DNS requests to a rogue DNS server running at a location they control. While a firewall or other device can give a user an IP address and network information via DHCP, the recommended DNS server IP addresses are only that: recommended. The hacker bypasses all security that NGFW offers by tunneling their traffic through special software via DNS (port 53) unfettered. The firewall ‘sees’ the traffic as simply DNS on port 53, with no restrictions.

This technique is especially popular with hackers who want to bypass guest Wi-Fi. The business offering the service will redirect any browser to a web page requesting the user pay for Wi-Fi or acknowledge an acceptable use policy. Most of the time, DNS is needed and is not limited to certain servers.