How to Protect Your Data in QuickBooks

Your QuickBooks company file is gold. Keep it safe from fraud and intrusions.


After the unprecedented year we’ve just experienced, the last thing you need is to have your accounting data compromised or stolen. It would be impossible to reconstruct your QuickBooks file from scratch, and you can’t afford to have a hacker steal any of your funds.


There are numerous steps you can take to protect yourself from threats, both internal and external. QuickBooks itself offers some safeguards. Strong company policies can also help safeguard against data theft or destruction. And some of your security guidelines should just come from using common sense.

The reality is you don’t have to be a big corporation to be the victim of cybercrime. Whether or not criminals get access to your funds, they can do a lot of damage that will end up costing you time and money.

Here’s a look at what you can do:


Keep Your Systems Safe

There are countless ways you can protect your data by maintaining the integrity of the computer that’s running QuickBooks. Some involve the same steps you would take to safeguard all of the applications and information you have stored there. You should have reputable antivirus/anti-malware software installed. Use strong passwords. Keep up with system updates.

quickbooks automatic updates
You can set up automatic updates in QuickBooks to download and install new functionality and bug fixes.

Updates and Backup

QuickBooks’ program updates are critical, too. You can start these manually, but we recommend setting up automatic updates. Open the Help menu and click on Update QuickBooks Desktop. Click the Options tab to access this tool.


Frequent, safely-stored backups are another essential element of overall data security. If an intruder compromises your system, you’ll need to be able to restore your most recent QuickBooks file when it’s safe again. Go to File | Back Up Company to set up either a local or an online backup. Use one of these tools at the end of any day you’ve entered anything on QuickBooks. We can help you with backup if you’re not sure how to do it.


Networks and Smartphones

Suppose you have multiple PCs that run on a network. In that case, it’s crucial to maintain that system’s health, too, since an intrusion at one workstation can affect everyone. You can do this by:

  • · Discouraging employees from browsing the web excessively and downloading unnecessary software.

  • · Encouraging responsible handling of emails (no clicking on unknown attachments, no personal email on work computers, etc.)

  • · Installing network monitoring software or hiring a managed IT service that only charges when you need them.

Do your employees have company-issued smartphones? Make sure their security systems are sound. Set policies to protect them. For example, tell employees they should never use them on a public Wi-Fi network or install personal apps.


Internal Fraud Possible

No business owners anticipate that their employees would steal from them. But it happens, and it can do tremendous financial damage. To minimize your chances of being victimized, limit the access that employees have to sensitive information.

quickbooks user access permissions
You can limit the access permissions each user has in multiple areas.

Go to Company | Set Up Users and Passwords, then click Set Up Users. You should be listed there as the Admin. Click Add User and supply a username and password. If you’re not sure how many users are supported on your license or need to add more, contact us. Click Next and then click the button in front of Selected areas of QuickBooks. Click Next again. You’ll designate that user’s access in areas including Purchases and Accounts Payable and Checking and Credit Cards on the next several screens. When you come to the end of the wizard, click Finish.


Consider running a background check when you hire someone who will have access to QuickBooks. It’s a standard business practice that can help protect your sensitive financial data.


QuickBooks provides additional tools that can help track down suspicious activity. You can view the Audit Trail, for one. Go to Reports | Accountant & Taxes | Audit Trail. This report displays a comprehensive list of transactions that have been entered or modified. Other reports may be helpful, like Missing Checks, Voided/Deleted Transactions, and Purchases By Vendor.


A Never-Ending Process

It’s easy to get caught up in the daily work of running your business, and sometimes, you forget to take the steps required to keep your QuickBooks data—and all of your computer hardware and software—safe. We get that.


You might think that you’re an unlikely target because you’re a small business, but hackers count on you thinking that. The reality is you don’t have to be a big corporation to be the victim of cybercrime. Whether or not criminals get access to your funds, they can do a lot of damage that will end up costing you more time and money than you might think.


So stay vigilant. Security should be of paramount concern whenever you deal with financial transactions – especially when it involves the internet. If we can be of assistance as you set up safeguards and company policies, let us know. As always, we’re available to answer any questions you might have about QuickBooks operations in general.