Rachel Johanson Ivy Yu Thomas Fox

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

Presented by: Allard, LTD CPA & Financial Services.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Computer Components.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Technology in Organisations How are technological components used together in systems? All images drawn by Christopher Ashwood.
ICAICT101A Operate a Personal Computer. A computer is an electronic device that allows you to process and store data (information)… 2.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
Introduction to Microsoft Office Web Apps with Jim Mollé Learn iT! Computer Software Training.
Will you need your umbrella?.  Objective: Explain the Cloud In business terms, so you can see if it will benefit you.  Agenda: 12:00 – Welcome and Introductions.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Parts of the Computer. Three Components of an Information System 1.Hardware The physical components that make up the computer and other devices connected.
The Office Procedures and Technology
UNDERSTANDING YOUR COMPUTER
Group 4 John Scheetz Mike Weals James Scanlon Eric Miller Eugen Rosca.
Copyright ©2012 Delmar, Cengage Learning. All rights reserved. Chapter 11 Operating Computers and Office Equipment.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
General Dentistry Anthony Falk. Overview Location- Fox Chapel, two stories Location- Fox Chapel, two stories Products- General Dentistry Products- General.
Introduction to Computers Seminar I. Parts of the Computer Personal Computer a PC (any non-Mac computer) has four major pieces of hardware-- keyboard,
Presented by: Mrs. Amie Ware. Know menu types (file, edit, insert, view, etc.) Insert a clip-art. Which menu would you use? Rulers: why use rulers? Text.
 Information technology is defined as the use of computer hardware and software to manage information.  Six functions of data management: Convert.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Overview of Windows and Microsoft Word. Operating System Performs 3 functions –Controls the hardware of the computer Screen, keyboard, disk drives, etc.
Using Technology to Manage Information Chapter 14.
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
Computer Basics.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
UNDERSTANDING YOUR COMPUTER
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
Epworth Villa Tony Gaeddert Network Administrator Men’s Coffee August 5, 2002 Computers and Technologies.
Jeff Reintjes, Kevin Hao, Carinne Rawlins. Background 1975 in Redmond, WA 3 rd most successful start-up company ever Founded by Bill Gates and Paul Allen.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Working in the Cloud. Understand Office 2013 in the CloudUnderstand Office 2013 in the Cloud Work OnlineWork Online Explore SkyDriveExplore SkyDrive Manage.
Information Technology Essentials Deloris Y. McBride.
Lecture 1: Network Operating Systems (NOS) An Introduction.
Parts of the Computer.
BOSS™ with Amy L. Taylor & Company The Right Way to The Cloud, With BOSS.
Computer Fundamentals. Examples of Computers Hand-held (HPC)PDATablet PCLaptop/Notebook DesktopTowerWorkstation Computer Basics.
Enw / Name. Advantages and Disadvantages of this type of network Draw / insert a drawing of a RING network What type of network would you recommend a.
Microsoft OneDrive Laurie H. Sherrod
Computer Security Sample security policy Dr Alexei Vernitski.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Corporate Law Office Necessities Natashia Johnson Intro to Legal Technology Professor B Grim August 30, 2009.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Office 2016 and Windows 10: Essential Concepts and Skills
Presented by: Harlow & Harlow, LLP
Electronic Plan By Ben Smithers and Dana Natov
Managing Windows Security
Work on the Fly Hosted Solutions for Timeslips Customers
Hardware/Software Unit
Using Technology to Manage Information
1. Open any Office 2016 app, such as Word, and create a new document.
RBS Remote Business Support System
Business Risks of Insecure Networks
Appendix A: Introduction to SkyDrive and Office Web Apps
Norton customer support Number
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Computer Applications Computer Basics Part 1
Software Introduction
Getting Started.
Getting Started.
National Diploma in Computer Studies
Unit 4 IT Security Kerris Davies.
Lauren Taylor – Dardanelle High School
Windows 10 An Operating System
Computer Concepts Module 3
Presentation transcript:

Rachel Johanson Ivy Yu Thomas Fox

Introduction Located at Northgate Executive Center Strong ties to SPU Established 2011 700 Clients (Individuals/Small Business) Strong ties to SPU Bill - CPA, CFE (Professor at SPU/Chaminade) Eric - CPA, MS Taxation Donovan - CPA (SPU Grad) Services Taxes IRS Representation Bookkeeping Management Consulting

Introduction Data collected Data value Names Addresses Social Security Numbers Net Income Bank Account Information Data value Invaluable Extreme privacy concerns Data breach would cripple business

Hardware Scanner (Input - scan tax document of customer) Upload to the cloud (Processing) Monitor (Show files on the screen) Printer (Output) Do not use USB or mobile device to store information and documents In the company, they mainly uses scanner to scan tax documents to the computer and upload it to the cloud. Each of staff has two monitors and it is easier for them to compare and check numbers. After they collect information from their customers, they will create a report and print it out. Through the observation, employees or employer do not usually use USB Or mobile device to store information or document. They don’t work or open customer’ document outside office.

Software Operating System : Microsoft Windows 7 Application software: NetStaff (Accounting professional software) Software as a service (SaaS) Include Excel, Microsoft publisher, Word, Powerpoint, UltraTax CS 2014 Norton AntiVirus 2016 Mobile apps (Yelp) Website Cloud Based database Store everything in the cloud Do not need to install all the applications on computer The company use window 7 as their operation system. For the application software, they mostly use a software called NetStaff which is an accounting professional software, it is cloud based software. Within the software, it includes excel, microsoft publisher, word, powerpoint, Ultra Tax CS etc. Besides that, I.T person also install Norton software in the computer. For the advertising part, they do have their website and a mobile apps called Yelp to promote their company and capture customers’ attention. In the observation, we found that the company mainly use cloud based database and software to store and edit information. They don’t install software in the hard drive or computer, except antivirus software.

Network

IT Position No designated IT/IS Position Donovan is “sort of in charge of IT” as needed All software is managed by Thomas Reuters Corporation Netstaff CS UltraTax CS No planned hardware/software updates

Website Plain, simplistic Providing information Not attracting new clients No updates No one manages webpage

Security and Privacy Information stored in cloud, not on personal computers/servers Norton Antivirus / firewall No transport of files via flash drives Password protection on computers and cloud-based software Manual lock and key code to enter office

Recommendations Contract IT position Update website Backup hard drive (Encrypted) http://www.seattlecpaprofessionals.com/