Technology

  • 3 keys to a successful accounting system upgrade

    Technology is tricky. Much of today’s software is engineered so well that it will perform adequately for years. But new and better features are being created all the time. And if you’re not getting as much out of your financial data as your competitors are, you could be at a disadvantage.

    For these reasons, it can be hard to decide when to upgrade your company’s accounting software. Here are three keys to consider:

    1. Your users are ready. When making a major change to your accounting software, the sophistication of the system needs to align with the technological savvy of its primary users. Sometimes companies buy expensive software only to have many of its features gather virtual dust because the employees who use it are resistant to change.

    But if your users are well trained and adaptable, they may be able to extract added value from a more sophisticated accounting system. For instance, they could track key performance indicators to generate more meaningful financial reports.

    2. The price is right. You’ll of course need to consider the costs involved. As holds true for any technology purchase, project leaders must set a budget and focus the search on products and vendors offering only the functions your company needs.

    But don’t stop there. Explore add-on services such as free trials, initial training and ongoing support. You want to get the most value from the software, which goes beyond the new and improved features themselves.

    3. You need to integrate. This is the concept of networking your accounting system with your other mission-critical systems such as sales, inventory and production.

    For most companies today, integration is essential to maximizing the return on investment in accounting software. So, if you haven’t yet implemented this functionality, an upgrade may be highly advisable. Just be aware that a successful companywide integration will call for buy-in from every nook and cranny of your business.

    Typically, if a company doesn’t need any major accounting process changes, it probably doesn’t need a major accounting software change either. But if upgrading both will help grow your business, it’s absolutely a step worth considering. We can provide further guidance and info.

    © 2018

  • 3 specialized IT leadership positions for growing businesses

    For many businesses, technology has changed from something they use to something they do. When a company reaches a point where IT plays a central role in operations and productivity, ownership might want to create one or more leadership positions to specifically oversee tech-related matters and strategy.

    Often, this means a Chief Information Officer will join the team to manage the business’s internal IT infrastructure and operations. Other common “tech execs” include Chief Technology Officers and Chief Digital Officers. However, just as technology itself seems to expand at a constant rate, so do IT leadership roles.

  • 5 common accounting software mistakes to avoid

    No company can afford to operate without the right accounting software. When considering whether to buy a new product or upgrade their current solutions, however, business owners often fall prey to some common mistakes. Here are five gaffes to avoid:

    1. Relying on a generic solution. Some companies rush into buying an accounting system without stopping to consider all their options. Perhaps most important, they may be missing out on specific versions for their industries.

    For instance, construction companies can choose from many applications with built-in features specific to how their businesses work. Nonprofit organizations also have industry-specific accounting software. If you haven’t already, check into whether a product addresses your company’s area of focus.

  • 6 key IT questions to ask in the new normal

    The sudden shutdown of the economy last year because of the COVID-19 pandemic forced many businesses to rely more heavily on technology. Some companies fared better than others.

    Many businesses that had been taking an informal approach to IT strategy discovered their systems weren’t as robust and scalable as they’d hoped. Some may have lost ground competitively as fires were put out and employees got back up to speed in an altered working environment.

    To keep your approach to technology relevant, you’ve got to regularly reassess processes and assets. Doing so is even more important in the new normal. Here are six key questions to ask:

    1. What are our users saying? Every successful IT strategy is built on a foundation of plentiful user feedback. Talk with (or survey) your employees about what’s happened over the last few months from a technology perspective. Find out what’s working, what isn’t and why.

  • 6 ways to get more value from an IT consultant

    IT consultants are many things — experts in their field, champions of the workaround and, generally, the “people persons” of the tech field. But they’re not magicians who, with the wave of a smartphone, can solve any dilemma you throw at them. Here are six ways to get more value from your company’s next IT consulting relationship:

    1. Spell out your needs. Define your desired outcome in as much detail as possible up front, so that both you and the consultant know what’s expected of each party. To do so, create a project scope document that clearly delineates the job’s purpose, timeframe, resources, personnel, reporting requirements, critical success factors and conflict resolution methods.

    2. Appoint an internal contact. Assign someone within your organization as the internal project manager as early in the process as possible. He or she will be the go-to person for the consultant and, therefore, needs to have a thorough knowledge of the job’s requirements and be able to fairly assess the consultant’s performance.

  • A strong BYOD policy combines convenience with security

    It’s easy to understand why more and more businesses are taking a “bring your own device” (BYOD) approach to the smartphones, tablets and laptops many employees rely on to do their jobs. BYOD can boost employee efficiency and satisfaction, often while reducing a company’s IT costs. But the approach isn’t without risk for both you and your staff. So, it’s highly advisable to create a strong formal policy that combines convenience with security.

    Primary concerns

    As an employer, your primary concern with BYOD is no doubt the inevitable security risks that arise when your networks are accessible to personal devices that could be stolen, lost or hacked. But you also must think about various legal compliance issues, such as electronic document retention for litigation purposes or liability for overtime pay when nonexempt employees use their devices to work outside of normal hours.

    For employees, the main worry comes down to privacy. Will you, their employer, have access to personal information, photos and other non-work-related data on the device? Could an employee lose all of that if you’re forced to “wipe” the device because it’s been lost or stolen, or when the employee leaves your company?

  • Ask the right questions about your IT strategy

    Most businesses approach technology as an evolving challenge. You don’t want to overspend on bells and whistles you’ll never fully use, but you also don’t want to get left behind as competitors use the latest tech tools to operate more nimbly.

    To refine your IT strategy over time, you’ve got to regularly reassess your operations and ask the right questions. Here are a few to consider:

    Are we bogged down by outdated tech? More advanced analytical software can eliminate many time-consuming, repeatable tasks. Systems based on paper files and handwritten notes are obviously ripe for an upgrade, but even traditional digital spreadsheets aren’t as powerful as they used to be.

    Do we have information silos? Most companies today use multiple applications. But if these solutions can’t “talk” to each other, you may suffer from information silos. This is when different people and teams keep important data to themselves, slowing communication. Determine whether this is occurring and, if so, how to integrate your key systems.

  • Blockchain beckons businesses … still

    The term and concept known as “blockchain” is hardly new. This technology surfaced more than a decade ago. Bitcoin, the relatively well-known form of cryptocurrency, has gotten much more attention than blockchain itself, which is the platform on which Bitcoin is exchanged.

    One might be tempted to think that, having spent so many years in the shadows, blockchain has missed its opportunity to become widely accepted by businesses. Yet its promise persists, and you’d be well-advised to keep an eye on when blockchain might begin to make further inroads into your industry — if it hasn’t already.

    A shared ledger

    In simple terms, blockchain is a distributed, shared ledger that’s continuously copied and synchronized to thousands of computers. These so-called “nodes” are part of a public or private network.

    The ledger isn’t housed on a central server or controlled by any one party. Rather, transactions are added to the ledger only when they’re verified through established consensus protocols. Third-party verification makes blockchain highly resistant to errors, tampering or fraud. The technology uses encryption and digital signatures to ensure participants’ identities aren’t disclosed without permission.

  • Blockchain may soon drive business worldwide

    “Blockchain” may sound like something that goes on a vehicle’s tires in icy weather or that perhaps is part of that vehicle’s engine. Indeed it is a type of technology that may help drive business worldwide at some point soon — but digitally, not physically. No matter what your industry, now’s a good time to start learning about blockchain.

    Secure structure

    Blockchain is sometimes also called “distributed ledger technology.” It was introduced in 2009 to support digital “cryptocurrencies” such as bitcoin. Entries in each digital ledger are stored in blocks, with each block containing a timestamp and providing a link to the previous block.

    Typically, a blockchain is managed on a secure peer-to-peer network with protocols for validating blocks. Once data is recorded, no one can change it without altering all other blocks — which requires approval by most network participants. Blockchain proponents argue that this process essentially authenticates all information entered.

  • Choosing a retirement plan for your small business

    Most growing small businesses reach a point where the owner looks around at the leadership team and says, “It’s time. We need to offer employees a retirement plan.”

    Often, this happens when the company is financially stable enough to administer a retirement plan and make substantive contributions. Other times it occurs when the business grows weary of losing good job candidates because of a less-than-impressive benefits package.

    Whatever the reason, if you don’t have a retirement plan and see one in your immediate future, you’ll want to carefully select the one that will work best for your company and its employees. Here are some basics about three of the most tried-and-true plans.

  • Don’t let scope creep ruin your next IT project

    Today’s business technology is both powerful and restive. No matter how “feature rich” a software solution or hardware asset may be, there’s always another upgrade around the corner. In other words, it’s just a matter of time before your company’s next IT project.

    When that day arrives, watch out for “scope creep.” This term refers to the tendency of a project’s objective (or “scope”) to gradually expand while the job is underway. As a result, the schedule may drag and dollars may go to waste.

    Common culprits

    A variety of things can cause scope creep. In many cases, too few users give input during the planning stage. Or misunderstandings may occur between the project team and users, obscuring the purpose of the job.

    Excessive implementation time undoes many projects as well. As weeks and months go by, business processes, policies and priorities tend to change. For a new system to meet the needs of the business, the project’s scope needs to be executable within a reasonable time frame.

    Ineffective project management is another common culprit. Scope creep often arises when a project manager underestimates the complexity of the tasks at hand or fails to adequately motivate his or her team.

  • Getting ahead of the curve on emerging technologies

    Turn on your computer or mobile device, scroll through Facebook or Twitter, or skim a business-oriented website, and you’ll likely come across the term “emerging technologies.” It has become so ubiquitous that you might be tempted to ignore it and move on to something else. That would be a mistake.

    In today’s competitive business landscape, your ability to stay up to date — or, better yet, get ahead of the curve — on the emerging technologies in your industry could make or break your company.

    Watch the competition

    There’s a good chance that some of your competitors already are trying to adapt emerging technologies such as these:

    Machine learning. A form of artificial intelligence, machine learning refers to the ability of machines to learn and improve at a specific task with little or no programming or human intervention. For instance, you could use machine learning to search through large amounts of consumer data and make predictions about future purchase patterns. Think of Amazon’s suggested products or Netflix’s recommended viewing.

  • Getting wise to the rise of “smart” buildings

    Nowadays, data drives everything — including the very buildings in which companies operate. If your business is considering upgrading its current facility, or moving to or constructing a new one, it’s important to be aware of “smart” buildings.

    A smart building is one equipped with a variety of sensors that gather and track information about the structure’s energy usage and performance. With this data, the owners can better regulate the building’s energy consumption and, ultimately, save money.

    Has this been the case in real life? The results of a 2018 Forbes Insights/Intel survey seem to indicate so. Of the 211 business leaders from around the world who responded, 66% answered affirmatively when asked whether smart building management technologies have produced a return on investment.

  • Helping your employees make the most of email

    Once a revolutionary breakthrough in communications technology, email is now an afterthought for many people. But that can cause problems for businesses: Servers get filled up, messages get lost, and employees’ productivity isn’t quite what it could be.

    Although doing so may seem superfluous or antiquated, providing employees with some retraining or upskilling on proper email usage can improve efficiency and morale. Obviously, you don’t want to spend a lot of time or money on this, but a “lunch-and-learn” seminar or a series of quick meetings could prove effective and affordable.

    Here are some email management tips that you might want to consider:

  • Is your accounting software living up to the hype?

    Accounting software typically sells itself as much more than simple spreadsheet or ledger. The products tend to pride themselves on being comprehensive accounting information systems — depending on the price point, of course.

    So, is your accounting software living up to the hype? If not, there are a couple of relatively simple steps you can take to improve matters.

    Train and retrain

    Many businesses grow frustrated with their accounting software packages because they haven’t invested enough time to learn their full functionality. When your personnel are truly up to speed, it’s much easier for them to standardize reports to meet your company’s needs without modification. Doing so not only reduces input errors, but also provides helpful financial information at any point during the year — not just at month end.

    Along the same lines, your company should be able to perform standard journal entries and payroll allocations automatically within your accounting software. Many systems can recall transactions and automate, for example, payroll allocations to various programs or vacation accrual reports. If you’re struggling to extract and use these types of financial information, you might be underusing your accounting software (or it might be time for an upgrade).

  • Is your business tracking website metrics?

    In today’s data-driven world, business owners are constantly urged to track everything. And for good reason — having accurate, timely information displayed in an easy-to-understand format can allow you to spot trends, avoid risk and take advantage of opportunities.

    This includes your company’s website. Although social media drives so much of the conversation now when it comes to communicating with customers and prospects, many people still visit websites to gather knowledge, build trust and place orders.

    So, how do you know whether your site is doing its job — that is, drawing visitors, holding their attention, and satisfying their curiosities and needs? A variety of metrics hold the answers. Here are a few of the most widely tracked:

  • It may be time for your company to create a strategic IT plan

    Many companies take an ad hoc approach to technology. If you’re among them, it’s understandable; you probably had to automate some tasks before others, your tech needs have likely evolved over time, and technology itself is always changing.

    Unfortunately, all of your different hardware and software may not communicate so well. What’s worse, lack of integration can leave you more vulnerable to security risks. For these reasons, some businesses reach a point where they decide to implement a strategic IT plan.

    Setting objectives

    The objective of a strategic IT plan is to — over a stated period — roll out consistent, integrated, and secure hardware and software. In doing so, you’ll likely eliminate many of the security dangers wrought by lack of integration, while streamlining data-processing efficiency.

    To get started, define your IT objectives. Identify not only the weaknesses of your current infrastructure, but also opportunities to improve it. Employee feedback is key: Find out who’s using what and why it works for them.

  • Laptop battery safety is no laughing matter

    You’d be hard pressed to find a business today that doesn’t have laptop computers listed among its assets. Large companies have hundreds of them; midsize ones issue them to managers to facilitate mobility; and many small businesses rely on them as primary computing devices.

    Now, in and of itself, a laptop may seem harmless. But they literally hold a clear and present danger to companies: their batteries. Poorly maintained or damaged batteries can catch fire — putting any people and property nearby in serious risk. Faulty batteries can also hamper the device’s functionality, shorten its lifespan and put critical data at risk, inhibiting employees’ productivity and lowering morale.

    Best practices

    To help guard against the possibility that one of your company’s laptops might incur battery-related damage, follow these best practices:

    • Require the use of only compatible computer batteries or chargers.
    • If you maintain an inventory of loose batteries, keep them away from metal objects, such as small tools, coins, keys or jewelry.
    • Educate employees to, perhaps ironically, not use their computers on their laps or on any other soft surface (such as a bed or sofa) that could restrict airflow.
    • Teach employees to never place any heavy objects on their laptops that could crush, puncture or place a high degree of pressure on the battery.
    • Provide training on the proper transportation of laptops to prevent bumping the computers into objects or dropping them on hard surfaces.
    • Instruct users to never put a laptop in an area that could get very hot, such as the hood or dashboard of a vehicle, or a desk in a warm room directly exposed to sunlight.
    • Explain to employees how to safeguard their laptops from moisture and, if a computer does get wet, to bring it in for maintenance immediately because, even after drying, batteries or circuitry could slowly corrode and pose a safety hazard.

    Ultimately, workers need to follow battery usage, storage and charging guidelines found in the user’s guide of their respective laptops.

  • Look at your employees with cybersecurity in mind

    Today’s businesses operate in an era of hyper-connectedness and, unfortunately, a burgeoning global cybercrime industry. You can’t afford to hope you’ll luck out and avoid a cyberattack. It’s essential to establish policies and procedures to minimize risk. One specific area on which to focus is your employees.

    Know the threats

    There are a variety of cybercrimes you need to guard against. For instance, thieves may steal proprietary or sensitive business data with the intention of selling that information to competitors or other hackers. Or they may be more interested in your employees’ or customers’ personal information for the same reason.

    Some cybercriminals may not be necessarily looking to steal anything but rather disable or damage your business systems. For example, they may install “ransomware” that locks you out of your own data until you pay their demands. Or they might launch a “denial-of-service attack,” under which hackers overwhelm your site with millions of data requests until it can no longer function.

  • Prevent and detect insider cyberattacks

    In one recent cybercrime scheme, a mortgage company employee accessed his employer’s records without authorization, then used stolen customer lists to start his own mortgage business. The perpetrator hacked the protected records by sending an email containing malware to a coworker.

    This particular dishonest worker was caught. But your company may not be so lucky. One of your employees’ cybercrime schemes could end in financial losses or competitive disadvantages due to corporate espionage. 

    Best practices

    Why would trusted employees steal from the hand that feeds them? They could be working for a competitor or seeking revenge for perceived wrongs. Sometimes coercion by a third party or the need to pay gambling or addiction-related debts comes into play.