How-To Guide Auditor Access to Client Data

Total Page:16

File Type:pdf, Size:1020Kb

How-To Guide Auditor Access to Client Data How-To Guide Auditor Access to Client Data Situation Overview Auditors must have access to their clients’ accounting reports in order to do their job. Organizations are responsible for providing financial information to the auditor. As a supplier of financial software for local government organizations, Black Mountain Software (BMS) is in a unique position to help both auditors and clients achieve what is needed. Auditor Options Cities, counties, special districts, and schools that use Black Mountain Software can offer their auditors these options for accessing their financial data: 1. Connect to the client’s data via the BMS Cloud, without the need to install BMS software on the auditors’ machine or network. It’s easy, reliable, and free. 2. Run BMS products on auditors’ hardware if the software is already present. This is available for auditors already utilizing a copy of BMS software as of April 1, 2014. In all cases where auditors run BMS products on their hardware, they will incur hourly fees if BMS assistance is needed with data transfer, restoring backups, setting up system pointers, local resource files, etc. 3. Use a remote access product to connect directly to client machines and data. This approach eliminates BMS’ involvement in information sharing between the auditor and the client. There are many options; some are free and some require paid subscriptions. How To Select the Option That Is Right For You Option 1 is hands-down the best option for most auditors. The auditor accesses the client’s data by simply logging into the BMS Cloud on the internet, where BMS will have completed the setup and all file and data preparation for the auditor.This approach eliminates the risk of support fees. It’s completely free of charge, accessible pretty much whenever and where ever you need it, and is exceptionally secure. Option 2 is satisfactory to auditors that already have a copy of BMS software and are comfortable with the risk of unanticipated time and monetary costs due to problems related to hardware, servers, not keeping up with software updates, etc. Option 3 is typically most useful only if the client already has a good remote access service in place. Using a service to remotely connect to the client’s computer and data, the auditor then uses that remote internet connection to run the BMS applications to obtain the information needed for the audit. Some potentially limiting issues to consider with this option are: (1) installation of the service provider’s software onto the auditor’s computer may be required, (2) some providers will require the client to be there to initiate the auditor’s connection to their data, (3) many providers charge for the service, and (4) the ability to print to the auditor’s computer may be unavailable but often can be resolved by emailing files to print. We have compiled some information that may help in a remote access provider search and evaluation process. (See page 2.) How To Get Started To learn more about auditor access options or to receive help in implementing the option you’ve chosen, call a friendly Black Mountain Software Support Specialist at 800-353-8829. © 2014 Black Mountain Software. www.blackmountainsoftware.com Additional Information for Option 3: Please note: Black Mountain Software typically would not be involved in this option. Hourly fees are incurred if Black Mountain’s assistance is requested. Some Remote Access Alternatives for Auditor Connection to a Client AMMYY(Ammyy LLC) http://www.ammyy.com/en/index.html This product is a paid version but free to try. Requires client install and permission to connect. Join Me (by LogMeIn) https://join.me This product has both a free and paid versions. Requires client install and permission to connect. LogMeIn (LogMeIn, Inc.) https://secure.logmein.com This product is a paid version but free to try. Requires client install but program stays resident allowing anytime connection to the client’s computer. Team Viewer (Team Viewer GmbH) http://www.teamviewer.com This product is a paid version but free to try. Requires client install and permission to connect. Remote Desktop Protocol(RDP)/Terminal Services - (Microsoft) This product is free and can be enabled on any computer. Limited access on a server. It requires the client or their technical staff to configure a few things for use of this option. May require a Virtual Private Network (VPN) connection to the client’s network including the installation of a VPN Client and user name and password. May need Firewall configuration for access via external TCP/IP Address. Need TCP/IP Address of Server or Computer to connect. Virtual Network Computing (VNC) There several free and paid versions of VNC Products. Requires a client install and may require permission to connect or the program stays resident allowing anytime connection to the client’s computer. May require a Virtual Private Network (VPN) connection to client’s network including the installation of a VPN Client and user name and password. May need Firewall configuration to access via external TCP/IP Address. Need TCP/IP Address of Server or Computer to connect. Vendors include: RealVNC http://www.realvnc.com, UltraVNC http://www.unvc.com and TightVNC http://www.tightvnc.com..
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Test-Beds and Guidelines for Securing Iot Products and for Secure Set-Up Production Environments
    IoT4CPS – Trustworthy IoT for CPS FFG - ICT of the Future Project No. 863129 Deliverable D7.4 Test-beds and guidelines for securing IoT products and for secure set-up production environments The IoT4CPS Consortium: AIT – Austrian Institute of Technology GmbH AVL – AVL List GmbH DUK – Donau-Universit t Krems I!AT – In"neon Technologies Austria AG #KU – JK Universit t Lin$ / Institute for &ervasive 'om(uting #) – Joanneum )esearch !orschungsgesellschaft mbH *+KIA – No,ia -olutions an. Net/or,s 0sterreich GmbH *1& – *1& -emicon.uctors Austria GmbH -2A – -2A )esearch GmbH -)!G – -al$burg )esearch !orschungsgesellschaft -''H – -oft/are 'om(etence 'enter Hagenberg GmbH -AG0 – -iemens AG 0sterreich TTTech – TTTech 'om(utertechni, AG IAIK – TU Gra$ / Institute for A((lie. Information &rocessing an. 'ommunications ITI – TU Gra$ / Institute for Technical Informatics TU3 – TU 3ien / Institute of 'om(uter 4ngineering 1*4T – 1-Net -ervices GmbH © Copyright 2020, the Members of the IoT4CPS Consortium !or more information on this .ocument or the IoT5'&- (ro6ect, (lease contact8 9ario Drobics7 AIT Austrian Institute of Technology7 mario:.robics@ait:ac:at IoT4C&- – <=>?@A Test-be.s an. guidelines for securing IoT (ro.ucts an. for secure set-up (ro.uction environments Dissemination level8 &U2LI' Document Control Title8 Test-be.s an. gui.elines for securing IoT (ro.ucts an. for secure set-u( (ro.uction environments Ty(e8 &ublic 4.itorBsC8 Katharina Kloiber 4-mail8 ,,;D-net:at AuthorBsC8 Katharina Kloiber, Ni,olaus DEr,, -ilvio -tern )evie/erBsC8 -te(hanie von )E.en, Violeta Dam6anovic, Leo Ha((-2otler Doc ID8 DF:5 Amendment History Version Date Author Description/Comments VG:? ?>:G?:@G@G -ilvio -tern Technology Analysis VG:@ ?G:G>:@G@G -ilvio -tern &ossible )esearch !iel.s for the -2I--ystem VG:> >?:G<:@G@G Katharina Kloiber Initial version (re(are.
    [Show full text]
  • Unpermitted Resources
    Process Check and Unpermitted Resources Common and Important Virtual Machines Parallels VMware VirtualBox CVMCompiler Windows Virtual PC Other Python Citrix Screen/File Sharing/Saving .exe File Name VNC, VPN, RFS, P2P and SSH Virtual Drives ● Dropbox.exe ● Dropbox ● OneDrive.exe ● OneDrive ● <name>.exe ● Google Drive ● etc. ● iCloud ● etc. Evernote / One Note ● Evernote_---.exe ● onenote.exe Go To Meeting ● gotomeeting launcher.exe / gotomeeting.exe TeamViewer ● TeamViewer.exe Chrome Remote ● remoting_host.exe www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ Messaging / Video (IM, IRC) / .exe File Name Audio Bonjour Google Hangouts (chrome.exe - shown as a tab) (Screen Sharing) Skype SkypeC2CPNRSvc.exe Music Streaming ● Spotify.exe (Spotify, Pandora, etc.) ● PandoraService.exe Steam Steam.exe ALL Processes Screen / File Sharing / Messaging / Video (IM, Virtual Machines (VM) Other Saving IRC) / Audio Virtual Box Splashtop Bonjour ● iChat ● iTunes ● iPhoto ● TiVo ● SubEthaEdit ● Contactizer, ● Things ● OmniFocuse phpVirtualBox TeamViewer MobileMe Parallels Sticky Notes Team Speak VMware One Note Ventrilo Windows Virtual PC Dropbox Sandboxd QEM (Linux only) Chrome Remote iStumbler HYPERBOX SkyDrive MSN Chat Boot Camp (dual boot) OneDrive Blackboard Chat CVMCompiler Google Drive Yahoo Messenger Office (Word, Excel, Skype etc.) www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ 2X Software Notepad Steam AerooAdmin Paint Origin AetherPal Go To Meeting Spotify Ammyy Admin Jing Facebook Messenger AnyDesk
    [Show full text]
  • Free Remote Support Software Download
    Free remote support software download TeamViewer is easily the best free remote access software I've ever used. There are tons TeamViewer Review & Free Download. I suggest trying ​Remote Utilities · ​Chrome Remote Desktop · ​A Review of AnyDesk, a Free. AeroAdmin - zero configuration FREE remote desktop software. Use it for quick and easy remote desktop access and PC control. Free remote access software Ammyy Admin makes control of a remote PC quick have to download and install massive remote desktop software which brings. Remote access software allows you to control your PC remotely, from anywhere in the world. Powerful, and free to try. Connect to remote computers, provide remote support, & collaborate online with TeamViewer, Download Free . Receive support without installing software. Remote Desktop Control allows you to control any remote computer from another computer. Such task is no longer just for network administrators, now you can. Free remote control, remote desktop, remote access software. Remote support and desktop sharing. Free, easy to use, instant screen sharing. Custom Screen Sharing and Online Meetings on your Servers. Connect to remote computers, provide remote support, and collaborate online with TeamViewer, the Get a free sneak peek until October Download now. Free remote access and desktop sharing software. Download and install the software for your OS on the computer or device you are connecting from and on. Access all your programs, documents and files from anywhere, without having to entrust your AnyDesk is the fastest remote desktop software on the market. Thank you for downloading AnyDesk! By downloading and using AnyDesk, you accept our license agreement and our privacy statement.
    [Show full text]
  • What Did You Do in School Today Junior? an Analysis of Application Usage on K-12 School Networks
    What Did You Do In School Today Junior? An Analysis of Application Usage on K-12 School Networks March 2012 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 95054 www.paloaltonetworks.com Table of Contents Key Findings ....................................................................................................................................................... 3 Introduction ....................................................................................................................................................... 4 Tools That Enable Circumvention ....................................................................................................................... 5 Encrypted Tunnels: Protection or Evasion? ................................................................................................................ 5 Remote Desktop Applications: What is the Use Case? .............................................................................................. 6 External Proxies: K‐12 Usage is Double Enteprise Usage ........................................................................................... 7 P2P FileSharing: Solution Of Choice For Moving Large Files ................................................................................. 8 Browser‐based Filesharing: Education or Entertainment? ................................................................................... 9 Browser‐based Filesharing use Case: Productivity ..................................................................................................
    [Show full text]
  • Demystifying Africa's Cyber Security Poverty Line
    Demystifying Africa’s Cyber Security Poverty Line Tanzania Chapter The Africa Cyber Immersion Centre is a state-of-the-art research, innovation and training facility that seeks to address Africa’s ongoing and long-term future needs through unique education, training, research, and practical applications. For more information Serianu Limited contact: [email protected] http://www.serianu.com Tanzania Cyber Security 3 Report Content Editor’s Note and Acknowledgement Cost of Cyber Crime We are excited to finally publish the 2nd edition of Tanzania We estimate that cyber-attacks cost Tanzanian 4 Cyber Security Report 2017. 54 businesses around $99.5 million a year. Foreword Sector Ranking in 2017 2017 has seen a jump in cyberattacks or cybercrimes. Cyber security is no longer a concern fof the Ransomware, DDoS attacks, data breaches were all financial & banking sectors only. 7 synonymous with 2017. 56 Executive Summary Home Security It is in our own best interests to make sure everyone – from the young to the old, on The global landscape of cyber threats is quickly changing. snapchat, facebook and twitter - know and 9 60 practice basic security habits. Top Trends Africa Cyber Security Framework We analysed incidents that occurred in 2017 and compiled Attackers are now launching increasingly a list of top trends that had a huge impact on the economic sophisticated attacks on everything from and social well-being of organisations and Tanzanian citizens. business critical infrastructure to everyday 13 69 devices such as mobile phones. Top Priorities for 2018 Appendixes 19 We have highlighted key priorities for 2018. 71 Cyber Intelligence Statistics, Analysis, & Trends References We have monitored organisations’ network for malware and cyber threat attacks such as brute-force attacks 25 against the organisation’s servers.
    [Show full text]
  • Comparison of Remote Desktop Software - Wikipedia
    9/29/2020 Comparison of remote desktop software - Wikipedia Comparison of remote desktop software This page is a comparison of remote desktop software available for various platforms. Contents Remote desktop software Operating system support Features Terminology See also Notes References Remote desktop software https://en.wikipedia.org/wiki/Comparison_of_remote_desktop_software 1/9 9/29/2020 Comparison of remote desktop software - Wikipedia First Latest Free for Free for public Software Protocols Creator stable year, License personal commercial release version use use date AetherPal Proprietary AetherPal Inc. 2011 2016, Valet Proprietary No No Ammyy Admin Proprietary Ammyy Inc. 2007 2015, 3.5[1] Proprietary Yes No AnyDesk Software 2020-07-28, AnyDesk Proprietary 2015 Proprietary Yes No GmbH 6.0.7 Anyplace Control Anyplace Control Proprietary 2002 2012, 5.4.0.0 Proprietary No No Software AnywhereTS RDP, ICA Qzone ? 2009, 3.4 Proprietary Yes Yes Apple Remote Desktop RFB (VNC) Apple 2002 2017, 3.9[2] Proprietary No No Apple Screen Sharing (iChat) Proprietary, RFB (VNC) Apple 2007 2014, 1.6 Proprietary Yes Yes AppliDis RDP Systancia ? 2013, 4 SP3 Proprietary No No BeAnywhere Support Proprietary BeAnywhere 1996 2015, 6.00 Proprietary No No Express 2020-07-29, Cendio ThinLinc RFB (VNC) Cendio AB 2003 Proprietary Yes[a] Yes[a] 4.12.0 Chicken of the VNC RFB (VNC) ? 2002 2011-02, 2.1.1 GPL Yes Yes BSD Client, 2018, Chrome Remote Desktop Chromoting Google 2011 Proprietary Yes Yes 70.0.3538.21 Server CloudBerry Lab (CloudBerry May 25, Proprietary
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 9th Edition, June 2012 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ................................................................................................................. 4 Streaming Media Bandwidth Consumption Triples ......................................................... 5 Streaming Video Business Risks ................................................................................................................ 6 Streaming Video Security Risks ................................................................................................................. 7 P2P Streaming and Unknown Malware ................................................................................................. 8 P2P Filesharing Bandwidth Consumption Increases 700% ............................................ 9 Business and Security Risks Both Old and New ...................................................................................... 10 Browser-based Filesharing Maintains Popularity ................................................................................... 10 Where Did The Megaupload Traffic Go? ................................................................................................... 11 Which Ports Do Filesharing Applications
    [Show full text]
  • Technical Specifications
    TECHNICAL SPECIFICATIONS 1 INTRODUCTION Les départements informatiques sont submergés par des responsabilités de plus en plus complexes liées à la gestion et au contrôle des accès, sur une quantité de serveurs et appareils toujours croissante. La meilleure solution pour alléger leur fardeau est d’opter pour une solution de gestion des connexions à distance robuste et efficace. Les équipes de ces départements ont besoin d’évoluer vers un environnement où il leur est possible de surveiller les activités depuis une seule interface, en utilisant une seule et même source d’information. Remote Desktop Manager utilise ses puissantes capacités afin d’offrir un contrôle incomparable et une visibilité complète sur les environnements informatiques en centralisant toutes les connexions à distance, mots de passe et comptes privilégiés au sein d’une même plateforme sécurisée, partagée entre les utilisateurs et leurs équipes. CONFIGURATION REQUISE Remote Desktop Manager requiert le cadre d’application Microsoft .NET 4.7.2 Dépendances • Windows 7 SP1, Windows Server 8.1 ou Windows 10 • Windows Server 2008 SP2, 2008 R2 SP1, 2012 R2 ou 2016 • Cadre d’application Microsoft .NET 4.7.2 • Processeur : 1 GHz ou plus rapide • Mémoire vive : 512 Mo • Résolution d’écran : 1024x768 • Espace de disque dur : 500+ Mo Prise en charge de Terminal Services et client léger Remote Desktop Manager peut être installé sur des Terminal Services et sur des clients légers. Prise en charge 64 bits Remote Desktop Manager est compatible avec toutes les versions 64 bits de Windows. Déploiement manuel/portable Le déploiement manuel, à partir de l’archive zip, est considéré comme un déploiement portable (USB).
    [Show full text]
  • An Analysis of End User Application Trends in the Enterprise, 7The Edition
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 7th Edition, May 2011 Palo Alto Networks www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Introduction .................................................................................................................... 4 SSL and Port Hopping Applications: The Elephant in the Room? .................................... 5 SSL on tcp/443 or Other Ports: The Majority of the Applications and Potential Risks ............................. 6 SSL on tcp/443 Only: A Small, but Significant Set of Applications ............................................................ 7 SSL on Dedicated, Non-Standard Ports: Some Business, Some Purposely Evasive ................................ 8 Applications That Can Use SSL: A Discussion of Risk vs Reward ......................................................... 9 Applications That Port Hop: The Ultimate Accessibility Feature? ............................................................. 9 Work is Increasingly Social ........................................................................................... 10 Social Networking: Big Growth for a Select Few ..................................................................................... 11 File Transfer/Sharing Applications: Will History be Repeated? ................................... 12 FTP: The Original File Transfer Application ............................................................................................
    [Show full text]
  • A SURVEY on LEARNING METHODOLOGIES and AVAILABLE TOOLS WHICH HELPS ENHANCING LEARNING Ichhanshu Jaiswal1, Prof
    International Journal of Advance Research In Science And Engineering http://www.ijarse.com IJARSE, Vol. No.4, Issue No.01, January 2015 ISSN-2319-8354(E) A SURVEY ON LEARNING METHODOLOGIES AND AVAILABLE TOOLS WHICH HELPS ENHANCING LEARNING Ichhanshu Jaiswal1, Prof. Sachin Bojewar2 1 PG,Scholar, 2Associate Professor, Dept. of Information Tech. Vidyalankar Institute of Technology,Wadala, Mumbai, Maharastra, (India) ABSTRACT Learning is one quality that human have better than other creatures.Learning is only mechanism which make human think of new ideas and innovation. At a very abstract level, learning can be done by self or with some assistance.Better the learning methodology better the delivered product or service. Here focus is made to identity various learning methodology along with this a comparative study of various tools which are available currently and can be used for learning is discussed. At the end of paper we have identified which learning methodology and tools can be used for learning programming language. Keywords: Collaborative Learning,Learning, Learning Methodologies, Remote Access Computer, I.INTRODUCTION Learning is the act of acquiring new, or modifying existing knowledge, behaviors, skills, values, or preferences depending on information or knowledge one have.[1] The ability to learn is possessed by humans, animals and some machines(Artificial Intelligent). A lot of our learning occurs randomly throughout life, from new experiences, gaining information and from our perceptions, for example: reading a newspaper or watching a news broadcast, talking with a friend or colleague, meetings and unexpected experiences. Many experiences in life provide us with learning opportunities from which we can choose whether or not to learn.
    [Show full text]
  • VB2020 Paper: Growth and Commoditization of Remote Access
    30 September - 2 October, 2020 / vblocalhost.com GROWTH AND COMMODITIZATION OF REMOTE ACCESS TROJANS Veronica Valeros & Sebastian García Czech Technical University in Prague, Czech Republic [email protected] [email protected] www.virusbulletin.com GROWTH AND COMMODITIZATION OF REMOTE ACCESS TROJANS VALEROS & GARCÍA ABSTRACT Remote access trojans (RATs) are an intrinsic part of traditional cybercriminal activities, and they have also become a standard tool in advanced espionage attacks and scams. There have been significant changes in the cybercrime world in terms of organization, attacks and tools in the last three decades, however, the overly specialized research on RATs has led to a seeming lack of understanding of how RATs in particular have evolved as a phenomenon. The lack of generalist research hinders the understanding and development of new techniques and methods to better detect them. This work presents the first results of a long-term research project looking at remote access trojans. Through an extensive methodological process of collection of families of RATs, we are able to present an analysis of the growth of RATs in the last 30 years. Through a closer analysis of 11 selected RATs, we discuss how they have become a commodity in the last decade. Finally, through the collected information we attempt to characterize RATs, their victims, attacks and operators. Preliminary results of our ongoing research have shown that the number of RATs has increased drastically in the past ten years and that nowadays RATs have become standardized commodity products that are not very different from each other. INTRODUCTION Remote access software is a type of computer program that allows an individual to have full remote control of the device on which the software is installed.
    [Show full text]