Security recommendations

Protecting your confidential information

Unless you take adequate security precautions, it could be possible for an unauthorised person to gain access to your MYOB company file to use or view your information. You can reduce this risk by taking appropriate steps to protect access to your company file.

Here are a few simple ways you can protect your files.

Password protect your computer

Ensure that the computer that stores your company file is secure. You can do this by giving each user that has access to the computer a unique user account and password. This ensures that only the people you authorise can log in to your computer.
Use strong passwords that cannot be easily guessed by others. Strong passwords are at least eight characters long and include a combination of letters, numbers, and symbols.

Password protect your MYOB company file

You can control who can access your MYOB company file using the User Account feature in AccountRight. Set up a user account with a unique password for each user. You can even specify the tasks they can perform and the information they can view. Again, use strong passwords that cannot be easily guessed. See MYOB online help for information on how to set up user accounts. (Note that only an administrator account is available in AccountRight Basics.)

Install a firewall

Firewalls prevent internet intruders from accessing your computer. Windows operating systems (XP and above) include firewalls that are easy to set up. See your Windows help for information on how to set up a firewall.

Protect your computer from viruses and malicious software

Computer viruses and malicious software can collect information to gain unauthorised access to your sensitive business information. Virus scanning software can help prevent, detect and remove malicious software. If you use a virus scanner, make sure you keep it up to date.

You can also use security features provided by your operating system to reduce the risk of unauthorised software being secretly installed, such as Windows User Account Control (UAC). With UAC running, permission is always required before you can install software. See your Windows help for more information about UAC.