Menu Close

Accounting for Cloud

"Never trust a computer you can't throw out a window." Steve Wozniak, co-founder of Apple

Accounting for Cloud

What is the approach when auditing your SaaS provider? Did you create a check-list?

Practically every area of your field is enjoying some kind of automation through software be it accounts production, accounts audit, tax return preparation, company statutory records maintenance & forms lodgement, trust and pension fund administration, statistical sampling in forensic accounting, and insolvency management & reporting.

Any new SaaS product will quickly become your daily operating tool for many years

Taking the time to research and acquire the best applications means choosing a supplier with software that is transparent in usage and efficiently integrates with other systems and software.  Crucially, however, it must satisfy your overriding concern that wherever your applications and data are offsite, the internal as well as external transmission channels are secure.

NCSC’s guidance on risks of adopting a range of popular SaaS applications is a helpful tool

For cyber criminals, SMEs are an entry point into larger corporations as the integrated digital system grows and becomes a more complex network.  SMEs are encouraged to connect with internal systems of myriad companies they interact with and indeed most departments within an organisation.  It is the tax & accounting professions which often have access to the most sensitive data.

There are many exciting accounting applications available and in following the “SaaS Security Principles” created for users by the National Cyber Security Centre, we recommend you undertake their assessment approach when considering subscribing to cloud software.

Our Memo provides further insight.


On Key

Related Posts



Imagine you own a house and want to add an additional floor. First you have to review and strengthen the foundations. This service builds cybersecurity foundations to facilitate growth in a resilient, timely manner.

This service will also provide the company with a cybersecurity risk assessment and improvement plan but with significantly more support from a senior consultant to help the company embed improvements in a continuous, timely manner


The dreaded car MOT is looming. It’s the unforeseen wear & tear that results in some necessary annual maintenance. Our cybersecurity review will highlight what needs to be done as your engineers.

In addition to the context gathering stage and security footprinting service, a senior consultant will perform a risk assessment to understand the company’s cyber risks and provide recommendations. They will also be available to undertake monthly calls for answering questions, providing guidance and checking on whether risks are reducing.


You’re embarking on a more active lifestyle, chosen to go on a diet and get in shape. Think of this service as the cybersecurity equivalent of the personal trainer, helping you along the way.

After an initial context gathering stage, a junior security consultant will be available once per month to answer questions and provide recommendations based on company goals and activities. A cybersecurity footprinting service will allow the company to continuously monitor its external security posture.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.