Human nature is a funny thing. If given a choice most of us will take the easiest way out, even when it’s not the best way or gives the best results. The same can be said about anything free, including free church accounting software. People love free stuff – even if it’s not good for… ⪼ Continue Reading…
online security
Church Software User Security – Do’s & Don’ts
Internal security is just as important as external security. In other words, there is no sense locking the building doors (external security), if you don’t take church software user security (internal security) seriously. If you want to protect your church’s information, you will have to be diligent. For example you want to be careful about… ⪼ Continue Reading…
Using a New Internet Browser for IconCMO
When it comes to support our web-based church software is saying goodbyeto the internet browser that starts with an i and ends with tearsand suffering This is for all of you who use Windows computers. If you’re not sure whether you’re on Windows, or what version you have, find out more about how to identify… ⪼ Continue Reading…
BEC Attacks: Protect Your Church Against Attacks
BEC attacks are one of the fastest growing cyber crimes and have cost some organizations millions of dollars. So, it’s important that staff at your church know how these attacks work and how they can be prevented. The BEC stands for Business Email Compromise. In this type of cyber attack, a cyber criminal gets a… ⪼ Continue Reading…
Churches Protect Your Data from Disasters
Recent natural disasters have reminded us all how unpredictable and fragile life is, and how quickly our personal property can be destroyed. In this post, we will discuss how churches protect their data. With all the terrible personal loss people fear when it comes to hurricanes and other natural disasters, electronic records can be an… ⪼ Continue Reading…
Do you know how to spot a tech support scam?
According to Wikipedia, a technical support scam (often abbreviated tech support scam) refers to a class of telephone fraud activities, in which a scammer claims to offer a legitimate technical support service, often via cold calls to unsuspecting users. Such cold calls are mostly targeted at Microsoft Windows users, with the caller often claiming to represent a… ⪼ Continue Reading…