Data Security Best Practices

  • Article Type:
  • Documentation
  • Last Modified:
  • 11/05/2022


  • Explain best practices about data security
  • Introduce SMB 3.0 information


  • SMB 3.0
  • ProSystem fx Document
  • ProSystem fx Engagement
  • ProSystem fx Fixed Assets
  • ProSystem fx Planning
  • ProSystem fx Practice Management
  • ProSystem fx Scan
  • ProSystem fx Tax
  • ProSystem fx Trial Balance
  • ProSystem fx Workpaper Manager


Data security is a top concern for accountants.  Data security is also a top concern for Wolters Kluwer Tax & Accounting North America.  We continue to work diligently to address security issues that may impact our solutions and partner with our customers in the on-going effort to help secure your data. 

Accordingly, as we approach and prepare for the upcoming tax season, we wanted to share some important information and reminders regarding safeguarding your organization’s data and your client’s personal information.

  • When you are hosting an on-premise solution, your organization should ensure it is implementing the most up-to-date data security best practices.  This includes ensuring your data is encrypted both in transit and at rest.  It’s important to note that the operating systems your organization utilizes can affect the data security of your environment, and as a rule of thumb, older systems can be less secure.  At this time we are strongly recommending that all customers enable the enhanced security measures available in Windows 8 or higher operating system, including SMB 3.0 encryption for data in transit.   Please note that Windows 7 does not support SMB 3.0 encryption for data in transit and is not recommended.
Steps to enable SMB 3.0 Encryption can be found here:
  • Change your password. Take a minute to change your password. [The IRS recommends] changing passwords every 60-90 days. Use a strong password that contains a combination of upper-case letters, lower-case letters, numbers and special characters. Passwords should be at least eight characters long.  Passwords should not be reused across multiple systems so that a loss of credentials in one system won’t compromise others that used the same.
  • Enable multi-factor authentication when available. Your password is a single factor in the authentication process that verifies a user’s identity. Multi-factor authentication requires a second factor in addition to the password as part of the authentication process. This requirement adds another layer of protection against hacking and fraud attempts.

Additional Information


  Solution Tools
 Solution Id 000214497/000092015
 Direct Link
To provide feedback on this solution, please login.

Your feedback about this article will help us make it better. Thank you!