Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Security for Payroll Software

Home Forums Security General Security Security for Payroll Software

Viewing 2 posts - 1 through 2 (of 2 total)
  • Author

  • stylus277

    Our company uses ADP for our payroll services with their software. In the past the 4 people that needed the software had a second computer at their desk with a KVM all the PC’s and server were 100% isolated and used a direct dialup to ADP so it quite secure.

    Now we are upgrading to the new software which requires high speed internet and better workstations.

    We have merged the workstations over time so that the user only has one computer with 2 network cards one for the regular network one for payroll which all works fine but management is not too keen on merging the whole setup.

    I am wondering what other people have done with their payroll systems. We are a mid-size company with about 230 employees. In small business’s I just put the quickbooks DB (or peachtree…) on the server with full access to the 1-2 users that need it and nobody else.



    Acceptance of cloud solutions didn’t took off as predicted by tech pundits, because security concern is holding back many growing organizations to venture into the world of best-in-class cloud HR solutions out there for streamlining critical payroll and HR operations.

    This is the reason for the low adoption rate of cloud based payroll software across businesses all over. Unfortunately, business owners and entrepreneurs due to incomplete knowledge fear to host employee data on cloud database or servers.

Viewing 2 posts - 1 through 2 (of 2 total)

You must be logged in to reply to this topic.

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: