K2’s What’s New With QuickBooks
Computer Software and Applications
1 CPE Credits

Major Topics
- Licensing issues
- Pricing updates
- New and improved features
- Transitioning from QuickBooks Desktop to QuickBooks Online
Learning Objectives
- List examples of key new features in QuickBooks Desktop, Online, and Enterprise Solutions
- Identify changes in the licensing agreements across the QuickBooks platform
- Cite examples of similarities and differences in features and functions across the QuickBooks platform
Description
QuickBooks Desktop, Online, and Enterprise Solutions remain three of the most widely used accounting applications in use today. However, each platform continues to experience major changes across several fronts. Feature sets, licensing requirements, and price changes all impact users at unprecedented levels. Further, competition continues to emerge in the small business accounting battleground, adding confusion to the options existing QuickBooks and QuickBooks Online users may have. In this session, you will learn about many of the changes impacting QuickBooks Desktop, Online, and Enterprise users, and you can manage these changes for the benefit of your company or your clients.
Compliance Information
Overview
QuickBooks Desktop, Online, and Enterprise Solutions remain three of the most widely used accounting applications in use today. However, each platform continues to experience major changes across several fronts. Feature sets, licensing requirements, and price changes all impact users at unprecedented levels. Further, competition continues to emerge in the small business accounting battleground, adding confusion to the options existing QuickBooks and QuickBooks Online users may have. In this session, you will learn about many of the changes impacting QuickBooks Desktop, Online, and Enterprise users, and you can manage these changes for the benefit of your company or your clients.
Course Details
- Common security weaknesses that occur with hardware and software at home and in the office
- Malware, ransomware, data breach, and incident response tips
- Internal control failures which result in the theft of assets or unauthorized manipulation of data
- List at least three major security incidents reported in the headlines in the last year, and explain at least one major internal control design or operation flaw that allowed the hack to occur
- Select the correct definitions for common security terms such as attack surface, vulnerability, exploit, social engineering, phishing, malware, heuristics, biometrics, and multi-factor authentication (MFA)
- List at least three best practices learned by reviewing the control failures cited in the case studies
Intended Audience — Business professionals seeking to optimize their home network solution
Advanced Preparation — None
Field of Study — Information Technology
Credits — 2 Credits
IRS Program Number –
Published Date – January 1, 2025
Revision Date –