Resources

Objective Advice and Deep Expertise—Find it Here

Welcome to the EKS&H resources page.

As your true business advisor, we provide information on regulatory updates, industry strategies, and expert analysis to help you think strategically and make better decisions.

Browse by type, or use the search feature to find content on specific topics of interest.

June 29, 2018 | Lyle Bauman

How Construction Companies Can Identify, Correct, and Prevent Four QuickBooks Data Corruption Issues

Many businesses in the construction industry use QuickBooks for accounting and bookkeeping because it an affordable and easy solution. However, data corruption can occur if you don’t keep your financials balanced and your files clean. In this tech tip we show you several strategies for identifying and correcting corruption - or avoiding it in the first place. Read on »

June 1, 2018 | Gabriel Cisneros

Smart Businesses Enable Two-Factor Authentication for Office 365 and G Suite

Two factor-authentication is a best practice for businesses, but many companies haven’t enabled it for Office 365 and G Suite. Has yours? Read on »

February 1, 2018 | Gabriel Cisneros

​Why You Should Always Opt-in to Two-Factor Authentication

In our last tech tip, we shared information to help end users improve their password security. The next level of defense is two-factor authentication, which is the process of verifying you are who you say you are by using something you have or something you are (as opposed to something you know, like a password).  Read on »

December 29, 2017 | Gabriel Cisneros

​Password Security: Two Major Password Security Rules That Are No Longer Best Practices (and What Rules You Should Follow Instead)

The topic of password security doesn’t seem to be going away anytime soon, and for good reason: people spend the equivalent of 1,300 years each day typing passwords, according to Cormac Herley, a principal researcher at Microsoft. Unfortunately, much of the advice on password management has turned out to be wrong and it is making businesses, organizations, and individuals vulnerable. Read on »

October 31, 2017 | Gabriel Cisneros

Cybersecurity Patch Maintenance 101

Preventing data breaches is often as straightforward as installing free patches to eliminate vulnerabilities in your hardware, operating systems (OS), and applications. Unfortunately, far too many businesses neglect this crucial task for reasons ranging from underestimating consequences of cyberattacks to prioritizing other business functions ahead of cybersecurity. Read on »

July 25, 2017 | Jilson Schlachter

How to Use a Custom Shape (SHP) File and Map in Tableau

Visualizing information via a map provides valuable insight that may not otherwise be obvious. Tableau maps provide excellent layers to amplify data discovery. Even with the geospatial context discussed in an earlier Tech Tip, additional information will make a map relevant. Read on »

July 12, 2017 | Mary Sherman

Integrating Google Maps with IBM Cognos 10.2.2

In this Tech Tip, EKS&H Senior Consultant Mary Sherman explains how to integrate Google Maps with IBM Cognos 10.2.2. Read on »

July 11, 2017 | Elizabeth Snow-Trenkle

How to Deliver a Compelling Software Demonstration

As we grow in our professional careers, we will likely be asked to build something that we can show to team members, peers, or other users. While it’s sometimes appropriate to show what has already been built within the organization, other times the demand has different requirements. For example, the most common request I have heard recently is “what is possible? What can business intelligence do above and beyond what is already in place at my organization?” Read on »

July 7, 2017 | Elizabeth Snow-Trenkle

Cognos Team Content Security

Determining the organization of folders for Team Content in IBM Cognos can be a daunting task. In general, companies choose a functional structure aligned with their business structure and then create folders and subfolders within Team Content to ensure users have access to only areas they are approved to access. One client recently asked if it was possible to set security on Public Folders so when new folders were created they would default to being visible only to administrators. Read on »

June 16, 2017 | Chris Framel

11 Quick tips for Users of IBM Cognos 11

Have you upgraded to Cognos 11 and now have difficulty finding the report development tools that you knew in Cognos 10? Are you a new user to Cognos and just starting out in Cognos 11? If so, here are 11 quick tips, fixes, and time savers to get you started using Cognos 11 Release 5. Read on »

Displaying results 1-10 (of 33)
| < <  1 - 2 - 3 - 4   > >|
RESOURCE TYPE

RECENTLY ADDED