K2 Enterprises offers On-Site training in conjunction with your State CPA organization.
Use this space to call out something you don't want readers to miss (like a call-to-action, product highlight, important quote).

If adding an image, keep the size under 200px wide.
In this month's K2 Tech Update, our feature articles discuss Catching Up with K2's Randy Johnston on Accountex, Best Practices for Remote Access, and Securing Your Computers with Data: It Can Be Done!

Our News section reports on the announcement of the 15th Annual K2 Quality Award Winners for 2016, K2 announcing the Availability of Tax, Accounting, and Auditing CPE Options, how SSi Consulting was Awarded "2016 BI360 Sales Evangelist Award" and K2 Enterprises' Webinar Schedule for the remainder of September and for October.
This month's Tech Tip focuses on Building Better Forecasts with Excel's Forecast Sheet Feature. You have the option of reading the articles or watching the step by step instructions on our YouTube channel.

Finally, this month's Course Spotlights include K2's Excel Tips, Tricks, and Techniques for Accountants and K2's Top PDF Features You Should Know.
We hope you find the newsletter timely, relevant, and useful. If you have topics you would like for us to cover here in coming months, please let us know.


Tommy Stephens
K2 Enterprises
Catching Up with K2's Randy Johnston on Accountex
The following article summarizes an interview of K2 Enterprises' Executive Vice President Randy Johnston conducted by Kacee Johnson, Owner of Blue Ocean Principles. The topic of discussion between Kacee and Randy was the upcoming Accountex conference scheduled for November 15 through November 18 at the Mirage in Las Vegas. Randy is scheduled to present two educational sessions during the event: 1) Risks and Rewards of Hosted, On-Premises, and Hybrid Solutions and 2) CyberSecurity Threat Analysis.

Best Practices for Remote Access
In today's "anytime, anyplace" world, many business professionals have the need to access their data and desktops remotely. In some cases, this requirement is only occasional, while in others, it is standard operating procedure. In this article, we examine the best practices for remotely accessing the tools you need to get the job done.  

Secure Your Computers with Data: It Can Be Done!
Viruses. Malware. Ransomware. Identity Theft. And the list goes on. The number of ways sensitive and confidential data, we have been entrusted to maintain and protect, comes under attack, seemingly increases, on a daily basis. Yet, that does not mean we should sit back and take a passive, reactive approach to data security.    

K2 Enterprises Announces the 15th Annual K2 Quality Award Winners for 2016
  Read more here

K2 Enterprises Announces the Availability of Tax, Accounting, and Auditing CPE Options
Read More Here
  SSi Consulting Awarded "2016 BI360 Sales Evangelist Award"   
   Read more here

 K2 Enterprises Webinar Schedule for the Remainder of September and for October
Read more here