Acumatica includes security tools designed to help protect your company’s financial, customer, vendor, inventory, and operational data. However, these tools are most effective when they are reviewed and maintained as part of your normal business process.
This page highlights practical security areas Acumatica customers should review, including password settings, multi-factor authentication, user roles, consultant access, integrations, and recurring security reviews.
The goal is not to make your team security experts. The goal is to help you identify common areas that may need attention before they become a problem, because apparently waiting until something breaks is still the most popular business strategy.
Password Settings
Acumatica customers should review company-wide password settings to confirm they meet current security expectations.
Recommended areas to review include:
A practical starting point is to require longer passwords, prevent repeated reuse of old passwords, and lock accounts temporarily after several failed login attempts.
Multi-Factor Authentication
Multi-factor authentication, commonly called MFA, adds another layer of protection beyond a password.
MFA should be strongly considered for:
MFA is one of the most practical ways to reduce the risk of unauthorized access.
User Roles and Permissions
Acumatica uses role-based security, which means users should receive access based on their job responsibilities.
Examples may include:
Users should only have access to the screens, reports, and functions needed to perform their job. This is often called the principle of least privilege, which is a fancy way of saying “do not give everyone the keys to the whole building.”
Administrator Access
Administrator access should be limited to a small number of trusted users.
Companies should regularly review:
Administrator rights should not be assigned casually or used for daily activity unless necessary.
Consultant and Partner Access
Outside consultants and partners may need access to your Acumatica system for implementation, support, upgrades, or project work. That access should be reviewed and controlled.
Best practices include:
Consultant and temporary project accounts should also be reviewed during project closeout.
Integration and Service Accounts
Integrations should use dedicated service accounts instead of regular employee logins.
This may apply to:
Using service accounts helps avoid problems when an employee leaves and makes it easier to understand which systems are connected to Acumatica.
Quarterly Security Reviews
Security should not be reviewed only when there is a problem. A quarterly review can help keep access clean and current.
A good quarterly review should include:
This does not need to be complicated. A simple recurring review is often enough to catch issues before they turn into expensive little disasters with invoices attached.
Use this as a starting point:
ACC Software Solutions can help Acumatica customers review their current security setup and identify areas that may need attention.
ACC can assist with:
Our focus is to help customers improve security in a practical way without making the system harder to use.
ACC Software Solutions can help your team review user access, MFA options, security roles, consultant accounts, integration users, and other Acumatica security best practices.
Contact ACC Support
Email: support@4acc.com
Website: www.4acc.com/support
Solutions by Industry
What's New
The Hidden Cost of “We’ve Always Done It This Way”
Read MoreSubmitted by Stephanie Dean on Tue, 04/28/26 - 9:26
Sage 100 Updates: Why Staying Current Is Critical
Read MoreSubmitted by Stephanie Dean on Fri, 04/17/26 - 14:19
Eliminating Manual Processes with Modern ERP Tools
Read MoreSubmitted by Stephanie Dean on Mon, 04/13/26 - 11:49