HMS Cornerstone Solutions cures your business pain points by harnessing technology. We are more than a software consultancy firm – we’re a partner vested in the overall health and wellness of your business. We streamline software solutions and business processes to improve your utilization, delivering quantifiable information using real-time data points to save you money and improve your bottom line.
Are you using Digital Signatures yet? Even the IRS has said that as of March 30th it would “begin temporarily accepting digital signatures on documents related to the determination or collection of tax liability.”
Digital Signatures are perfect for maintaining social distancing – customers can sign from their homes, backyards, and even their cars. They are an extremely effective way to keep your business moving throughout any economic disruption.
Digital Signatures are fast and cost effective. They cut out the expense of printing, scanning, and mailing documents, automating your whole signature process. Who doesn’t need automation? Digital Signatures can be implemented through email and on mobile devices, making them available to all your customers. And all of your digital documents can be stored in one centralized repository, making edits and resends quick and easy.
If you have questions about Digital Signatures and how they work, Cornerstone has extensive experience integrating Homebuilder systems with Digital Signature technology. We can walk you through each solution, detailing the pros and cons and tailoring a solution that will work best for your company and your customers.
It’s time to jump onboard and make the Digital Signature change today – it is one change we can guarantee you are most certainly ready for!
If someone bilked you out of $500, would the police pursue the case? Would you pursue the case? (If you said ‘yes’ to that last question, you are probably making the assumption that the money would be recovered quickly. The longer and more effort it takes, the less likely you’ll continue to pursue the case…or collect anything.)
The latest Real Estate scam counts on it not being “worth the time” to track down the culprit. Here’s how it works:
1. The scammer rents an Airbnb with a stolen credit card and a burner phone.
2. The scammer uses the photos online and information to advertise a room for rent on Craig’s List.
3. On the date of the Airbnb rental the scammer shows up, obtains the key, and makes copies.
4. During the rental period the scammer shows the room, provides a bogus ‘contract’ to sign, collects a deposit and provides the ‘renter’ with a key.
Some scammers have several “showings” a day, collecting several thousand dollars from unwitting victims. Most victims don’t bat an eye at the fact that the funds are requested in cashier’s checks as that is a normal request of legitimate landlords.
This scam is particularly successful because the scammer checks all the boxes: receipt of funds, contract, key…all appearances point to a legitimate transaction. It is also successful for the scammer because the amount that s/he scams individual victims out of is small enough that the likelihood of the victim to try to or be able to recover it is low.
Nowadays there are a lot of houses for rent on the market. This is definitely a trend that is here to stay and can be beneficial for both landlord and tenant. However, unlike apartment buildings and complexes, rental houses may not be managed by a property manager.
Rental properties that are not managed by professionals are much more likely to be the target of rental scams. Here are some precautions that every potential renter should take, for every rental property they are thinking about renting:
The website where you find the property should have multiple photos, inside and outside. Inquire about the property and ask about something you can’t see in one of the photos.
The website where you find the property should have details about all the amenities. Look at the list and make sure the attractions mentioned are actually nearby – within walking distance if that’s what they say they are.
The webiste should have an exact address, not just an area circled on a map. Move on to another property if you can’t get the exact house address.
You should be able to set up an appointment for a walkthrough. Do not sign anything or make any payments until after the walkthrough.
You should be asked to provide information about yourself to be screened as a potential tenant. If you are not asked for your information at all or if you are asked for your information prior to a requested walkthrough, move on to another property.
You should be asked to sign a lease, but you should not be asked to sign or pay anything before seeing the property. If any kind of payment is requested before you have signed a lease and received keys (that actually open a door to the property) move on to another property.
Pay attention to the following warning signs: if the person asking for the intial rent or a deposit is out of the state or country; if the rent requested is too cheap for the area where the property is located; and/or if you are asked to wire a deposit or rental amount. These are all potential signs that the person asking for money does not own or manage the property.
Don’t be pressured. Scammers favorite tool is to try to make you act without thinking something through. Whether there is a time limit or not, you should thoroughly research the property – and if you don’t have time, move on to something else.
Know the owner – check real estate, property management, and tax assessor’s records to make sure that the person you are dealing with is the legitimate owner of the property.
Finally, if at any time during the process you feel uneasy or doubt what you are being told is true, move on. There are a lot of scammers pretending to be owners as soon as a house is placed on the market because more often than not, they get away with it! If no one was fooled, the number of scammers would drop significantly. Don’t be a statistic.
Let’s face it. Security set up and management in complex ERP environments can be daunting. A lot is resting on iron clad security mechanisms being put in place and monitored over time. Implementers, IT managers and even department line managers are charged with ensuring that proper security mechanisms exist across the operational software supporting homebuilder operations, but with so many internal controls, user roles and personnel, visibility into broad and detailed security set up can be challenging.
Enter informXL and the new User Security Analyzer, now available in the informXL 4.5 for NEWSTAR release. This new Analyzer will benefit anyone responsible for maintaining or auditing user security access in NEWSTAR, especially IT personnel, Controllers or those performing internal audits. It can be used for a variety of tasks, including:
General security management by user or user type
Analysis of internal controls and segregation of duties
Project level security management
Review of PO approval rules
Review or audit of security overrides
The User Security Analyzer provides detailed information for NEWSTAR users around assigned user types, NEWSTAR Web access, PO approval Rules and logged usage. The Analyzer can also be run by Project Security for quick insight into which users and user types have access to specified projects. Some of the highlights include:
Menu Security – pulls from all menu-based security for active user types showing menu security names and the associated controls. This report provides excellent insight into internal controls and allows validation of current set up to ensure adequate segregation of duties have been properly structured and is helpful during initial user security set up.
PO Approval Drill Down – ability to audit or review PO approval rules assigned to a specific user. A drill down feature provides visibility into user information, Rule ID, approval limits and escalation contacts if needed.
NSE Web Access – for anyone using NSE Web, the User Security Analyzer will provide insight into whether a user ID has been added into NSE Web and whether or not it has been approved. Conditional formatting allows you to easily see the status, along with the last login date.
Usage Drill Down – using a logged usage drill down which pulls all logged usage information by user, easily identify every program code a user has hit over a specified period of time.
Project Security – for those who have implemented project level security in NEWSTAR, the User Security Analyzer will highlight all operating units and projects a particular user is assigned to using project level security in NEWSTAR. A pivot table is included allow a quick and easy audit of which users have access to a particular project.
Those responsible for user security oversight will appreciate the ease of insight the informXL User Security Analyzer provides, and the time it saves tending to those important tasks associated with properly securing sensitive data. To see the User Security Analyzer video overview, check it out on the informXL YouTube channel where it can be found in the Analyzer – Constellation NEWSTAR section. The User Security Analyzer is only available beginning with release 4.5. Anyone interested in updating to the latest release should email us to request the update.
Cornerstone Solutions is pleased to be working closely with KOVA Sapphire Build on projects this year. This strengthens our partnership and ensures that our team is up to date on all the latest features and functionality. If you have any customizations or functionality you’ve been looking to implement, we’d be glad to assist you!