Last week, I sat across from a prospective client—a small e-commerce business owner who’d been burned before. Mid-conversation, she stopped me and asked: “Can I see your encryption specifications? Do you have an incident response plan in writing? What happens if your laptop gets stolen?”
She wasn’t satisfied with “we take security seriously.” She wanted proof.
The 2026 Security Reality: Clients Are Scared (And They Should Be)
The numbers are sobering: cyberattacks on accounting firms have increased 300% since COVID-19. In 2023 alone, 41% of small businesses suffered a cyberattack, with a median incident cost of $8,300. When accounting firms get breached, the damage isn’t just financial—it’s trust, client relationships, and regulatory nightmares (50-state breach notification laws, anyone?).
Our clients read the same headlines we do. They know about business email compromise (BEC) attacks costing US firms $2.4 billion in 2025. They’re worried about deepfake fraud, phishing scams using AI voices, and ransomware locking up their financial records.
The days of “trust me, I’m a professional” are over. In 2026, clients expect documented security measures, not vague reassurances.
What “Proof” Means: The IRS Sets the Baseline
The IRS isn’t subtle about this. Publication 4557 outlines the “Security Six”—mandatory cybersecurity requirements for all tax professionals:
- Antivirus/anti-malware software (updated regularly)
- Firewall protection (network and host-based)
- Multi-factor authentication (for email, cloud services, tax software)
- Backup services (encrypted, tested, off-site)
- Drive encryption (full disk encryption for all devices)
- Virtual Private Network (for public Wi-Fi usage)
But here’s the kicker: You need a Written Information Security Plan (WISP). Not just “I do these things”—you need it documented. Research shows tax professionals with implemented written plans experienced 89% fewer successful cyberattacks and 76% faster incident containment than those relying on ad-hoc measures.
The FTC Safeguards Rule echoes this: documented policies, designated security personnel, incident response procedures, continuous monitoring.
The Beancount Security Advantage (And Challenge)
Here’s where it gets interesting for us plain text accounting folks. When I explain my Beancount setup to security-conscious clients, I can make strong arguments:
Security advantages:
- Local files, not cloud targets: My client data isn’t sitting in a centralized QuickBooks or Xero database that hackers target for millions of records. It’s local, encrypted files on my machine.
- GPG encryption: Every
.beancountfile is encrypted with 4096-bit GPG keys. No plaintext financial data on my drives. - Git commit signatures: Every transaction edit is cryptographically signed with my GPG key. The audit trail is undeniable—you can’t forge authorship or tamper with history.
- Complete version control:
git logshows exactly who changed what, when, and why. Better audit trail than any SaaS platform’s “change log.” - Air-gapped backups: I can keep encrypted backups completely offline. No vendor cloud to breach.
But here’s the challenge:
- No compliance certifications: QuickBooks can wave SOC 2 reports. I can’t. I have to explain my equivalent controls.
- Client education burden: Explaining GPG encryption to a non-technical small business owner is… an experience.
- No “support team” safety blanket: Clients can’t call a 1-800 number if something breaks. They’re trusting my documented procedures.
My Current Approach: The Security Portfolio
When clients ask for proof now, I provide:
- Written security policy (2-page summary of my practices)
- Encryption verification (GPG key fingerprint, explanation of what it means)
- Backup documentation (schedule, locations, quarterly restore test results)
- Incident response procedure (what happens if my laptop is stolen/hacked/lost)
- Access control policy (who can see what data, password manager usage, MFA on everything)
- Professional insurance (E&O coverage that includes cyber liability)
It’s basically my homemade WISP, tailored to a Beancount-based practice.
Questions for the Community
How do you demonstrate your security posture to clients?
- Do you have written security documentation you share?
- How do you explain GPG encryption / git signatures to non-technical clients?
- Have you lost clients who wanted “brand name” cloud accounting instead?
- What compliance frameworks do you map your practices to?
- Anyone doing third-party security assessments (penetration testing, etc.)?
Can plain text accounting be MORE secure than SaaS platforms?
I genuinely believe the answer is yes—distributed individual targets with strong encryption beat centralized honeypots—but I’d love to hear counterarguments or additional security practices I’m missing.
The irony is that Beancount gives us better security tools (encryption, signed commits, complete audit trails) than most cloud platforms… but we have to work harder to prove it to clients who trust brand names over cryptography.
Let’s build that proof together.
Alice Thompson, CPA
Thompson & Associates CPA Firm | Chicago, IL