I’ve been thinking about this a lot lately, and the 2026 cybersecurity statistics are honestly terrifying for anyone running a bookkeeping practice.
The Numbers That Keep Me Up at Night
Here’s what I’ve been reading:
- 70.5% of data breaches in 2025 targeted small and mid-sized businesses
- 80% of small businesses experienced at least one cyberattack last year
- 27% of breaches originated from misconfigured cloud settings—this one hit me hard because most of my clients use cloud accounting
- 60% of small businesses that suffer a data breach close within six months
And the kicker: the average cost of a breach for companies under 500 employees is $3.31 million. For the small businesses I serve, that’s not a setback—that’s lights out.
My Cloud Accounting Paranoia
I manage books for 20+ small businesses. Until a couple years ago, everything was on QuickBooks Online. Cloud-based, accessible from anywhere, convenient. But then I started thinking about threat models:
- My QBO account = single point of failure. If credentials get phished (and AI-generated phishing now has a 54-78% open rate vs 12% for traditional), attacker gets access to ALL my clients’ financial data simultaneously
- Vendor breach risk: If Intuit gets breached, every QBO user is exposed. I have zero control over their security posture
- API attack surface: Cloud platforms have always-on endpoints. More endpoints = more attack vectors
- Third-party integrations: Every Plaid connection, every bank sync, every connected app expands the blast radius
Why I Started Wondering About Beancount’s Security Model
When I moved clients to Beancount, it wasn’t for security—it was for transparency and version control. But I’ve realized the architecture has genuinely different security properties:
What offline-first gets right:
- Data lives on my encrypted laptop (FileVault), not on someone else’s server
- No always-on API endpoints to attack
- No Plaid connections sharing bank credentials with third parties
- Git repo can be self-hosted (no vendor breach risk from GitHub)
- Attack requires physical access or targeted malware, not just credential stuffing
What offline-first gets wrong:
- I’M the entire security team. No Intuit SOC2 team watching for anomalies
- Backups are my responsibility (if my laptop dies and backup fails, data is gone)
- Plain text files are human-readable—if someone gets access, there’s no database encryption layer to slow them down
- Email transmission of ledger files = potential compliance violation
- Git history contains everything—can’t truly delete sensitive data without rewriting history
The Real Question
Which threat is more realistic for a small bookkeeping practice?
Scenario A: Intuit/Xero gets breached, exposing thousands of businesses simultaneously (big target, big security team, but juicy prize for attackers)
Scenario B: My individual laptop gets stolen from my car, exposing 20 clients (small target, but I’m the “security team” and I have day job responsibilities)
I’ve been leaning toward Scenario A being the bigger systemic risk, but I honestly don’t know. The cloud vendors have dedicated security teams. I have… FileVault and a strong password.
What I Want to Know
- For fellow Beancount practitioners: What’s your security setup? Full-disk encryption? Encrypted Git remotes? GPG-encrypted individual ledger files?
- For the CPAs: What are our actual legal obligations around client data security? Is GLBA relevant for bookkeepers, or just for “financial institutions”?
- Insurance question: Does cyber liability insurance even understand “plain text accounting on a local laptop”? Or do they only have checkboxes for QuickBooks and Xero?
- Threat modeling: Am I overthinking this? Or is the fact that 88% of breaches involve human error mean the architecture matters less than training?
Genuinely curious how others think about this. Security isn’t usually the sexiest topic in accounting, but with 80% of small businesses getting hit, it feels irresponsible to ignore it.