How To Run A Year End In Sage Evolution

How To Run A Year End In Sage Evolution 2560 1707 Ukhozi System Solution
Some little known facts

Published: 2018-02-11 11:35 AM by Keshen Pather
Many new Sage Evolution users ask us how to run a Year End. Running a Year End in Sage Evolution is unlike that of Sage Pastel Partner and Sage Pastel Xpress. In Sage Evolution there isn’t really a Year End, but rather the opening of a new financial year.

To do this there are a few steps that need to take place:
1. Ensure that no users are logged into the company
2. All prior year processing, with exception to audit journals, should be completed
3. Ensure that you have a backup of the database
4. Run the current financial reports (Trial Balance, Income Statement, Balance Sheet, Customer and Supplier Age Analysis, Inventory Valuation)
5. Go to Common>Company Details>Financial Periods Tab
6. Click on Add Financial Period
7. Ensure that the relevant users are blocked from posting into prior year by selecting the period to block on the left and
then adding the users that need access on the right, while blocking everyone else
8. Your Year End is now complete.

Contact us if you have any issues or need assistance with the above.

Pastel Partner Payroll

Pastel Partner Payroll 2560 1707 Ukhozi System Solution
Some little known facts

Published: 2018-02-11 11:38 AM by Pat Van Rensburg
Hello fellow Payrollers
Welcome to the first of many blogs on how we can help and improve your use of Pastel payroll.
If there is one thing we have come to learn it is how underutilised this package is.
There are hidden gems that need to be uncovered and that is why we are here.

Let me give you an example of an upcoming, important event and option that is seldom used.
Workmen’s compensation or OID as it is on the package. It is a year-end function, so coming up soon, that should be calculated and stored for your return in March. And remember no one asks for this return. You go on line, register with ROE (return of Earnings) submit your figures and the Department of Labour will generate an invoice for you to pay.

This is also the time of year to drop them off your payroll so they are not carried forward. It is a box that is ticked as you are completing your year end. If you pass over it, well that’s another year you sit with those employees on your payroll.

Lawrence Pillay

Vat Change in Pastel Partner – Be Prepared

Vat Change in Pastel Partner – Be Prepared 2560 1707 Ukhozi System Solution
This means many changes but we have you covered

Published: 2019-06-03 11:57 AM by Remon naidoo
Click the link below to download the tax changeover guide . If you cannot click simply copy and paste into your browser address bar.
Vat Changeover Guide
Follow the steps and all should be well .
Our Tax Hitman is ready and waiting to assist as well .

Lawrence Pillay

Cryptocurrency: What is it? And should we start preparing our financial systems for it?

Cryptocurrency: What is it? And should we start preparing our financial systems for it? 2560 1707 Ukhozi System Solution
Knowledge is power

Published: 2018-05-30 03:19 PM by Lawrence
By now you’ve probably heard about the cryptocurrency craze. Either a family member, friend, neighbour, doctor, Uber driver, colleague, waitress, or passer-by on the street, has probably told you how he or she is getting rich quick with virtual currencies like bitcoin, Ethereum, Ripple, or one of the lesser-known 1300 plus investable cryptocurrencies. But how much do you really know about them? Considering just how many questions I’ve heard being asked over the past few months, the answer is probably, “not a lot.” So should we start preparing our financial systems to accommodate for this? Let’s attempt to break it down shall we? We’ll begin with trying to understand what cryptocurrencies are.

Cryptocurrencies, sometimes called virtual currencies, digital money/cash, or tokens, are not really like rands, pounds or dollars. They live online and are not backed by a government. They’re backed by their respective networks. Technically speaking, cryptocurrencies are restricted entries in a database. Specific conditions must be met to change these entries. Created with cryptography, the entries are secured with math, not people. Restricted entries are published into a database, but it’s a special type of database that is shared by a peer-to-peer network. For example, when you send some Bitcoin to your friend Kevin, you’re creating and sending a restricted entry into the Bitcoin network. The network makes sure that you haven’t sent the same entry twice; it does this with no central server or authority. Following the same example, the network is making sure that you didn’t try to send your friend Kevin and your other friend Natasha the same Bitcoin.

The peer-to-peer network solves the “double-spend” problem (you sending the same Bitcoin to two people) in most cases by having every peer have a complete record of the history of all the entries made within the network. The entire history gives the balance of every account including yours. The innovation of cryptocurrency is to achieve agreement on what the history is without a central server or authority.

Entries are the representation of cryptocurrency.
Cryptocurrencies are generated by the network in most cases to incentivize the peers, also known as nodes and miners, to work to secure the network and check entries. Each network has a unique way of generating them and distributing them to the peers.

Bitcoin, for example, rewards peers (known as miners on the Bitcoin network) for “solving the next block.” A block is a group of entries. The solving is finding a hash that connects the new block with the old one. This is where the term blockchain came from. The block is the group of entries, and the chain is the hash. Hashes are a type of cryptologic puzzle. Think of them as Sudoku puzzles or crosswords that the peers compete to connect the blocks.

Every cryptocurrency is a little different, but most of them share these basic characteristics:
They’re irreversible. After you send a cryptocurrency and the network has confirmed it, you can’t retrieve it. Cryptocurrencies are one way, no chargebacks.
They’re anonymous. Anyone can open a wallet, no ID required, and have varying stages of anonymity depending on which token you utilize.
They’re fast and globally accessible. Entries are broadcast across the network immediately and are confirmed in a couple of minutes.
They’re built to be very secure. Cryptocurrencies use the latest cryptographic techniques, but they’re in early development.
They have a controlled supply limited by the network.

So now that we have some idea what it is, we then ask ourselves, how will we be able to accommodate for this on our financial systems? The positive fact is that it is not something that we have to worry about immediately. As fast growing and ever expanding as the crypto market is, it will take a bit of time for it to reach the stage of businesses using it for transactions.

And when the time does come, we would expect for this currency to be handled in the exact same way that we handle foreign currencies. Because just like foreign currency, the exchange rate of cryptocurrency is ever changing and fluctuating.

So whether you’ve hopped onto the crypto-bandwagon or not, it’s going to be a term that you’re going to be hearing quite often in the coming years.

How to Add Company and I have paid my Annual Licence Fee

How to Add Company and I have paid my Annual Licence Fee 2560 1707 Ukhozi System Solution
Frequently Asked Questions on How to Add a Company and I have paid my Annual Licence Fee

Published: 2018-08-06 11:03 AM by Nadia Henderson
How do I add a company to the menu when opening pastel?
I will begin with by assisting the Pastel user how to add a company onto their menu that they wish to open in Pastel Partner and Xpress that was once there and not there anymore or now need to see that specific company and add.

Please click on the link on how to add a company
I have paid my Annual Licence Fee ……

Another frequently asked question, I have paid my annual licence fee but still keep getting a pop up when opening pastel to remind me to pay. Once you have done so and you have reached your expiry date you still need to follow a process on your server and workstations (if applicable) and register your package so that the licence now reflects a year on.

Please click on the link and follow the process for Server and Workstation Registration.
We are always here to assist our clients, but do empower our clients to make use of their SAGE Accounting Packages.

Should you require assistance do not hesitate to contact us.
Thank you
The Ukhozi Team
“Flying above the Rest”

Get you head out off the “Cloud ” – What does the “Cloud” mean?

Get you head out off the “Cloud ” – What does the “Cloud” mean? 2560 1707 Ukhozi System Solution
A simplistic explanation of one of the most confusing phrases today

Published: 2018-08-27 07:28 AM by Nischelan Naidoo
As we are a technology based organization we get asked about all the latest buzz words and applications in the technological arena. Our most recent enquiries have been about “the cloud”.

What is the cloud?
Simply put it is information that is stored “on” the internet. What actually happens requires a few further steps. These steps are commonly referred to a cloud computing.
Cloud computing is the ability to perform tasks over the internet with the aid of technology.
Cloud computing comprises of the upload, storage, download and processing of information basically.
If you have a Gmail or msn email account you are using cloud based computing. You would create an email, send it (upload), it would be processed and sent to who you wish to send it to (download).
People choose to move to cloud based computing because of the numerous benefits.
Significant Cost reductions – Many of the costly components of a network such as a server is paid for by the company that is going to store your information.
Improved Access to information – One is able to use information that is stored on a cloud 24 hours of the day. From home or a foreign country provided that there is an internet access.
Improved security – Companies that store information for clients have to have the world’s best security features. Large organizations trust these companies with sensitive information and have strict contracts in place. This is a benefit that is passed down to the average user as the maximum measure of security is applied to all clients of the hosting company.

The most common uses of cloud technology include cloud data storage and cloud servers.
In a cloud storage scenario you would upload information to a pc off site across the internet. This enables you to have access to this information anywhere in the world and generally via very simple means. This method is purely to store and access information. A drop box or Google drive are perfect examples of this technology. The cloud server form of cloud technology on the other hand involves going from a physical server in your building to a server that is off-site. This means all your information, programs and applications are now moved off-site. You will now only be able to access your server through an internet link.

Cloud services are ways in which cloud based computing can be used to help a business.
These can be split into three categories.
Infrastructure as a service (Iaas) – is a pay as you go access to storage, network, servers and other computing resources in the cloud. This means that a company would rent out hardware to you at a specific rate.

Platform as a service (Paas) offers access to a cloud based environment in which users can build and deliver applications.The provider supplies infrastructure. This method is utilized by medium sized businesses that cannot afford to outlay capital for hardware but need advanced systems to run their software on. They also pay a fee either monthly or annually.

Software as a service (SaaS) is when a service provider delivers software and applications through the internet. Users subscribe to the software and access it via the web or vendor API’s. the simplest example I can refer is that of an application on the Google play store. They hold it , and charge you for when you wish to require it.

Cloud functionally has become integral to most business operations. The benefits will always outweigh the drawbacks as the major trend of this technology integration in recent years has only deepened.

Call us today and we can advise on how we can get your ERP to work off the cloud .
Team Ukhozi
“Soaring above the Rest”

Some Important Information Regarding Payroll

Some Important Information Regarding Payroll 2560 1707 Ukhozi System Solution
Dont be caught with your pants down

Published: 2019-02-01 07:52 AM by Pat Van Rensburg
We are always looking for ways to improve the lives of our clients and we believe good preparation goes a long way to making this happen. To this end we have created a checklist for you to go through as we prepare for this busy time in Payroll.

Are you on the right Version
It is very important in payroll to be up to date with Sage payroll. Legislation changes, and you need to change with it. From the 1st September Version 3 was released and it’s important that you are on it. It contains changes in line with EMP501 August submissions. To make these changes go to your Utilities bar, click down to weblinks, click on download latest version, and click on download version 3.

Are you UIF compliant
From March 2018 it became compulsory to complete and submit uif returns to the Department of Labour. Sage payroll does that for you at the click of a button. But you need to be set up properly. In company set up, under statutory add your uif number issued by Department of labour. Then once a month go to View, Statutory, UIF ,Electronic declarations, and follow the prompts. Call us if you need help. This would be a good time to see if we are your registered business partner. An email to pat@ukhozisystems.co.za with your site code will sort that out.

Are you Backing up Correctly
Backing up to the C drive is not backing up correctly. If that computer crashes, what happens to your payroll and all your backups. If you are not linked to a server, please invest in a separate hard drive and use that as your back up. It will save you in the long run. There is an awesome blog on Pastel irontree backup and well worth reading for more information.

Are you ready for EMP 501 August submission
Just a reminder that returns will be due and returns can be filed from 17th September to 31 October 2018. It is important that you wait and see if there is an update for Easyfile and submit your returns around the end of September.

Sage 50 Cloud Pastel Partner

Sage 50 Cloud Pastel Partner 2560 1707 Ukhozi System Solution
50 Cloud Pastel?

Published: 2019-02-01 07:52 AM by Nadia Henderson
More time. More productivity. More control.
Sage 50 Cloud Pastel Partner offers the power and productivity of a trusted desktop solution and gives you everything you need to run your business wherever you are through a seamless integration with Microsoft Office 365. Run your business more efficiently with a time-saving, in-depth solution to manage your accounting, invoicing, cash flow, inventory, VAT, and more.
Smart cloud connected accounting software
Sage Contact
Sage Capture
Sage 50cloud Intelligence Reporting
Cloud Backup
Microsoft Office 365 Integration – click on the link to view these features
Accept payments from your customers
Direct Bank Feeds

For more information on how to get Sage 50cloud Pastel Partner, contact your Consultant at Ukhozi.
“Flying above the Rest”

Educate yourself on Cyber Attacks

Educate yourself on Cyber Attacks 2560 1707 Ukhozi System Solution
Are small businesses in danger of a cyber-attack?

Published: 2019-02-01 07:52 AM by Lawrence
If you are a small business owner, you might think your company is an unlikely target for a cyber-attack. After all, few criminals will bother attacking a little firm like yours when they can go after a big bank or insurance company, right? Unfortunately, the answer is no. Criminals attack small business more often than you might think. The most worrying part of that statement, is the fact that a very small number of companies are prepared for an attack of this magnitude against their firm. But it is not the fault of small business owners that this is the case. Cyber-attacks against big companies are well publicized by the news media, while attacks against small firms generate little attention. This can give small businesses a false sense of security. Yet, small firms are generally more vulnerable than large ones because they have fewer resources to devote to security. Thieves often take the path of least resistance, and small companies’ systems are often easier to penetrate than those of large firms.

Types of Attacks:
A cyber-attack may involve a hacker, a virus, malware, phishing or other activity on your computer system. Attacks can come from inside or outside your company. Inside attacks are often perpetrated by unscrupulous employees. Outside attacks may be committed by criminals located almost anywhere in the world, or sometimes even corporate spies.

Widespread Effects:
A cyber-attack can be devastating because a single event can impact a business in many ways. Loss or Damage to Electronic Data: A cyber-attack can damage electronic data stored on your computers. For example, a virus damages your sales records, rendering them unusable. Recreating them is a time consuming process that involves sifting through old invoices.

Extra Expenses:
A cyber-attack may cause you to incur extra expenses to keep your business operating. For instance, a hacker damages two of your computers, forcing you to buy two new laptops so you can keep your business.

Loss of Income:
An attack may also cause a loss of income. For instance, a denial of service attack makes your computer system unavailable to customers for two days. You are forced to shut down your business during that period, and your customers go to your competitors. The two-day shutdown causes you to lose income.

Network Security and Privacy Lawsuits:
A cyber thief may steal data stored on your computer system that belongs to customers, suppliers and other parties. These parties may sue your firm. For example, if you are in the legal field, a hacker steals information about a customer’s upcoming merger. The merger falls through due to the data theft. The customer sues you for failure to protect its data, alleging that your negligence caused the company to incur a financial loss.

Extortion Losses:
A hacker steals sensitive data (yours or someone else’s) and then threatens to post it on the internet or simply restrict you from accessing it, unless you pay him a R10000 ransom. Alternatively, you accidentally download ransom ware by opening infected email. The malware encrypts your data, rendering it unusable. The perpetrator then demands a ransom payment in exchange for an electronic key that allows you to “unlock” the encrypted files.

Damage to Your Reputation:
A cyber-attack can seriously damage your company’s reputation. Potential customers may avoid doing business with you, believing you are careless, your internal controls are weak or that an association with you will damage their reputation.

Risks of Using the Internet
Like many small businesses, your firm probably uses the internet. Perhaps you maintain a company website that you use to advertise products or educate potential clients about your industry. Maybe you sell products or offer a service that customers can purchase online. Any of these activities can generate cyber risks. Information you post on the internet may be a source of lawsuits against your firm. For instance, a competitor alleges that you damaged the name of his company in an ad you posted online. Alternatively, an industry rival claims that you infringed on his firm’s copyright, trademark or other intellectual property right.

Little Coverage under Insurance Policies
Most standard property and liability policies provide minimal, if any, coverage for the types of risks described above. A major problem with commercial insurance policies is that they exclude electronic data under the definition of covered property. While they may provide a small amount of coverage for damage to data caused by viruses and other perils, they do not generally cover losses involving hacking or extortion.

General liability insurance policies mainly cover claims alleging bodily injury or property damage. Most cyber-attacks do not result in bodily injury or property damage, as these terms are defined in the policy. In addition, liability policies contain exclusions that eliminate coverage for many potential cyber claims. For example, Coverage A (Bodily Injury and Property Damage Liability) excludes damage to electronic data. Coverage B (Personal and Advertising Injury) excludes infringement of copyright, patent, trademark or trade secret.

As you can see, relying on standard insurance policies as your main source of protection against cyber-attacks is a bad idea. Therefore it may be a worthwhile idea to speak to your insurance companies and also your IT departments/consultants on coverage and protection of cyber-attacks. It may not happen to you or your company at any point, but if it does, it’s always best to be prepared for it.

Contact us today for suggestions of the products that would work best to protect your business .
Team Ukhozi

Sage 100 Evolution and your Business

Sage 100 Evolution and your Business 2560 1707 Ukhozi System Solution
Why Choose Sage 100 Evolution

Published: 2019-02-12 04:29 PM by Keshen Pather
I get asked all the time, “Why should I move to Sage 100?”.
So what makes Sage 100 so appealing? For one it comes with many built-in modules, like Multi-warehousing; Bank Manager; Point of Sale and CRM Standard. Secondly, Sage 100 is developed on SQL which means it is a lot more stable than Pastel Partner’s Pervasive. It’s also the fact that Sage 100 has unlimited financial years, which means no more tedious Year Ends!

Click The read more button to see a bit more detail or Contact Keshen on 076 974 9238 or keshen@ukhozisystems.co.za
if you would like us to Demo Sage 100 for you.

Some core features of Sage 100 include:
• System Manager                                                                  • Advanced Security
• Microsoft® Office Integration                                             • Graphs and Visual Reports
• Central Search and KPI Dashboards                                  • Visual Reports
• Report Writer & Stationery Customisation                      • Accounts Receivable
• Accounts Payable                                                                • Invoicing
• Project Tracking                                                                   • General Ledger
• Cash Book                                                                            • Sales & Purchase Order Entry
• Inventory Control                                                                • Unit of Measure
• Goods Received Voucher                                                   • Import Cost Allocations
• Tax Module                                                                           • Sage Pay
• Customer Zone

Additional modules available:
• Bill of Materials                                                                     • Sage Intelligence
• Multi-Currency                                                                      • Pricing Matrix
• Serial Number Tracking                                                        • Voucher Management
• Fixed Assets

Contact Keshen on 076 974 9238 or keshen@ukhozisystems.co.za if you would like us to Demo Sage 100 for you.
Team Ukhozi
“Soaring Above the Rest”

Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Here you can change your Privacy preferences. It is worth noting that blocking some types of cookies may impact your experience on our website and the services we are able to offer.

Click to enable/disable Google Analytics tracking code.
Click to enable/disable Google Fonts.
Click to enable/disable Google Maps.
Click to enable/disable video embeds.
Our website uses cookies, mainly from 3rd party services. Define your Privacy Preferences and/or agree to our use of cookies.