With our community of partners, you can get expert advice and training so you can be up and running in no time!
View setup partnersWith our community of partners, you can get expert advice and training so you can be up and running in no time!
View setup partnersGet the Guide on Moving from spreadsheets to software.
Want to join us? Become a partner.
No credit card required. No contracts to cancel. No setup fees. No hidden costs. No downloads.
978 million people in 20 countries were affected by cybercrime in 2017. One in four small businesses experienced a cyber-attack or hacking attempt in New Zealand and Australia (Norton Cyber Security Insights Report 2017 Global Results).
These videos will help you ensure you are taking the right steps towards a safer account.
Our activation email ensures your credentials and identification.
Clicking the button in your email gives us the green light to set up your account.
Follow the steps in the journey to set-up your free Xero login (if you are a new trialist or staff member that’s been invited into an existing account) You’ll need to use a unique email and password.
Practicing sensible cyber safety has become a necessary part of modern life. Just one easily guessed password can stop your business in its tracks.
Now you will always use your Xero login credentials to access your WorkflowMax account.
Download an authenticator app to your phone (or desktop if you don't have a smartphone) from your app store. We suggest Google Authenticator and Authy.
Follow our WorkflowMax Support Centre instructions or watch our videos below to sync the authenticator app to your Xero login and set your security questions.
Next time you login to Xero, you'll need to enter your email and password as per usual, then open your authenticator app and enter the passcode to sign in.
Our lives are increasingly digital but many people still use and share weak passwords that are easily guessed, or fail to keep software and anti-malware up to date. For this reason, two-step authentication is being used more and more in everyday situations where security and privacy are important, including access to online banking and email.
What may appear to be temporarily inconvenient has been proven to significantly reduce the risk and inconvenience of a compromised account.