Cybercriminals Are Taking Advantage of the Current Geopolitical Climate

The current geopolitical climate is driving ordinary cybercriminals to devise new ways to seek victims. The unrest only gives them another pretext to dangle in front of the unwary.

That’s happening right now. Avast warns that criminals have begun to exploit people’s sympathies for those in Ukraine. “As cybercriminals seek to take advantage of the chaos,” the company writes in its blog, “we have tracked in the last 48 hours a number of scammers who are tricking people out of money by pretending they are Ukrainians in desperate need of financial help. We have seen similar scams in the past for people stuck while traveling or looking for love. Unfortunately, these attackers do not operate ethically and will use any opportunity to get money out of people willing to help others in need. What’s suspicious is the immediate mention of Bitcoin, as well as the usernames that consist only of letters and numbers.”

Other criminals are hawking “UkraineTokens.” In this scam, the crooks are combining sympathy with fashion. It’s easy to imagine the marks thinking, well, we’d like to help, and didn’t we see ads for tokens or something on TV? Maybe that’s how things are done nowadays. The UkraineToken scam is relatively easy to see through since it’s marked with poor grammar and loose idiomatic control that usually distinguishes fraudulent pitches.

This kind of social engineering hasn’t been confined to any one channel, Avast points out. “There have also been reports of similar scams spreading on TikTok and other social media sites. In general, we strongly advise not to send any money to unknown people directly, especially in any form of cryptocurrency, as it is virtually impossible to deduce if it is a person in need or a scammer.”

If you’re moved to help, Avast advises doing so through well-known, credible, trusted organizations, and doing so through those organizations’ official websites, not through links shared in social media.

Are you concerned about keeping your data safe?  

Do a full assessment of your cybersecurity posture and capability, review your cyber insurance coverage, ensure your vendors are secure, and firm up your incident response plan. Regardless of the disruptions taking place in the world, these are the most prudent and impactful actions your organization can take.

Information in this article was provided by our partners at KnowBe4.

Phishing attacks on social media doubled in 2021, according to a new report from PhishLabs by HelpSystems. Most (68%) of these attacks targeted organizations in the financial sector, followed by the telecommunications sector in second place at 24%.

“According to the findings, the number of social media attacks per target increased 103% from January 2021, when enterprises were experiencing an average of just over one threat per day,” the researchers state. “In December, enterprises averaged over 68 attacks per month, or more than two per day.”

The researchers also observed a significant rise in phishing emails that attempt to trick victims into calling scammers.

  • Hybrid Vishing (voice phishing) attacks initiated by email increased 554% in volume from Q1 to Q4.
  • Phishing volume has grown 28% year-over-year, with half of all phishing sites observed in Q4 being staged using a free tool or service.
  • Malware delivered via email nearly tripled in Q4, led by a resurgence in Qbot and ZLoader attacks.
  • 70% of advertisements for stolen data took place on chat-based services and carding marketplaces in Q4.
  • The percentage of attacks targeting financial institutions increased from 33.8% in Q1 to 61.3% of all phishing sites observed in Q4.

John LaCour, Principal Strategist at HelpSystems, stated that organizations’ security teams need to be aware of social engineering attacks on social media.

“2021 was another record-setting year for social media as a threat channel,” LaCour said. “Threat actors use social media to commit fraud, impersonate brands and executives, and launch a variety of cyber threats, forcing security teams to monitor a variety of platforms for activity targeting their enterprise. Financial Institutions were the most actively targeted by threat actors since their services are often used broadly across several business sectors.”

Security awareness training can enable your employees to recognize phishing and other social engineering attacks. Learn more about Yeo & Yeo Technology’s security awareness training solutions.

Information used in this article was provided by our partners at KnowBe4.

For most employees, your desk is a daily home base for meetings, focused work time and sometimes socializing. Considering you probably spend more than eight hours a day at your desk, it’s important to find a desk that fits you.

The right desk depends on each person’s workspace and body type, but one thing is universal—it should add movement and comfort. Sit-stand workstations bring ergonomics into the equation to create a comfortable space that helps maintain your health, focus and productivity.

With lots of sit-stand desks on the market, how do you decide?

  • Evaluate your space. Consider how much room you can dedicate. If space is a concern, prioritize a deeper desk rather than a wider desk to keep all your desk essentials within arm’s reach. Shallow desks place your monitor too close to your face, which can cause eyestrain and bad posture.
  • Full desk or desk converter? Choosing a full sit-stand desk or a converter depends on your preference. If you have a sturdy desk, a sit-stand desk converter will be a more sustainable choice since it sits on top of your current desk. A full desk gives you more surface area while standing but is often more expensive and takes up more space.
  • Look for quality: A sturdy desk is the foundation of your workspace. It’s an important and often overlooked quality when customizing a working environment. You don’t want to watch your screen bounce every time you type. A stable sit-stand desk uses professional-grade materials and undergoes quality testing to ensure it’s stable after being adjusted throughout the day.

If there’s one thing to take away, make sure the desk you choose fits you and helps you work more comfortably.

Interested in learning more about sit-stand workstations? Here are two of our favorites:

Custom LearnFit

  • Wider worksurface than the standard LearnFit
  • Favorite for administration
  • Sit-stand, mobile desk
  • Available accessories: backpack hook, cupholder, storage bin
  • REMC item # 212515

LearnFit Mobile Desk

  • Maple worksurface
  • Favorite for administration
  • Sit-stand, mobile desk
  • Available accessories: backpack hook, cupholder, storage bin
  • REMC item # 212515

 

Information in this article was provided by our partners at Ergotron.

This year’s Michigan Association for Computer Users in Learning (MACUL) conference will be held at DeVos Place in Grand Rapids, March 16-18.

Attending the MACUL conference is an excellent opportunity for educators to learn more about technology and its application in the classroom. The conference includes hands-on workshops and presentations conducted by industry leaders.

Yeo & Yeo Technology is a REMC SAVE Awarded Vendor and will be an exhibitor featuring Ergotron’s height-adjustable desks and Kore stools. We invite you to visit us at booth #228 to test the innovative desks and stools. Ergotron’s unique standing desks and Kore stools are designed to turn classrooms into active learning environments while promoting better physical health.

March 16-18

DeVos Place, Grand Rapids, Booth #228

Learn more about YYTECH’s Ergonomic Solutions for home, school, and the workplace.

Spring cleaning in your home may be an annual ritual, but consider spring cleaning for your company’s systems and computers too. Read these tips — the security of your data is at stake.

Best practices for strong passwords

Now is a good time to revisit your security procedures and review your password policies. It is recommended that users choose secure passwords which are at least eight characters. Passwords should be easy to remember, but hard for others to guess. Refrain from using common phrases, personal information which is public, and repetitive passwords. Do not share passwords or give your password to anyone, even if you trust them. Below are some recommendations for acceptable-use policies for passwords in your company.

  • Remove the option of using commonly used passwords.
    • You can limit the type of passwords users can have by “blacklisting” the following:
      • Passwords that appear on frequently used lists, including breach lists.
      • Repetitive and sequential characters, such as “1234” or “1111.”
      • Context-based words, such as characters in their username or in the name of the service being logged into.
  • Use Multi-Factor Authentication (MFA)
    • MFA requires the user to know their password, as well as approve that they are attempting to login. Some forms of MFA include things you “know,” “have,” and “are.”
      • Know – You must know your password
      • Have – You must have access to your phone, or token, to approve a login.
      • Are – You must have your fingerprint (or other biometric) to approve the login.

Patches and updates are critical

When your system does not have the most current patches and updates installed, it is more vulnerable to cyberattacks. Now is as good a time as any to ensure all your systems and software are up to date.

  • Check for Windows Updates on your workstations and servers.
    • Windows does not always automatically clean up old update files. Run Disk Cleanup to remove old system files to help regain extra disk space.
  • Ensure Adobe Acrobat Reader license is up to date.
  • Check all software applications you run on your system for updates.
  • Update drivers on your system.
    • You can do this by opening Device Manager and right clicking each device and checking for updates, or you can check with your manufacturer for a solution provided by them.

Backups, backups, backups!

Make sure you are backing up all important data. Many backup applications will back up only default locations unless otherwise specified. Also make sure you are not backing up files you don’t need.

Backups are a great, simple way to recover from a disaster, be it a natural disaster or a nasty bit of ransomware. If you get hit by ransomware and you have a good backup of all your data, you don’t need to pay the ransom; you can simply restore from a backup taken before you were infected. Having this option will save time and money.

The best backup solutions use a 3-2-1 rule.

  • You should have at least three copies of your data. One live copy and two backup copies.
    • If something happens to your live data, you want to be able to access your backups quickly. That is why it is important to have current and complete backups.
  • Your data should be stored in two different mediums.
    • If both copies are stored on the same system and that system has a critical failure, you no longer have access to a copy of your data. You can use a cloud-based storage solution in addition to USB-connected external hard drives.
  • At least one copy of your data should be kept offsite.
    • What would happen if your building and all of its contents were destroyed? Could you get another server and get back to business if your only backup is in a pile of rubble? That is why it is important to have access to your data from the off-site location, be it cloud-based or a remote location set up to receive the backups from your primary location. 

Implementing these “spring cleaning” practices for your systems and computers will help you to be more confident about the security of your company’s data, and keep systems running efficiently.

 

The great resignation is the name economists and analysts have given to a post-pandemic surge of people leaving their jobs.

According to Microsoft, 41% of the global workforce were thinking of quitting their jobs. In reality, it means that over one-in-three of your colleagues are considering a move. That’s huge.

It suggests we’re not out of the woods yet, and people will likely continue to hand in their notices, so HR teams need to look at how they can retain their top talent and introduce initiatives that will make them want to stay now. Here are our top six ways HR and People teams can stem the exodus.

1. Keep an eye on your People data and analytics for signs of churn

First, keep your eye on the numbers. Forward-looking metrics can predict who is a flight risk and what effect it could have if they leave. Your HR and People team can then understand where the problems could arise and make contingency plans to ensure minimal impact on the business.

Look at creating interactive dashboards with your HR and People system to closely monitor the trends that matter to your organization.

2. Find out what your employees want from their workplace

Don’t guess what your employees want from their employer in this new world of work. Ask them with surveys. By asking the questions you need answers to, you’ll have the data to support your decision-making. Using data, you should find it much easier to make decisions that benefit your workforce and allow them to feel that they’re shaping the organization as it changes.

3. Encourage a healthy work-life balance

If burnout is the main reason employees are looking for greener pastures, don’t ignore it – you have the power to do something about it.

Some of the most popular ways to improve work-life balance and wellbeing during this new era of work include implementing meeting-free hours during the working day, mandating all employees take their designated holiday time, encouraging staff to take lunch breaks and start and finish on time – and, of course, looking at remote and flexible working.

At the heart of preventing burnout is also ensuring teams are well resourced, objectives are realistic and managers supportive. A lot of this comes from the tone and culture set by senior leaders in the business, so this is one thing to be very aware of.

You may also want to consider giving employees extra holiday days or an early finish on a Friday, with the implication that they use this time to maintain a healthy work-life balance.

4. Provide plenty of development opportunities

One of the many business areas that the pandemic has disrupted is career progression. A big part of the reason we see a career-switching bubble is because people are looking to make up for lost time.

Talk to your employees about their progression. How can the company support them to be even better? What do they want from their career in one-, three-, and five-years’-time? Are there any internal positions they can take to move into a job they want?

If you can offer employees the career progression and opportunities they seek, it may stop them from walking out the door.

5. Benchmark your benefits against other organizations

Ultimately, employees want to be happy in their job, but it’s important to recognize their rewards package in that, too. In a competitive job market, pay and benefits could prove the deciding factor for employee retention. Now is the time to take stock of what your company offers and compare it to your competitors.

Try scouring your competitors’ job postings to learn more about the kinds of perks and benefits they have on offer. Remember: With many employees now working remotely, you will probably need to think ‘outside the office’ when choosing new employee benefits.

6. Carefully consider your policies around ways of working

The rules around your office will have changed over the last few years. If you’re encouraging your employees to start making a move back into the office, monitor how comfortable they feel with this decision and make sure your policies reflect your stance so everyone is clear on where they stand.

For example, if your policy mandates employees to maintain social distancing and wear masks in and around the office, will your employees feel comfortable returning? Will they still think it’s too early?  You’ll also want to consider if they’ll find a move back to the office useful. It might be less helpful to return to the office if, for example, your meeting rooms then aren’t big enough to use due to social distancing. These are all factors you need to consider.

Employees come and go, but make sure they’re leaving for the right reasons

People leaving jobs is a fact of life. Whether for better pay, employee benefits, a new role or progression in their current career, or simply the opportunity to try something new, sometimes the lure of a new position is simply too strong.

If they do leave, be safe in the knowledge you’ve done the best you can to retain them, and for those who decide to go, don’t lose contact with them. With so much movement in the job market, you never know – employees who leave today may find themselves ready to come back to your organization in the future.

Understanding your people through data is key to a great workplace. Need an HR system that provides workforce analytics and employee-related insights? Check out Sage HRMS.

Information used in this article was provided by our partners at Sage.

It may seem hard to remember, but video meetings were the exception, not the rule, not long ago. Since the normalization of remote work, video conferencing has become a way of life in the business world, and that trend is not expected to change.

The problem with this is, too many video meetings cause their own set of challenges. Without video conferencing time limits and restrictions on the number of meetings, employees may start experiencing some of the adverse effects of virtual overload. Let’s look at ways to avoid overdoing it and how your organization can decide how many video meetings are too many.

How long should video meetings be?

First off, time limits. Video conferencing allows users to engage face-to-face. This is useful for reading the other person’s visual cues and gauging their emotional responses – two necessary things for good communication.

But, to get these benefits, you don’t need to have a long meeting.

Try to limit virtual meetings to 20 or 30 minutes. If you can’t fit everything into half an hour, consider breaking up the meeting topics into smaller chunks. That way, you can focus on one topic, converse, and get back to work without draining anyone.

To help you keep meetings short, create an agenda beforehand, email it to participants so they can be ready with questions or comments, and stick to the plan. Also, let everyone know how long the meeting will be so everyone is on the same page.

How many virtual meetings are okay per week?

This depends on the job role and the need to connect with co-workers or teams to keep projects and everyday operations moving smoothly. Someone in sales may need to meet with several clients each day, while your creative teams can collaborate on an as-needed basis.

The bottom line is, keep meetings to a minimum. There are a few ways you can do this:

  • Use other forms of communication. With a cloud-based unified communications solution, remote teams can just as easily jump on an audio call or chat to resolve an issue or go over a topic. This connection diversity puts the power in your employees’ hands – they can decide how to communicate and use the channel that’s most suitable for them.
  • Plan ahead. If your employees tend to launch impromptu video meetings whenever an issue arises, consider planning out communications at the beginning of the week. Decide what teams can cover and when, and then set time boundaries on each scheduled video conference.
  • Use tools to make meetings more concise. Let employees know that they should keep presentations short. They can use screen sharing and annotation tools to quickly cover a topic or idea and help everyone get on the same page.

Get the most out of your virtual meetings

Make it easy for your remote teams to stay engaged with the right communication tools. YeoVoice, powered by Elevate, enables users to be more mobile, more productive and share ideas and content through a single business communication system. Contact our team to learn more.

Information used in this article was provided by our partners at Intermedia.

Most already know that remote workers increase the risk of cyberattacks. New data spells out the impact of a remote workforce on data breaches and the cost to remediate.

The hybrid workforce is here to stay, so it’s important to understand the ramifications to cybersecurity to better assess the risk posed. We’ve written before about how remote workers adopt bad cybersecurity habits while working from home and the increase in security threats because of remote working. But now, there is data that shows when a remote workforce is involved in causing a data breach; the results are far worse.

According to the IBM Security’s 17th Annual Cost of a Data Breach Report, the average data breach now costs $4.24 Million – an increase of nearly 10% from last year’s average of $3.86 Million. This latest version of the report takes the time to carve out the impact of having a remote workforce. According to the report:

  • 5% of the data breaches involved remote workers
  • The average cost of a breach was $1.07 million higher in breaches where remote work was a factor in causing it
  • Organizations with more than 50% of their workforce working remotely took 58 days longer to identify and contain breaches (and it should be noted that the average number of days is 287, making this nearly a year’s time!)

Now, the answer here is not to eliminate the remote workforce. Instead, look at what’s causing the breaches and put controls and solutions in place to stop them.

According to IBM Security, the number one initial attack vector in successful data breaches is compromised credentials – something most phishing emails are after. Organizations must address these documented risks in a way that elevates the remote workforce’s security stance, regardless of the location or device they work on.

This should include Security Awareness Training to enhance the workforce’s sense of vigilance when interacting with email and the web, reducing the risk of attacks intent on compromising credentials and causing a data breach.

Learn more about Yeo & Yeo Technology’s Security Awareness Training services.

Information used in this article was provided by our partners at KnowBe4.

Phone systems are a vital piece of technology that every business needs. Communication is central to a company’s operations, customer service, and more. However, not every phone system has the same features and functionality. If you’re still using an on-premises phone system, you’re likely very aware of its limitations. As a result, you may be looking to modernize.

So, what’s the best path to do this?

In your pursuit to modernize, there are several things to consider. You want to ensure you put a new solution in place that serves you the best.

What Are Your Current Pain Points with On-Premises Phones?

Phone systems that live on-premises have many shortcomings. When thinking about the ideal platform to replace it with, document your current pain points. These could include:

  • Limitations on usability beyond the office
  • Challenges with adding new lines or upgrading, which may require provider intervention and high fees
  • Lack of features that make it easy for end-users (i.e., hard-to-access voicemails)
  • Restrictions on devices, as most on-premises solutions only work with physical phones

What Are Your Phone System Goals?

The next step is to document what a new phone system will offer you. It’s likely the answer to the pain points. These may include:

  • Flexibility of use for employees no matter where they are or what device they use
  • Feature upgrades that enhance usability
  • Administrator control to add lines as needed
  • Auto attendants to route callers based on needs
  • High-quality call clarity and reliability
  • Integration with other platforms
  • A phone system that’s part of a unified communications(UC) platform that includes an array of tools for employees

Charting the Transition

The logistics behind modernization involve several components. First, you’ll need to define the number of users, budget, functionality, and timeline. You don’t have to be an expert in phone systems. You just need to determine your requirements.

After doing this, it’s time to find the best cloud-based phone system provider. Look for one to support your transition and deliver all the features and must-haves that your business needs.

Some assessment areas are more technical. For example, you’ll want to determine if you have sufficient bandwidth, connections at workstations, and network capabilities. Your new provider can help you through this.

Finding Your New Provider

Your current phone system provider may have a cloud-based solution. Don’t feel obligated to stay with them. Shop around to understand the differences in systems and how providers handle support, security, and reliability.

Choosing Your New Provider and Planning the Transition

Once you complete your comparison and select your new provider, it’s time to execute the transition.

There are a few things necessary in the changeover. Number porting is essential, and your new provider can assist with this. Be sure to coordinate the handoff so there’s no downtime for your phone systems.

You’ll also want to prepare your employees for the change, providing them with helpful information on when it will happen, what to expect, and resources for using the new system. Having training sessions is helpful as well.

Modernize Your On-Premises Phone System and Cut the Cord

Your on-premises phones served their purpose. They made sense years ago, but that’s not how the world works or communicates now. It’s time to cut the cord on their limitations and high costs.

Our technology professionals can help you on your journey to finding the best phone system. Contact Yeo & Yeo Technology today.

Information used in this article was provided by our partners at Intermedia.

According to KnowBe4’s latest quarterly report on top clicked phishing email subjects, Business phishing emails remain the highest-clicked category around the world. This category contains regular communication that employees might receive.

The subjects of these emails include fake invoices, purchase orders, requests for information, shared files, and more. Online Services include messages that claim to be from well-known companies and often contain spoofed domains of popular websites within the email copy.

HR-related messages could potentially affect daily work and spoof the users’ own domain with an “HR” mailbox name. The common thread is that the emails convey a sense of urgency and entice users to take action.

In Q4 2021, KnowBe4 examined thousands of email subject lines and categories from simulated phishing tests. The results are below.

Top Phishing Email Subjects:

  1. Password Check Required Immediately
  2. Important: Dress Code Changes
  3. Vacation Policy Update
  4. Important Social Media Policy Change
  5. Employee Discounts on Amazon for your Holiday Shopping

Yeo & Yeo Technology can help train your employees to identify malicious emails with our security awareness training and testing.

Looking to educate your human firewall? Contact Yeo & Yeo Technology.

*Capitalization and spelling are as they were in the phishing test subject line.

**Email subject lines combine both simulated phishing templates created by KnowBe4 for clients and custom tests designed by KnowBe4 customers.

Information used in this article was provided by our partners at KnowBe4.

Cybercriminals often exploit leaked/stolen sensitive user information to perform various cyberattacks, including phishing and identity theft. The rising information leaks on dark web forums show that no one is immune to data breach incidents. According to Tenable’s 2021 Threat Landscape Report, over 40 billion records were exposed worldwide in 2021.

Tenable’s Security Response Team analyzed 1,825 data breach incidents disclosed between November 2020 and October 2021. Some 21,957 common vulnerabilities and exposures were reported in 2021, representing a 19.6% increase over the 18,358 reported in 2020.

Other key findings from the report:

  • Ransomware had a monumental impact on organizations in 2021, responsible for approximately 38% of all breaches.
  • 6% of data breaches were the result of unsecured cloud databases.
  • Unpatched SSL VPNs continue to provide an ideal entry point for attackers to perform cyberespionage, exfiltrate sensitive and proprietary information, and encrypt networks.
  • Threat groups, particularly ransomware, have increasingly exploited vulnerabilities and misconfigurations in Active Directory.
  • When security controls and code audits are not in place, software libraries and network stacks commonly used amongst OT devices often introduce additional risks.
  • Ransomware groups favored physical supply chain disruption as a tactic to extort payment, while cyberespionage campaigns exploited the software supply chain to access sensitive data.
  • Health care and education experienced the most significant disruption from data breaches.

“Migration to cloud platforms, reliance on managed service providers, software, and infrastructure as a service have all changed how organizations must think about and secure the perimeter. Modern security leaders and practitioners must think more holistically about the attack paths within their networks and how they can efficiently disrupt them. By examining threat actor behavior, we can understand which attack paths are the most fruitful and leverage these insights to define an effective security strategy,” said Claire Tills, Senior Research Engineer, Tenable.

Learn more about Yeo & Yeo Technology’s customized cybersecurity solutions.

Source: https://cisomag.eccouncil.org/40-billion-user-records-exposed-globally-in-2021/.

Despite a drop in cryptocurrency scams in 2020 due to the pandemic, a new report highlights the massive growth in crypto scams and the profitable results they’re yielding.

Some see investing in cryptocurrency as a legitimate means to make money. So, it makes sense that scammers are looking for ways to rob their victims of cryptocurrency rather than risk breaking into bank accounts, using stolen credit card details, etc.

One of the most prevalent scams are “rug pull” scams. The main motive is to gain interest in either a bogus token that doesn’t exist or build interest in new crypto and then ditch the project after victims invest.

According to cryptoanalysis firm Chainalysis’ 2022 Crypto Crime Report, it’s these rug pull scams that account for the massive uptick in crypto scams in 2021.

In addition to rug pulls, investment scams – in which victims are promised high investment returns in exchange for putting up crypto assets they will never see again – are also rising. According to the Chainalysis data, the number of investment scams rose in 2021 by over 60%.

Most investment scams last an average of just 70 days (that’s down from 192 in 2020). Even the U.S. Securities and Exchange Commission recently put out a notice about the danger of these investment scams.

Novice and professional investors should be wary of scams that claim to make much higher investment returns. An investor’s desire to make a quick buck because they’re “in early” on new crypto likely isn’t going to pan out the way they hoped.

Protect yourself and your employees from cryptocurrency impersonation and other social engineering scams with Security Awareness Training.

Information used in this article was provided by our partners at KnowBe4.

Customer Relationship Management (CRM) isn’t new to the world of business, and businesses that tout that CRM is the “lifeline” or “backbone” of their operations are seeing benefits such as:

  • Between $5.60 and $8.71 ROI for each $1 spent on CRM
  • Up to a 41% increase in revenue sales for each salesperson
  • Increased customer retention rates of up to 27%

How do they achieve these returns?

The answer is, businesses that place CRM at the heart of their operations use it as much more than just a tracking or data entry system.

1. Use CRM as an operations tool

Operations, or how a business engages its employees to follow business processes, is where CRM opens doors to endless value. Your CRM strategy should bring together multiple departments in an organized way.

Technically, sales, marketing, and customer service have their own processes; however, breaking apart the various processes within each functional department becomes paramount.

2. Process analysis and workflow

Bringing business processes into CRM leads to measurable improvements. Users can follow consistent processes, and operational bottlenecks are removed. More improvements – instead of allocating people to low-value tasks – can be built into the CRM’s scope when a business starts down this road.

3. Analyze how CRM can “do things better”

Break processes into granular steps, identifying clear “start” and “end” points. Where is data input or manual involvement occurring? What could be automated? Where should human input be retained for a personal touch?

From that exercise, you can see known steps that can be automated or streamlined to eliminate operational waste without risking the business’s brand, reputation, or culture.

4. Take specific action to achieve your goals

This granular thinking makes the task of selecting a CRM solution easier. You gain an understanding of features needed and – if you have captured the “business savings” data – a level of comfort on product pricing (or cost of ownership) for your business.

Delivering these new process flows – digitizing business, if you will, is only the beginning. Then, you have to measure the results of your new process flows. What KPIs will measure success, and how do you measure success? Is it an increase in customer satisfaction? Increasing revenue?

Make sure you establish these ‘win’ KPIs to paint a clear picture of your evolution to operational efficiency.

Your new CRM solution should evolve to achieve maximal results. Continue collecting feedback over time from users and implementing changes to the process to yield additional efficiency.

The journey to operational efficiency in CRM

Companies that embrace CRM and achieve measurable returns are the ones that exercise patience and consistency. Trial and error, testing, tweaking, etc., is the only surefire way to ensure a CRM unlocks the full potential of an organization.

Are you looking to implement a CRM solution? Yeo & Yeo Technology offers customizable CRM software options, including Microsoft Dynamics 365 Sales and Sage100 CRM.

Information used in this article was provided by our partners at Sage.

A report by Ermetic found that 98% of all businesses have experienced at least one breach of their data stored in the cloud over the past 18 months.

What? That’s almost all businesses.

Has yours been affected? A breach could be something as small as an employee losing a device that’s still logged into a cloud account, right up to a hacker getting full access to your data.

This is why every business should prepare an incident response checklist. It’s your way of thinking through in advance what you’ll do when a problem happens.

An incident response checklist will help you minimize damage. And recover from any breach quickly.

Here are several things that must go in your plan:

  • Key people: Who will be responsible for actioning the plan? Which people will play crucial roles once the plan has been triggered?
  • Internal communication: Keep a list of everyone who needs to be notified and details of how their job will be impacted.
  • Alternative communication methods: If your email or VoIP goes down, how will you let your clients know there may be a service impact?
  • Document: Record all the details of the issue and the actions your people have taken. This should include identifying the nature of the breach.

There’s a lot that goes into proactive business continuity and disaster planning. Yeo & Yeo Technology can help you think through all the implications and create a solid incident response plan.

Information used in this article was provided by our partners at MSP Marketing Edge.

75% of Internet Explorer and Edge browsers are out of date.

These browsers are typically updated when your operating system is updated. When you update Windows, Edge gets updated. When you update MacOS, Safari gets updated.

If you have an out-of-date browser, this either means that you’re not updating your operating system, or you’re using a browser that’s not native to your operating system (such as Chrome or Firefox).

Either way, please take a moment to check that you don’t have any updates waiting to be installed.

Running a browser that hasn’t been updated puts you at increased risk of security issues. Updates are there to keep you and your data safe. It also means your browser runs faster and gives you additional features that can help with productivity.

It’s simple to check for updates. Just go to www.whatismybrowser.com. It’ll instantly tell you at the top if you need to apply any updates.

It takes seconds to check if you’re running the latest version of your browser. Check it today and ask your team to do the same. Alternatively, contact Yeo & Yeo Technology to receive automatic updates through our managed IT service, YeoCare.

Recent events have massively shifted the HR landscape and agenda – and that’s probably an understatement.

According to Sage, 72% of HR leaders say the crisis has helped them demonstrate their value, and 57% of the c-suite now see HR as equal leadership partners.

However, HR’s newfound ownable space has come at the expense of a bigger workload, with 60% of HR leaders experiencing an increase in administrative and strategic tasks.

To meet the needs of tomorrow, HR leaders must look for newer, more agile ways of managing their people so that their workforce can flex and align to shifting priorities.

That’s where HR technology comes in. The right HR tech is vital in supporting HR’s new agenda, enabling HR leaders to deliver actionable insights, provide and utilize trusted up-to-the-minute data, reduce admin, and create great employee experiences that attract and retain the best talent.

If you’re also looking to invest more in HR tech and on the search for a new HR system, it’s important to find the right one that supports your HR team and employees, too.

There are 5 things HR leaders should look for in an HR system:

Focus on tech that supports great workforce experiences

Organizations thrive when employees are engaged.

To do this, you need to create the best possible experiences for them – keeping them connected, informed, and aligned. This is where tech can add real value.

Look for an HR system that puts your employees and their experiences first, so they can view and amend personal data, make requests for leave, and access company information through an employee self-service portal.

You’ll also want to find a system that supports your HR team with flexible pulse surveys and continuous conversation tools and provides you with data-driven insights to understand employee sentiments in real-time.

Consider how you can get the best workforce visibility

The days of spreadsheets and disparate systems should be far behind us, but unfortunately, many organizations still rely heavily on them to get glimpses into their workforces’ behavior.

It leaves HR leaders trying to pick numbers out of a sea of data making guesses about their workforce rather than making informed choices based on data.

The right HR tech means HR leaders can achieve a complete picture of their workforce through one system with up-to-the-minute, reliable data using built-in analytics.

It means HR leaders can understand what drives their workforce, who the top performers are, which teams struggle with productivity and how long it takes them to hire great talent. It means you can also take these insights straight to the c-suite, providing them with the top figures they want to see.

Find tech that benefits all

One of your measures of success from an HR system will be return on investment, which starts with user adoption.

In an ideal world, you’d want 100% of your workforce using your brand-new HR system so, to do that, you’ll need a user-friendly system that has a similar experience to apps they already use at home and outside of work.

Equally, for you as an HR leader, you don’t need a system that takes hours to figure out how to use and then more hours training everyone else, so finding tech that’s easy to use is key to success.

Boost business resilience with flexibility

Just 29% of HR leaders told Sage they were organized for speed, agility, and adaptability – and that was before the global pandemic. In reality, it means that just one in three HR leaders were well equipped to act when the pandemic hit.

Finding more agile ways of working is key in surviving and thriving in this new landscape of business. Look for a highly flexible system that will allow you to easily configure workflows, create custom fields, and tailor reports, communication, branding, and more, all managed by you through clicks, not code.

Create great experiences for all with HR tech

Ultimately, no matter what HR software you settle on, it should be there to support you as HR, but most importantly, your people. By recognizing what your people need from an HR system, it’ll help you choose the perfect solution for your organization, so you can deliver on all the points we’ve discussed and so much more.

Information used in this article was provided by our partners at Sage.

Oh no… I’ve sent an email to the wrong person. Can I get it back?

Yes, don’t panic! In Outlook, open the message in Sent Items, select Actions > Recall this message, then Delete unread copies of this message.

Is there an easier way to add appointments to my Outlook calendar?

If you’re scheduling a meeting or appointment via email, simply drag that email to your calendar, and it will create an appointment for you.

I’m trying to send a photo via email, but it’s telling me the file is too large

Select the photo file you’d like to send. Right-click it and select Send To > Mail Recipient. A pop-up window will open, which allows you to choose the picture size. Click Attach, and it will resize the image and attach it to your message.

Information used in this article was provided by our partners at MSP Marketing Edge.

A unified communications solution is often the first step for organizations looking for ways to increase flexibility and resilience with cloud technology. With UCaaS, teams can stay productive, engaged, and connected, whether they are working from home, in the office, or on the go. However, before adopting any new technology, it’s important to learn as much as you can about how it works, what it can and cannot do, and potential challenges. We’ve put together this list of UCaaS questions and answers to help you start the research process.

What Is UCaaS?

UCaaS, or unified communications as a service, is a cloud communications solution that offers all the main types of business communications from one platform.

What Features Are Included?

This can vary a lot between cloud providers, so be sure to do your homework and ensure the platform you use has everything you need. Often, UCaaS comes with video, voice, chat, and file sharing,

You’ll also want to look at the more granular details such as advanced voice features like voicemail, call waiting, and caller ID, as well as a contact center solution to power your customer success. Other details to look for include rich video conferencing features, including interactive presentation tools, screen sharing, and HD video, and a real-time backup and restore function for your file management.

What Do Users Need to Access the Technology?

As a cloud solution, users simply need to download the application to their device and log in to the platform to get started. Your employees can chat with co-workers, launch video meetings, share files, and more from any location as long as they have an internet connection.

The software is hosted on secure off-site servers, so there’s no need for on-site hardware or extra IT resources to manage and maintain the technology. You can, however, purchase specific hardware such as desk phones, headsets, and webcams to work with your technology.

Does My Company Need a New Phone System to Make UCaaS Work?

UCaaS relies on VoIP (voice over internet protocol) technology. This means voice data is transmitted over the internet, so there’s no need to have a traditional phone line to make and receive calls. In fact, this is one of the largest draws of cloud phone systems – your business can likely save on your phone bill by switching from a traditional phone system to VoIP technology.

Can Employees Use Desk Phones Through the UC Platform?

Yes, they can! You can use feature-rich desk VoIP phones to make and receive calls, send messages, and more, all through the same unified communications app you have on your computer, mobile phone, or other devices. These desk phones are plug-and-play so that you can set them up yourself right away.

Is Communicating Through a UC App Secure?

As with any cloud technology, security can be a big concern. To ensure your teams can use your UCaaS solution confidently, it is important to inquire about the security practices your cloud provider uses.

Your provider should be able to explain how they offer a worry-free experience. Here are some of the security best practices to expect from your cloud services provider:

  • Third-party audits to validate their security controls
  • Adherence to all applicable compliance standards such as HIPAA and PCI-DSS
  • Advanced encryption for email services
  • Ongoing network monitoring and detection
  • Highly secure data centers with security guards, controlled access, and 24/7 monitoring
  • Rigorous background checks for employees

How Reliable Is UCaaS?

Reliability is critical. If your software doesn’t work for your teams, you could have problems with productivity and employee frustration. To ensure the UCaaS solution you adopt will perform, look for at least 99.99% service reliability and accessible technical support.

How Much Does UCaaS Cost?

One of the huge benefits of UCaaS technology is its affordability. Because it uses a subscription-based payment model, there’s no need to make a large IT investment to get started. You pay for the number of users you need.

You can also scale up or down by adding or subtracting users. To enjoy the cost-efficiency benefits, look for a provider that offers transparent, flexible pricing and doesn’t require a contract.

Start Benefiting with a Leading UCaaS Solution

Whether you want to save money with cloud-based communications, unlock your teams’ potential, boost resilience, or all of the above, UCaaS can be game-changing for businesses. YeoVoice, powered by Elevate, is a comprehensive unified communications platform that comes with all the features your business needs to thrive. Reach out to our team today for a quote.

Information used in this article was provided by our partners at Intermedia.

It’s something many people admit to doing: They reuse the same password across a few different services.

We are not judging you if you’ve done it – it’s easy to see why thousands of people do this every day. It feels like an easy way to get signed up for something. If you reuse a password, you won’t have to go through the hassle of remembering it and needing to reset the password in the future.

However, you only have to do this once, and you’re at considerable risk of something called credential stuffing.

This is where hackers get hold of millions of usernames and passwords. These typically come from the big leaks we hear about in the news.

And then, they try all those details to see if they can log in to other digital services. They use bots to stuff the credentials into the login box, hence the name.

Because it’s automated, they can sit back until their software manages to log in to an account, and then they can do damage or steal money.

Stats suggest that 0.1% of breached credentials will result in a successful login to another service.

The best way to protect yourself against this kind of attack is to never, ever reuse passwords.

Use a password manager to generate long, random passwords, remember them for you, and auto-fill them. The less hassle for you, the less likely you are to reuse a password. Consider giving a password manager to each of your staff as well.

And if you know you have reused passwords in the past, you should change all your passwords on all active services just to be safe.

Running a business can be challenging. With numerous tasks to juggle, from communicating with marketing or finance teams to hiring staff, getting everything done can take a lot of time.

In recent research by Plum Consulting and Sage, businesses estimated they lost 71 days each year to admin. That’s 14 working weeks doing nothing but admin.

Your staff process paperwork for a variety of reasons. So, for your business, how do you go about cutting back on this workload?

8 tips to reduce time spent on processing paperwork

1. Look at software

Several software options are available to help you cut back on admin, but they need to work for you, and you need to use them. Try them and see what works and what does not. They are likely to include CRM and accounting systems, so take your time and work out which one will work best for your business.

2. Try outsourcing

You don’t have to be the expert on all things.

It is always more profitable to gain sales than focus on administrative tasks, so you could look at outsourcing some of your admin. Make sure you outsource to the right provider – a complete business support service might be just what you need.

A business such as this will offer a wide range of services that you can tap into as you need them or provide a full back office that effectively runs the admin for your company.

3. Prioritize your work

Make sure you prioritize your tasks each day so you do the most profitable or productive things first.

4. Be aware of the time taken on admin

Track the time it takes you to do your administrative tasks over a month or so. It will probably be more than you think.

5. Spend some time on templates

Spend a little time building a bank of templates that you can tap into each time you need to contact a customer. These could include your letterheads, your quotes, invoices, and receipts.

6. Make sure your processes are in place

Decide how you will manage your late payers and invest in credit control activities.

7. Make sure you are contactable

Nothing puts a potential customer off faster than not being able to get hold of you. Think about investing in a telephone answering service, so not only do your customers get a personal service, you’re aware of who you need to contact and why.

8. Keep on top of your accounts

Regular time spent on keeping your accounts up to date pays off hugely in the long run. Get into a habit of putting receipts into one place to find them when you need them. Even better, with the right accounting solution, you can scan them with your mobile phone, and the info will appear in your software.

Getting started with reducing paperwork

Processing paperwork can be time-consuming and slow down the day-to-day running of your business. Although some paperwork is necessary, it’s essential to embrace the digital age and use AI or OCR to help with invoicing, receipts, or file storage.

Looking to invest in software that can cut down your admin time? Contact Yeo & Yeo Technology.

Information used in this article was provided by our partners at Sage.