3 Questions You Should Consider When Implementing a BYOD Policy

BYOD (bring your own device) refers to the practice of employees using their personal devices—such as smartphones, laptops, PCs, tablets, and other gear—on the job for the sake of convenience and comfort.

But there are downsides. Whenever someone accesses business data on a device that you don’t control, it opens windows of opportunity for cybercriminals.

Here are three questions you should consider when implementing a BYOD policy.

1. What happens if someone’s phone is lost or stolen?

What’s a pain for them could be a nightmare for you. Would you be able to encrypt your business’s data or delete it remotely? Would it be easy for a stranger to unlock the device and access the apps installed?

2. What happens if someone taps a bad link?

Lots of people read emails on their phones. If they tap on a bad link in a phishing email (a fake email that looks like it’s from a real company), is your business’s data safe? Despite what many people think, cybercriminals can hack phones in a similar way to your computer.

3. What happens when someone leaves?

Do you have a plan to block their ongoing access to your business’s apps and data? It’s the thing many business owners and managers forget when staff change.

If you haven’t already, create a cell phone security plan to go with your general IT security plan. Ensure everyone in your business knows what it is and what to do if they suspect anything is wrong.

BYOD is an excellent, if not inevitable, way to increase worker satisfaction and productivity and cut down on costs for businesses. But without carefully considered policies and security precautions in place, BYOD could become more of a nightmare than a dream for both the company and the employees.

If you need a hand, don’t forget that a trusted IT security partner (like us) can give you the right guidance. Contact Yeo & Yeo Technology today.

Fall may be the beginning of the homey season, but before you settle in for the winter, it’s essential to take a look at your technology. Are your passwords strong enough? Have you optimized your systems to improve security? We’ve put together a checklist to help you navigate “cleaning” your company’s systems and computers.

1. Check your passwords

Now is a good time to revisit your security procedures and review your password policies. It is recommended that users choose secure passwords which are at least eight characters. Passwords should be easy to remember but hard for others to guess. Refrain from using common phrases, public personal information, and repetitive passwords. Do not share passwords or give your password to anyone, even if you trust them. Below are some recommendations for acceptable-use policies for passwords in your company.

  • Remove the option of using commonly used passwords.
    • You can limit the type of passwords users can have by “blacklisting” the following:
    • Passwords that appear on frequently used lists, including breach lists.
    • Repetitive and sequential characters, such as “1234” or “1111.”
    • Context-based words, such as characters in their username or the name of the service being logged into.
  • Use Multi-Factor Authentication (MFA)
    • MFA requires the user to know their password and approve that they are attempting to log in. Some forms of MFA include things you “know,” “have,” and “are.”
      • Know – You must know your password.
      • Have – You must have access to your phone, or token, to approve a login.
      • Are – You must have your fingerprint (or other biometric) to approve the login.

2. Ensure Your Systems are Up to Date

When your system does not have the most current patches and updates installed, it is more vulnerable to cyberattacks. Now is as good a time as any to ensure all your systems and software are up to date.

  • Check for Windows Updates on your workstations and servers: Windows does not always automatically clean up old update files. Run Disk Cleanup to remove old system files to help regain extra disk space.
  • Ensure Adobe Acrobat Reader and Java license are up-to-date: Java updates roughly once each quarter, sometimes more frequently. Old versions of Java can cause vulnerabilities. Make sure, once the newest version is installed, that the old versions are uninstalled. Adobe Acrobat Standard, Pro, and Reader can all be set to download and install updates through the settings automatically.
  • Check all software applications you run on your system for updates.
  • Update drivers on your system: You can do this by opening Device Manager and right-clicking each device and checking for updates, or you can check with your manufacturer for a solution provided by them.

3. Implement and Use Backups

Make sure you are backing up all critical data. Many backup applications will back up only default locations unless otherwise specified. Also, make sure you are not backing up files you don’t need.

Backups are a great, simple way to recover from a disaster, be it a natural disaster or a nasty bit of ransomware. If you get hit by ransomware and have a good backup of all your data, you don’t need to pay the ransom; you can restore from a backup taken before you were infected. Having this option will save time and money.

The best backup solutions use a 3-2-1 rule.

  • You should have at least three copies of your data. One live copy and two backup copies. If something happens to your live data, you want to be able to access your backups quickly. That is why it is important to have current and complete backups.
  • You should store data in two different mediums. If both copies are stored on the same system, and that system has a critical failure, you no longer have access to a copy of your data. You can use a cloud-based storage solution in addition to USB-connected external hard drives.
  • At least one copy of your data should be kept off-site. What would happen if your building and all of its contents were destroyed? Could you get another server and get back to business if your only backup is in a pile of rubble? That is why it is important to have access to your data from the off-site location, be it cloud-based or a remote location set up to receive the backups from your primary location.

Implementing these “fall cleaning” practices for your systems and computers will help you be more confident about your company’s data security.

In Q2, PhishLabs analyzed hundreds of thousands of phishing and social media attacks targeting enterprises, their employees, and their brands. According to PhishLabs Quarterly Threat Trends & Intelligence Report, Phishing volume in 2021 continues to outpace last year by 22 percent.

Key Findings of the Quarterly Threat Trends & Intelligence Report Include:

  • Cryptocurrency saw a 10x increase in phishing from Q1
  • Social media attacks were up almost 50% from January to June
  • 51% of credential theft phish targeted corporate Office 365 credentials

Phishing Attacks to Watch For

  • Abuse of Free Email Accounts: The use of free email accounts by threat actors has increased. Cybercriminals most commonly use Gmail, Hotmail, AOL, and Outlook accounts.
  • Social Media Fraud: Fraud-related attacks are the most common form of social-media cybercrime. These attacks include the unauthorized sale of account credentials, exposure of banking details, and other financial threats.
  • Cryptocurrency Impersonation: Cybercriminals exploit the cryptocurrency industry by

impersonating cryptocurrency businesses to confuse customers and cash in on the sector’s skyrocketing growth.

How to Protect Your Business from Phishing Attacks

No matter how much money is spent on firewalls and antivirus software, phishing attacks find their way into inboxes. When all else fails, your employees are the last line of defense for your business data. Make sure they can detect cyberattacks with security awareness training.

Source:

“New Quarterly Threat Trends & Intelligence Report Now Available.” PhishLabs, 17 Aug. 2021, https://www.phishlabs.com/blog/new-quarterly-threat-trends-intelligence-report-now-available/

In the past month, we have received several reports of businesses being compromised by malicious emails. It only takes one member of your staff to click a bad link for hackers to access your network and data.

We have created a one-page info sheet to help you recognize common email scams and hacks that could be entering your inbox. Read the info sheet here

We urge you and your staff to take precautions when opening emails and clicking links. The first line of defense against cyberattacks is you.

Here are 9 layers of email security that you can implement to protect your business. 

  1. Multi-factor authentication: The simplest and the most effective way to prevent unauthorized logins. Every time you log in to your email (or any other system), you have to confirm it’s you on a separate device. This is typically done with your mobile phone, either by receiving a code or using an app to generate a code.
  2. Monitoring for unauthorized email forwarders: Hackers can play a clever, long game just by accessing your email once. An unauthorized forwarder allows them to monitor communications. It doesn’t even need to be the email of a senior member of the team. It’s surprising (and terrifying) how much we give away, bit by bit, in our daily emails.
  3. Proper email backup: Unless you have bought a specific email backup, your emails are not being backed up and are not protected daily. Not many people realize this. Having a proper backup is critical, as it gives your IT support company many more options if you are attacked. They can completely reboot your email account, safe in the knowledge you won’t lose a single email.
  4. Artificial Intelligence (AI) screening of emails: So you have this contact called Jon. And then one day, he signs off an email with his full name, Jonathan. You might not think twice about it. But a good AI system would pick up on this sudden behavior change and investigate the email further. These systems can be very clever at spotting potentially dodgy emails from the tiniest symptoms.
  5. Improved security endpoints: Endpoint security means each computer you use to access email is locked down and protected. There are many different ways to do this. From enhanced security on each device to prevent it from being used for risky activities. To encryption of the data on the device, meaning it’s worthless to anyone that steals it. And even as far as banning USB devices (you can plug them in, but they won’t work… meaning they can’t do any damage).
  6. Office 365 advanced threat protection: Robust Microsoft protection working for you behind the scenes. Your IT support company should know the correct way to implement it for your specific setup.
  7. Awareness training: The weakest link in any email security setup is… the humans. Because emails can still get past all of the defenses already listed, the last line of defense (and frankly, the best) is the human looking at an email with suspicion. There are some amazing awareness training courses available. They’re delivered online, so your team doesn’t have to go anywhere. They’re not dull or techy. They’re designed to be fun, and above all, to make your staff pause when they’re sent that dodgy link to click. That pause can save you thousands of dollars and days of hassle.
  8. Cyber insurance: It could be worth taking out a cyber insurance policy if only to follow the basic standards laid out by the insurance companies. Their job is to reduce their chance of having to pay out, right? That means they’re highly likely to know what ‘best practice’ currently is. So follow their advice as part of your overall email security protection.
  9. Set up business processes and make them the culture: Don’t let the boss change the process on the fly! If you have an internal process for approving payments, it needs to be followed every time… ESPECIALLY by the boss. Because it’s when the boss cuts corners that the chance of fraud jumps up dramatically; the weakest link is humans, remember. When it’s the boss, and everyone wants to please them, it opens the window for fraud and encourages everyone to break the rules. Great leaders realize they need to act the way they want their staff to act… even if it’s an inconvenience.

For more information on preventing email attacks, read ­­­our Email Hijack eBook.

Spear-phishing attacks are defined by their targeted nature. Attackers will spend time researching their victims and organizations, designing attacks targeting specific individuals with a customized message.

According to security vendor Barracuda’s latest report, Spear Phishing: Top Threats and Trends, organizations are experiencing far more convincing campaigns, focusing on a broader range of roles in the organization than ever before:

  • 1 in 10 attacks are Business Email Compromise (BEC) attacks
  • The average CEO receives 57 targeted phishing attacks each year
  • IT staff receive an average of 40 targeted phishing attacks in a year 
  • Microsoft remains the top impersonated brand, with WeTransfer in at number two

Barracuda identified four distinct categories of phishing attacks that exploit social engineering:

  • Business email compromise (BEC): A hacker will impersonate an employee, usually an executive, and request wire transfers, gift cards, or money sent to bogus charities. 
  • Phishing impersonation: Cybercriminals will create emails posing as a well-known brand or service to trick victims into clicking on a phishing link.
  • Extortion: Hackers threaten to expose sensitive or embarrassing content to their victim’s contacts unless a ransom is paid out.
  • Scamming: Hackers create malicious links ranging from claims of lottery wins and unclaimed funds or packages to business proposals, fake hiring, donations, and more.

The roles cybercriminals target within an organization extend well beyond the CEO or IT, making every employee a potential target.

This is the very reason why it’s so important to ensure that every user – regardless of role – continually takes part in your Security Awareness Training program. By doing so, they will remain updated on the latest scams, campaigns, social engineering tactics, etc., and be able to quickly identify malicious email content and avoid being the person responsible for a successful cyberattack.

Information used in this article was provided by our partners at KnowBe4 and the report “Spear Phishing: Top Threats and Trends” from Barracuda.

View the Recording

In today’s hybrid work environment, it’s imperative to have a reliable, cost-effective, and secure communication platform that promotes collaboration and reduces unnecessary downtime.

But with issues like lag, poor scalability, and hidden fees, your existing, on-premise phone system could be holding your business back.

A sustained future starts with implementing a communication system that facilitates a modern work environment for your employees and strengthens connections between you and your customers.

In this webinar, we will discuss how cloud-based, unified communication (UC) systems, like Elevate, allow you to:

  • Increase workplace productivity by as much as 50% by boosting employee collaboration across multiple channels
  • Share information quickly and easily, how and when you want
  • Improve connections with customers in the “remote work” world
  • Secure business flexibility and continuity in times of disaster or difficulty

Join Yeo & Yeo Technology’s Matt Ruhlig and Elevate’s Amy Byrd on September 16 as they discuss how a UC platform can make your business better.

This webinar has concluded.

According to a report by Vade, phishing attacks increased in Q2 2021, including 4.2 billion phishing emails in June alone.

“Overall phishing increased dramatically in Q2 2021, with a significant spike (281 percent) in May and another 284 percent increase in June, for a total of 4.2 billion phishing emails detected by Vade for the month,” the researchers write. “The increase in May can be attributed to spambot activity, as well as an increase in Amazon and SMBC phishing.”

Vade adds that the sophistication and quality of attacks are also increasing.

“H1 saw a surge of advanced phishing attacks featuring sophisticated automation techniques and abuse of high-reputation domains,” the researchers write. “Due to the high level of targeting and automation we have seen in the first half of 2021, we should place less emphasis on the total number of unique URLs detected and more on the nature and quality of the threats received.”

Vade discovered a phishing campaign that used automation to create phishing pages that were tailored to their victims.

“In late June, Vade detected a sophisticated Microsoft phishing attack featuring an automated rendering of public logos and background images on Microsoft 365 login pages,” the researchers write. “When a victim clicks on an email phishing link, they are taken to a waiting page, the purpose of which is to determine if the user is the intended target. If the user is not the intended target, the phishing page is not shown. If the victim is the intended target, the hacker then makes an HTTP post request for the logo and background image of the victim’s corporate entity. The victim is then redirected to a custom Microsoft 365 login page with their company’s corporate logo and background image.”

Additionally, 2021 is already primed to go down as one of the worst years on record for ransomware attacks. According to a report by SonicWall,  attempted ransomware attacks skyrocketed in the first half of 2021, with 304.7 million attempted attacks seen by the company. SonicWall researchers saw a record number of attempted attacks in both April and May but both months were beaten by June, which had a record 78.4 million attempted ransomware attacks.

Ransomware attacks in 2021 have already surpassed the 304.6 million recorded in 2020. 

Yeo & Yeo Technology can help train your employees to identify social engineering and cyberattacks with our security awareness training and testing.

Looking to educate your human firewall? Contact Yeo & Yeo Technology.

Information used in this article was provided by our partners at KnowBe4 and the article “Ransomware attempt volume sets record, reaches more than 300 million for first half of 2021: SonicWall” from ZDNET.

Effective communication is a key driver for business productivity across all industries. Today’s business environment makes unified communications nearly an operational necessity.

What is Unified Communications as a Service (UCaaS)?

With the advent of cloud computing, many businesses have turned to hosted services for managing IT resources that include network topology, servers, data storage, and even complete data centers.

This evolution in technology now extends to communication infrastructure, allowing providers to offer sophisticated functionality without the acquisition, maintenance, and management expense that goes along with building such systems in-house.

Benefits of Unified Communications

Today’s mobile workforce presents many challenges for businesses, from remote training and onboarding to geographically dispersed teams. Technology is the enabler that meets each of these challenges head-on. It provides the capabilities needed to manage these business requirements with sophisticated tools, such as live chat, video conferencing, and remote access to critical business applications.

Why Should Your SMB Adopt UCAAS?

Integrated unified communications offer many advantages for both large enterprises and small business owners:

  • Reduce the demand on existing IT staff. UCaaS providers manage equipment configuration, installation, and upgrades.
  • Cloud-based architecture ensures access from any location, leveraging the power of the internet.
  • Scalability – pay only for what you need, with ease of expansion as your business grows or needs change.
  • Financial advantage – UCaaS can often be funded as an operating expense, without the up-front cost of purchasing equipment or periodic upgrade costs.
  • Security – cybersecurity is a critical concern for most businesses. UCaaS providers provide a secure environment with continuous updates for subscriber protection. Many are also compliant with regulations such as SOX, PCI, and HIPAA.
  • Reliability – redundancy is built into UCaaS offerings, providing consistent access to business systems, phone connectivity, video conferencing, and internet services.
  • Reduced time to implement – providers handle planning, installation, and support, accelerating deployment time.

Small businesses (SMBs) may feel such use of technology is limited only to larger enterprises with huge IT budgets. However, UCaaS is a technology that offers a strategic advantage to businesses of every size.

Yeo & Yeo Technology’s unified communication solution, YeoVoice powered by Elevate, is a cloud-based collaboration platform that enables users to be more mobile, more productive and share ideas and content through a single platform. Contact Yeo & Yeo Technology to learn more.

Information used in this article was provided by our partners at Intermedia.

I know I just saved a document, but I can’t find where it went

This is more common than you think. You click ‘save,’ and when you try and reopen your file, it’s not in the folder you thought you’d saved it to. Don’t worry, open up a folder, click on ‘recents,’ and your document should be there. Look at the file information, and it will show you where you’ve saved it.

I clicked a link in a phishing email. What do I do?

First, do not enter any data. Disconnect your device from the internet. If you’ve got malware, this will stop it from spreading. Run a full malware scan. And then consult an IT expert. They’ll advise how safe your backups are and whether you need to change any passwords.

My apps keep crashing. What’s wrong?

Have you tried turning your device off and on again? If it’s still happening, try deleting the app and reinstalling it. If it’s still happening, you may be low on storage space.

In Q2 2021, KnowBe4 examined thousands of email subject lines from simulated phishing tests and in-the-wild emails. See the full infographic with top messages in each category for the last quarter or read a summary of the results below.

The Top 10 Most Clicked Simulated Email Subject Lines Include:

  1. Password Check Required Immediately
  2. Vacation Policy Update
  3. Important: Dress Code Changes
  4. ACH Payment Receipt
  5. Test of the [[company_name]] Emergency Notification System
  6. Scheduled Server Maintenance — No Internet Access
  7. COVID-19 Remote Work Policy Update
  8. Scanned image from MX2310U@[[domain]]
  9. Security Alert
  10. Failed Delivery

The Top 10 Most Common In-The-Wild Email Subject Lines Include:

  1. Zoom: Important issue
  2. IT: Information Security Policy Review
  3. Mastercard: Confirmation: Your One-Time Password
  4. Facebook: Your account has been temporarily locked
  5. Google: Take action to secure your compromised passwords
  6. Microsoft: Help us protect you – Turn on 2-step verification to protect your account
  7. Docusign: Lucile Green requests you to sign Mandatory Security Training documents
  8. Internship Program
  9. IT: Remote working missing updates
  10. HR: Electric Implementation of new HRIS

Key Takeaways

HR Phishing Clicks are Spiking

There has been a significant rise in phishing email attacks related to HR topics, especially those regarding new policies that would affect all employees. Standard phishing emails include:

  • Reminders to update and check passwords.
  • COVID-19 policy and procedure updates.

LinkedIn Still Draws the Most Social Media Subject Clicks

LinkedIn phishing messages have dominated the social media category for the last three years. Users may perceive these emails as legitimate since LinkedIn is a professional network, which could pose significant problems because many LinkedIn users have their accounts tied to their corporate email addresses. Top-clicked subjects in this category also include Facebook and Twitter notifications, message alerts, and login alerts.

Think Before You Click

These days, it is essential for all end users to take a moment to double-check a link or attachment and to question whether the email is expected or unexpected. Employees are an organization’s last line of defense. They can be the difference between a successful attack and an unsuccessful one with proper security awareness training and testing.

Looking to educate your human firewall? Contact Yeo & Yeo Technology.

Information used in this article was provided by our partners at KnowBe4.

How to Choose an IT Partner

One thing that we’ve learned the hard way is the importance of good IT for a business. Because we’ve all seen or heard exactly how bad IT can disrupt – or even finish – a business.

Devices are getting smarter, and software is becoming more intelligent. Data is becoming more transient, and it’s easier to access it on any device, from wherever you are. While this has endless positives, it also means that data security is increasingly more important.

As technology evolves, our businesses and business functions become ever more reliant on good IT. And great IT support. This eBook explores how a trusted IT support partner behaves and what great IT support looks like.

We discuss:

  • Creating an IT strategy
  • Reasons to switch IT partners
  • The importance of data protection
  • Asking difficult questions
  • What every IT support company wishes you knew about IT
  • Tips to help your internal IT team

We hope you find this eBook useful and that it covers many of the questions you have about choosing an IT support partner. Our team of IT consultants is eager to answer your questions or discuss IT partnerships in more detail.

Last year you probably saw a rise in your IT costs. Many businesses had to scramble to get a work-from-home setup created when we were forced into lockdown.

Getting your business set up so your team could work anywhere, at any time, on any device wasn’t cheap. There was a lot to consider – from network access and additional security to data protection – and even the devices your people would work on.

This year, it’s tempting to try to save money and stretch budgets. Especially when it comes to your IT. However, sometimes, it just makes good business sense to invest in new PCs or laptops rather than trying to get another year out of them. Knowing when that time is can be the tricky part.

Older PCs and laptops cost more to maintain. The cost of ownership increases as they age – a little like cars. And, of course, performance decreases over time. The optimal refresh cycle for your devices is around three years.

Often, if a device is more than three years old, it is cheaper to buy a new one.

  • A 5-year-old PC could cost twice as much to run as a new one.
  • A 4-year-old PC suffers 55% more security incidents than in its first three years.

When you look at it like this, the short-term savings disappear. And it can be an expensive mistake to continue to run an older device. So how do you know when it’s time to bite the bullet and buy new devices?

Start-up and shut down are slow

When start-up and shutdown are slow, loading applications, browsing the internet, and simply saving documents are typically slow. It’s a terrible way to kill productivity. And a sign that your computer is on its last legs.

You’ve got multitasking issues

If your device can’t process several jobs at a time, or if you struggle to go back and forth between applications or tabs in a browser, it might be time for a new one. Insufficient RAM (computer memory) is usually the culprit.

You can’t update your operating software or security

Updates are vital. Especially when it comes to your operating software. Not only does running old software leave you without support if something goes awry, but it also leaves you more susceptible to a cyberattack and other security issues.

Your computer’s fans are noisy

This can be one of the first signs that your device is nearing its time in the computer graveyard. If you can hear the fans running and you’ve only just started working on the device, or if you’re not performing tasks that should be getting the device all hot and bothered, it’s not a great sign. It could be that your applications and operating software are all updated, but they’re maxing out the device’s hardware causing it to overheat.

Upgrading your hardware leads to compatibility issues

Upgrading some aspects of your hardware can be the first step in giving your device an increase in speed and power. However, upgrading some of the parts can lead to compatibility issues in an older device.

If the cost of upgrade or repair outweighs a replacement

Sometimes it’s not worth the price of a repair or replacement part. It may not fully rectify your issues or last as long as you’d like it to. As with anything regarding your business devices or infrastructure, always consult your IT support partner before making any big decisions. It can be costly to replace one device, let alone a fleet of them.

Our professionals at Yeo & Yeo Technology can discuss your technology requirements and make the best recommendations based on your budget and needs. Contact us today.

Thanks to the pandemic, many businesses have realized that their current IT service provider is not truly a partner but just another supplier. They’ll fix things when they break, but there’s no genuine care or concern in helping to avoid problems in the first place.

That’s not what you should want or need from an IT service provider. What you should be looking for is an IT partner. With this in mind, we wanted to share the top 5 questions business owners and managers are asking that we love to say ‘Yes’ to.

#1 – Can we work together in partnership, rather than just calling you when things go wrong?      

We want to work with business owners and managers who understand the power of a more permanent solution to their IT needs. Then, we can be the partner they rely on as well as being there for day-to-day issues. While we want to hear from you when things go wrong, the proactive work we do between those times will minimize the frequency and scale of emergencies.

#2 – Can your services help me grow my business?

It stands to reason that the more tailored your infrastructure is to you and your team, the more streamlined your business will be. And the better the product or service is that you deliver to your client. Our goal is to get to know your team and your business inside out. The better we know you, the easier it is for us to see how things can work smoothly and what needs to be improved.

#3 – Do you work proactively or just fix things when they break?

We work proactively because experience tells us that it’s the best way to keep your systems running at optimum levels and ensure that your data is safe and secure from a breach or loss.

#4 – Do you have a clear plan in place if our IT goes down?

While we’re getting to know you and your team, we learn about the systems that are vital to your business, and we can help you create a procedure for any potential problems or breaches to be reported. If a breach occurs, we react as if it were our own business with the issue, minimizing both data loss and downtime as far as possible.

#5 – Can you maintain and update our systems without disruption to the team?

Most of what we do has zero disruption to you and your team. In the background, we make necessary updates, check that data is being backed up as it should be, and ensure there are no potential security breaches.

Do you have a question we haven’t answered?

We’d love to discuss how we can help your business reach its goals this year. Contact Yeo & Yeo Technology today.

As the world changed in the last year, business management practices changed too. To respond to new business needs, Sage has released updates to the ERP solution, Sage 100.

So, what’s new? Here are the highlights.

1. Enhanced security features

Several pre-defined role templates were added to make it easier to create specific roles for your business. Role Maintenance now allows you to quickly assign and remove users from roles and apply changes to multiple roles. Enhanced search and filtering capabilities allow you to find tasks and security options more easily.

These enhancements are not only more convenient; they make it easier for Sage 100 users to prove SOC compliance because they can run a report to show exactly who has access to what part of Sage 100.

2. Improved record-keeping capabilities

More paperless features were added to help companies decrease their carbon footprint and enhance the speed and accuracy of communications.

If you send orders, invoices and other business documents through Sage 100, it now has a detailed log to help confirm these emails are sent without any issues. Sage 100 now supports PDFs, Microsoft Word docs, JPEGs, and other file types associated with journals and registers.

3. Expanded email options

Sage 100 now offers OAuth to authenticate SMTP email requests. Sage 100 customers who use email providers like Gmail or Outlook, which require two-step authentication, can now use those email providers directly in the system.

Additional enhancements

  • Print all sales order recap reports at once – now, accountants can run all sales recap reports with just one click.
  • A new Purchases Clearing from History Report allows you to reconcile the purchases clearing account at any time.
  • The Purchase Orders module now displays line detail for receipt invoices in history.
  • The NEC-1099 non-employee compensation form is now available in Purchase Orders.

Two exciting new offerings now available to Sage 100 customers

1. Host your Sage 100 data on Microsoft Azure with Sage Partner Cloud

Sage Partner Cloud allows you to keep the Sage 100 product you know and love while hosting data in the same reliable cloud provider 95% of Fortune 500 companies know and trust.

2. Launch of Sage Data and Analytics

Get actionable data faster, improve data confidence, and reduce IT costs with the powerful, easy-to-use business intelligence toolkit for Sage 100. Sage Data and Analytics gives Sage 100 users a powerful and easy-to-use business intelligence toolkit complete with live dashboards, graphical cashflow analysis and more—right out of the box.

Want to learn more? Contact Yeo & Yeo Technology.

Information used in this article was provided by our partners at Sage.

The COVID-19 pandemic has made it clear that manufacturers need a modern, flexible ERP system. ERP may even be the key to post-COVID business success, enabling the flexibility and resilience that give your manufacturing firm a competitive edge. So if you’ve experienced any or all of these common problems with your current ERP, it may be time to upgrade to a new solution.

1. Your ERP doesn’t enable timely decision-making

Outdated ERP systems often don’t provide the visibility you need to make mission-critical decisions in real time. As we saw during the pandemic, not having insight at your fingertips can make it much harder to adapt quickly when a sudden disruption hits the supply chain. If you’re constantly looking at older figures rather than real-time data, or it takes you too long to develop an accurate, up-to-date view of your supply chain’s status, it may be time to upgrade to a more modern ERP solution.

2. Your ERP doesn’t integrate well with other technology

If your ERP doesn’t easily integrate with other business applications or let you capitalize on the tremendous potential that the industrial internet of things (IIoT) offers your company, it may be holding you back. When your ERP doesn’t play well with other software or newer technologies, your employees may have to compensate with time-consuming manual workarounds for standard business processes. This inflexibility is a sign that it’s time to upgrade to a more innovative ERP option.

3. Your ERP is too unwieldy to maintain

If you’ve been making do with a legacy ERP for many years, you might remember a time when it wasn’t so expensive to maintain. Eventually, however, the IT costs associated with supporting a legacy ERP solution begin to creep up on even the most diligent company. IT teams are juggling more responsibilities than ever. The time and expertise needed to maintain outdated ERP systems not only lowers your ERP’s ROI but charges your organization an opportunity cost, as well.

Know when to upgrade your ERP system

If your current ERP isn’t cutting it anymore, you’ve likely already noticed that it slows down decision-making, doesn’t integrate well with other technology, and is burdensome to maintain. As a result, you may find it unnecessarily challenging to adapt to sudden changes in the market.

Sage 100cloud is a modernized Enterprise Resource Planning (ERP) solution designed to maximize business management. Sage 100cloud Manufacturing adds functionality to assist with estimating and quoting, job planning, scheduling, inventory optimization, and more for small and medium-sized manufacturers. With proper manufacturing software in place, organizations can cut costs while simultaneously streamlining operations. Want to learn more? Contact our professionals at Yeo & Yeo Technology.

Information used in this article was provided by our partners at Sage.

Schools face ransomware attacks, like the recent Kaseya attack, with poorer cyber defenses than many private companies and with more vulnerabilities that hackers could exploit. That’s especially true for schools that will still be operating at least partly remotely in the fall because every remote student’s laptop is an entry point for hackers to infect an entire school’s computer network.

According to the Center for Internet Security (CIS), there was a 19 percent increase in ransomware and other cyberattacks targeting K-12 schools between 2019 and 2020, and they’re projecting a 86 percent increase in 2021.

The cost of these attacks has already been severe.

A ransomware attack shut down Baltimore County schools for several days in November 2020, and other prominent attacks have hit schools in Miami, Toledo and Huntsville, Alabama.

There’s no reliable data for how often schools pay ransom demands, though there are some high-profile cases in which hackers punished schools for refusing to pay. For example, hackers posted 26,000 files from the Broward County, Florida, school district online after it refused to pay a ransom.

There’s also a bonus for hackers that target schools — stealing the personal information of students and teachers.

Student’s personal information is especially valuable for identity thieves and scammers because they’re less likely to notice that someone is using their identity to commit fraud if they don’t yet have bank accounts or credit cards that might be alerted.

Cybersecurity is far from easy, especially for school districts. Schools have so many connected devices with their own risks that it becomes nearly impossible to keep track of the threats they might pose.

Yeo & Yeo Technology is a leading managed security service provider in Michigan. Whether you have a one-person IT department or a security team, our experienced cybersecurity professionals can help you meet your IT security needs and budget. Contact us today.

Source: The Washington Post

The Emergency Connectivity Fund (ECF) is a $7.17 billion program funded by the American Rescue Plan Act of 2021 to help schools provide the tools and services their communities need for remote learning during the COVID-19 emergency period.

The Federal Communications Commission (FCC) adopted a Report and Order establishing the rules and procedures for the ECF program, which will be administered by the Universal Service Administrative Company (USAC).

The ECF program will cover items including, but not limited to:

  • Laptop and tablet computers
  • Wi-Fi hotspots
  • Modems (including air cards)
  • Routers
  • Devices that combine a modem and router

The program application closes on Friday, August 13. All schools eligible for support under the FCC’s E-Rate program are eligible to request and receive support through the ECF program.

Apply for funds and find more information at https://www.emergencyconnectivityfund.org/.

Contact your Yeo & Yeo professional if you have questions or need assistance.

With one billion pieces of malware out there, your business will likely be affected at some point.

It’s scary stuff.

Worse still, some kinds of malware are very difficult to recover from. It’s rarely as simple as deleting an infected file. The most destructive malware can be the hardest to tackle.

You need to protect your business with more than just antivirus software.

Keeping your data safe and secure requires a combination of:

  • Specialist software
  • Staff training
  • And other safety measures, which will differ from business to business, depending on many factors

While it’s not realistic to protect your business from 100 percent of malware attacks (without completely crippling your staff’s ability to do their work freely), you can take the proper measures to minimize the risks and be instantly aware when you are under attack.

Is your business prepared for this? Contact Yeo & Yeo Technology to learn about our cybersecurity solutions.

Host on-premise or on the cloud? This is a common consideration for many business owners and communication managers looking to upgrade their enterprise’s phone system in this digital era. 

This guide will explore the key differences between these two communication systems to help you decide which one is best for your operational model.

What makes cloud systems different from on-premise systems? 

Traditional systems involve the on-premise installation of linking all company phone extensions and subsequent connections onto public phone networks. Advanced on-premise phone systems also incorporate VoIP services. 

Cloud-based systems, on the other hand, facilitate the linkage of a brand’s network of phone extensions using the internet. Where on-premise systems use desk phones, cloud phone systems utilize softphones. 

Advantages of cloud phone systems vs. on-premise phone systems

Here are a few benefits you can expect when investing in a cloud phone system:

  1. Scalability: The most noticeable upside that cloud systems have over traditional systems is the degree of scalability they give businesses. It allows for service adjustments following seasonal and industry fluctuations.

    What’s more, cloud phone systems allow for automatic installation of updates, unlike traditional phone systems, which need manual upgrades that could be time-consuming and cause downtime.
  2. No Installation Costs: You don’t have to invest heavily in the initial installation or PBX maintenance — as is the case with on-premise systems. Cloud phone systems don’t require significant capital outlay, making them suitable for a wide range of businesses, especially start-ups and small businesses. 
  3. Flexibility: With cloud phone systems, your team doesn’t have to work from the office. They can perform anywhere with access to good internet. Remote working offers your team more flexibility to plan out their day, making them more productive. 
  4. Quick and Easy Call Management: Cloud phone systems come with extra features that allow your team to organize and manage business calls. Besides streamlining your processes, this enables you to easily collect data from your customer base.  

Advantages of On-Premise Phone Systems vs. Cloud Phone Systems

Some businesses still prefer on-premise solutions versus their cloud-based counterparts. Here are some of the advantages of on-premise phone systems:

  1. Control of Communication by Management: On-premise systems allow for on-site controllability by communication managers and business owners but will most likely require someone trained to do so. A cloud-based phone system can be easily configured and maintained by anyone, and changes can be made on the spot.
  2. Stable Voice Quality: While today’s cloud phone systems have top-notch voice quality, they can still be affected by a range of external factors that degrade communication quality. These factors include bandwidth, network configuration, and the type of devices used. Ensure you have the right network requirements before making the switch and look for vendors with financially-backed SLAs.
  3. Cheaper to Setup (but look for hidden costs): On-premise systems usually involve a one-time payment during installation but can cost you more in the long run with maintenance and downtime. Conversely, cloud systems typically require clients to pay a monthly hosting rate and upfront costs for the endpoints but can be cheaper overall.

Scale Up Your Business with Reliable Telephony Services

For reliable, unified telephone communication systems that’ll help drive collaborative partnerships for your small or medium-sized enterprise, reach out to us at Yeo & Yeo Technology. Whether you’re looking for seamless on-premise telephone system installation services or a fully integrated cloud-based phone system, we’re here for you. 

Information used in this article was provided by our partners at Intermedia.

Unsure how cloud communications differ from legacy on-premises phones and why you should move your business phones to a cloud-based unified communications system? We’ve assembled and answered some common questions that business owners ask.

1. How does a cloud-based service scale with my business vs. an on-premises phone?

On-premises phone system: Requires a server called a private branch exchange (or PBX). Some are scalable (you can add more capacity), and others will not scale beyond a certain number of users. You have to purchase phone lines in modules in some situations (e.g., you buy capacity for 12 users when you only need nine lines).

Cloud phone system: Scales with your business one user at a time, so you never pay for users you don’t need. You purchase service for the exact number of users you have. Adding a new employee is as simple as ordering service and plugging in another phone.

2. Can my business depend on the cloud? How reliable is it?

On-premises systems can be completely taken down if there is a power outage or natural disaster. Cloud-based phone systems run outside your physical office location with multi-region data centers and built-in redundancy, ensuring an outage in one server or datacenter doesn’t bring the whole system down. Electricity or internet outages may impact your office’s phones, but not the service itself. The included mobile app is always available to make and receive business calls, texts, and instant messaging with other users.

3. It sounds complex. How do I set it up, and what is involved in training?

Setup is all web-based, and we assist you every step of the way. New phones are generally provided, and they use the business’s existing internet wiring to each desk. User training websites, videos, and live webinars make it easy for new users to get started quickly.

4. How does pricing compare to my current system?

It’s priced on a flat monthly fee per user, with features like voicemail, call forwarding, conferencing, video conferencing, and team messaging all included in the cost. Typically, it ends up being less expensive than an on-premises system when you consider all of the additional, included features that you can pay for separately.

5. How much do I need to worry about call quality over the internet? Like static, echos, and choppy audio?

You shouldn’t have to worry about this at all—we will run a network test and pre-qualify your network before deployment to ensure call quality and clarity. Cloud phone system quality should be as good or better than landlines.

6. What is the biggest business benefit to cloud communications?

“Biggest” depends on what matters to you. But cloud communications, in general, are more affordable, more reliable, and easier to set up than on-premises phones. They also scale with your business more flexibly and deliver communication and collaboration features that your customers and employees are used to having on their mobile devices. The included mobile and desktop apps also allow your employees to make and receive business calls from wherever they are currently working.

7. What happens to my existing business phone numbers if I switch?

You keep your existing phone numbers when you switch to the cloud. Moving phone numbers is called “porting.” Porting local phone numbers typically takes about 2-4 weeks, and porting toll-free numbers typically takes about 1-2 weeks. Generally, your existing phone numbers are forwarded to your new system, so there is no downtime or change in how you do business.

Moving to the cloud is simple. In fact, it is crazy simple. YeoVoice is a reliable, full-featured cloud communications platform that includes integrated video conferencing, screen sharing, chat, file backup and sharing, and more. With the included desktop and mobile apps, your employees stay connected no matter where they are or what device they are using.

If you haven’t considered moving to the cloud before, now is a great time to start.

Information used in this article was provided by our partners at Intermedia.