Yeo & Yeo Technology Achieves Ergotron Elite Circle Silver Partner Status

Yeo & Yeo Technology is proud to announce its achievement of Silver Partner status with Ergotron, a global company focused on improving how people work, learn, play and care for others.

Yeo & Yeo Technology Achieves Ergotron Elite Circle Silver Partner Status“Offering Ergotron’s professional-grade, ergonomic products is a great complement to the technology services YYTECH provides,” says Jeff McCulloch, President. “Achieving Silver Partner status allows us to continue to grow our partnership and offer a broad range of products and services that benefit our clients.”

YYTECH first partnered with Ergotron in 2016 to offer innovative products, such as standing desks, sit-stand desk converters, monitor arms and more. To become a Silver Partner in the Ergotron Elite Circle authorized reseller program, YYTECH technical and sales staff had to achieve proven success with ergonomic solutions and complete additional ergonomics training.

Ergotron Silver Partners deliver the full spectrum of ergonomic and wellness solutions. They are recognized for their superior sales and support capabilities.

“We have seen, internally and externally, how Ergotron products increase productivity and improve the lives of our employees and clients,” McCulloch said. “We are proud to have Ergotron as a strategic partner, offering some of the highest quality and best-performing ergonomic solutions on the market.”

 

In addition to staying ahead of your competitors, the cloud has profound benefits for your business. In these remote working days, the cloud offers enhanced security measures, collaboration and up-to-date information.

If you’re not already using the cloud, here are some ways it can save you time, money and effort:

Increased productivity

Cloud-based systems ensure your business data is available at any time, from anywhere. This means you and your employees become more productive and efficient because you’re not chasing a file that’s located on someone else’s computer.

Cost savings

On-site hardware and software required for physical data storage is costly to install and maintain. The cloud offers a budget-friendly solution for business owners. You’ll likely pay a small set monthly subscription for a cloud-based app with customized packages designed to fit your budget.

Better security

You don’t need to worry about your sensitive business data sitting on a server in an unlocked room, protected by an easy-to-crack password. Cloud-based providers take security to a much higher level with secured data centers, encryption, authentication and other security measures.

Remote collaboration

Sharing information online can improve productivity and efficiency for business owners- especially those now working with remote teams. There are cloud-based solutions for many business activities, from project management tools to customer relationship management (CRM) systems. Most solutions are designed to integrate seamlessly with other online services for improved collaboration and customer service.

Real-time updates

Wonder if you are using the most recent file? When you update your files, they’re synced across all devices that are using the cloud application. With cloud-based data, you always know you’re looking at the latest version of a document in real-time, helping to minimize errors when file sharing with a team.

Improved business continuity

Should a physical disaster strike, your data remains safe and sound, undeterred by natural disasters or accidents.

Room to grow

Cloud-based storage can scale up instantly, so you don’t need to worry about running out of space.

Are you looking to implement a cloud solution?

Yeo & Yeo Technology’s cloud solutions replace outdated and expensive hardware and software. Our cloud solutions include Microsoft 365, YeoCloud, YeoVoice and Sage 100cloud. Contact us to learn more.  

Information used in this article was provided by our partners at Sage.

When an end-of-life date is set for the HR software your business relies on, it’s never welcome news.

Put simply, software end-of-life is when the software vendor stops providing support services for the solution. This includes critical security and compliance updates, fixes for known defects and technical support for users.

And it’s not only critical support services that cease at end-of-life – it also means an end to any future enhancements to the software. Once your software’s end-of-life date is reached, the features and usability you have will remain frozen in time.

For business owners with HR software nearing end-of-life, it begs the question – if your software is working fine, why should you care that it is approaching end-of-life?

Here are four reasons why using software after its end-of-life date can expose your business to risks:

 1. Security vulnerabilities

Hackers and malware are increasingly evolving and probing for ways to breach software security. Without security updates from your vendor, vulnerabilities found by hackers can never be fixed, leaving your sensitive HR information open to data breaches that could potentially cripple your business.

 2. Compliance issues

Many businesses rely on the built-in compliance their HR software offers. When business and tax regulations change, end-of-life software is no longer updated to ensure compliance. Continuing to use the end-of-life software means you risk non-compliance, which could be disastrous.

 3. Problems with your software

As your vendor no longer provides software maintenance and bug fixes, you will likely encounter problems with key HR functionality your business relies on. This could result in delays and lost time attempting to fix problems. There will also be no technical support to rely on when issues arise.

 4. Higher operating costs

Without critical vendor updates, you will likely need to hire IT specialists with the expertise to resolve bugs and apply security fixes, which often comes at a high cost.

Conclusion 

End-of-life software can pose a considerable risk to your business.  If you receive an end-of-life date from your software vendor, it’s time to start exploring upgrade options.

Yeo & Yeo Technology’s Sage HRMS solution is a single source for flawless payroll processing, employee administration, registration, analysis, employee life-cycle management and all other crucial employee-related information. Contact us to learn more.

 Information used in this article was provided by our partners at Sage.

As the number of applications, devices, etc., increases, an organization becomes more vulnerable to attacks. Just like businesses insure against problems, natural disasters and physical risks, they should consider coverage for cyber threats as well.

What is Cybersecurity Insurance?

Cyber insurance plans can cover a broad range of cyber risk losses that may unexpectedly arise from cyberattacks, including:

  • Paying a ransom to retrieve stolen data
  • Replacing physically damaged hardware
  • Covering business losses due to downtime

Some cyber insurance solutions also cover crisis management costs such as hiring an attorney, performing forensic analyses, notifying clients of a breach and credit monitoring.

What are the Qualification Standards?

Insurance qualification standards vary depending on the industry and the size of the organization. Typically, providers will look at a company’s internal controls to determine whether they want to offer coverage. Like many other forms of insurance, the better controls your company has in place, the better rates you will receive. Examples of cybersecurity controls include:

  • Multifactor Authentication (MFA)
  • Data encryption and backup
  • Continuous vulnerability testing and remediation
  • Employee security awareness training
  • Patch management
  • Anti-malware defenses
  • Wireless device control

As technology and the threat landscape evolve, businesses must adapt their controls and processes to minimize liability and maintain insurance coverage.

Is Your Business Protected?

Although cybersecurity insurance is a nice safety net, most companies never want to use it. Studies show that many small and medium-size businesses won’t recover from a data breach, and those that do will have to overcome severe setbacks.

Organizations need to determine whether they have the breadth of knowledge necessary to implement their own controls or whether they can acquire the right internal expertise. If the answer to both is “no,” outsourcing to an MSP is the right move. Contact Yeo & Yeo Technology to learn about our managed services.

Information used in this article was provided by our partners at SentinelOne.

A Practical Approach to Cybersecurity for Colleges and Universities

Download our Free Whitepaper

Unprecedented, unpredictable, and transformational. Those are three words that can be used to describe 2020. We have seen the evolution of traditionally brick-and-mortar industries like education move to virtual environments. As schools and the education sector shifted to hybrid and digital classrooms, they also potentially became a prime target for cyberattacks.

Cybersecurity is far from easy, especially for higher education. Higher education involves so many connected devices with their own risks that it becomes nearly impossible to keep track of the threats they might pose to the institution.

So how can you protect your organization?

  1. Gain control across endpoints and the Cloud
  2. Mitigate threats with proactive, real-time detection and response
  3. Empower security teams with automated endpoint security

To learn more, read this informative whitepaper from our partner, SentinelOne.

Better protection, detection, response, and threat hunting for healthcare organizations

Download our Free Whitepaper

Chief Information Security Officers (CISOs) have a tough job, perhaps nowhere more so than in healthcare. Data security, regulatory compliance, legacy infrastructure, IoT, and the high value of protected health information place the CISO in the midst of a high-stakes game of capture the flag, where the consequences can, at the extreme, mean life or death.

Hospitals and health systems run on data and myriad applications of all types. They need a slew of in-house and third-party personnel, software platforms, security solutions, and more just to function correctly. Data moves from the point of care into numerous systems, some controlled by the organization and some by “business associates.”

So how can you protect your organization?

  1. Gain control across endpoints and the Cloud
  2. Mitigate threats with proactive, real-time detection and response
  3. Empower security teams with automated endpoint security

To learn more, read this informative whitepaper from our partner, SentinelOne.

We’ve seen massive increases in the number of cyberattacks in 2020 and 2021. Would you know if you had an intruder in your business?

It’s not as rare as you might hope because ransomware is the fastest-growing cybercrime in the world right now (it’s where all your data is encrypted, and you must pay a ransom to get it back).

And those delightful cybercriminals are using our new work-from-home culture to find their way into your network.

There are many ways for them to do this. Once they’re in, it can be very difficult to detect them until they launch an attack. And that can take up to 10 weeks.

That’s 10 weeks of them lurking in your network, seeing all your private data, installing dodgy programs on your device, and just waiting to make their move.

Scary. It’s not always easy to spot if you’ve been compromised. Yeo & Yeo Technology’s comprehensive cybersecurity monitoring and compliance solution, YeoSecure, provides continuous monitoring of your network.

Our team of cybersecurity professionals will detect and quickly respond to threats 24 hours a day, seven days a week, 365 days a year. Contact us to learn more.

According to data released by StockApps, the annual loss from cybercrime in the U.S. reached over $4.1 billion in 2020. This translates into a 55 percent increase over the last two years.

To give a further breakdown on the types of cybercrime and losses involved, $1.8 billion (42 percent) of the loss came from business email compromise, a common type of CEO fraud. Other popular methods included phishing attacks and extortion.

Last year’s SolarWinds hack breached thousands of organizations in industries ranging from hospitality to government agencies. This hack significantly contributed to the overall loss, along with other notable attacks on platforms such as Twitter and Zoom.

According to a recent poll by Gallup, 82 percent of Americans are viewing cyberterrorism as the top threat facing the country. While we continue to work in a remote environment during the COVID-19 pandemic, cybercriminals are becoming more aggressive in their social engineering tactics. 

You may be asking yourself – how do we stop cybercrime in our organization completely? With added layers of security, this will help alleviate most of the potentially malicious activity, but the only way to truly protect your organization is user education. Security Awareness Training can help your users identify and report any suspicious activity.

Information used in this article was provided by our partners at KnowBe4.

Ooof … you’d hope so, right?

Smishing is the text message version of phishing.

What’s phishing again? It’s where criminals send you an email, pretending to be someone else (like your bank), to try to get sensitive information from you.

Yes, these cybercriminals really are resourceful. And the more ways there are to try to infiltrate your data, the more they’ll use different platforms.

Just like with phishing, smishing attempts are not always as easy to spot as you might think.

Most of them pretend to be sent from a recognized business – like your network provider, for example – rather than just a random number. Some look like they’ve come from someone you know personally.

They’ll ask you to click a link to take an action like checking your monthly bill, updating your account information, or paying a bill. It’s usually the kind of message you would expect to see from that business.

But if you click the link, you’ve potentially given them access to your device. And that means they may have access to your data, passwords, and any other information stored on your phone.

Terrifying.

Protecting yourself is similar to the way you’d deal with a phishing attempt on your email:

  • Never click on any links unless you’re certain the sender is who they say they are.
  • If you’re unsure, contact the company (or person) on their usual number to check.
  • And if an offer seems too good to be true, it usually is (sorry, you didn’t really win that competition you never even entered).

Consider this our number one most important golden rule: Never click a link if you’re not expecting it. Wait to verify it with the sender first.

Stop cyberattacks in their tracks with YYTECH’s Security Awareness Training. Our training solution showcases best practices for a company’s first line of defense — its employees — and teaches them how to detect and prevent cyberattacks.

Learn more about how Security Awareness Training can help to protect your organization.

How can I make my Wi-Fi faster?

Try moving your device closer to the router. If that works, you may need to install some access points to extend your range. Connect directly to the router with a cable. If it’s still slow, call your provider to see if they can work their magic on their end.

Why can’t I print?

Is your printer connected to your Wi-Fi? Are all the cables plugged in firmly? Is there enough paper and ink? If you’ve checked these and it’s still not working, try restarting your router.

My computer keeps crashing. What do I do?

Annoying. There can be many reasons why your computer has crashed. First, give it a couple of minutes to see if it fixes itself. If not, open your task manager, see what program is not responding, and close it. If that doesn’t work, restart the device, and try again. If it happens repeatedly, call for help!

In 2020, while the American public was focused on protecting our families from a global pandemic and helping others in need, cybercriminals took advantage of an opportunity to profit from our dependence on technology. These criminals used phishing, spoofing, extortion and various types of Internet-enabled fraud to target individuals and businesses.

According to The Federal Bureau of Investigations’ Internet Crime Report, internet crime complaints reached 791,790, with reported losses exceeding $4.1 billion in 2020. Of those attacks, approximately 35,439 originated on social media, with adjusted losses of over $155 million.

Some of the most prevalent attacks included:

  • Phishing, vishing, smishing and pharming, with 241,342 complaints reported and adjusted losses of $54 million.
  • Business email and email account compromise with 19,369 complaints reported and adjusted losses of $1.8 billion.
  • Ransomware with 2,474 complaints reported and adjusted losses of $29.1 million.

“Unfortunately, cybercriminals are very opportunistic,” said FBI Section Chief Steven Merrill. “They see a vulnerable population out there that they can prey upon.”

To protect your businesses’ data, cybersecurity should always be top of mind. We encourage you to take extreme caution, especially when it comes to offers that are too good to be true. Always think before you click and, if you have doubts, verify the sender of an email.

Looking to boost your data protection? Contact Yeo & Yeo Technology to learn about our cybersecurity solutions.

Source: The Federal Bureau of Investigations’ 2020 Internet Crime Report

We’ve seen a shift in the industry from Endpoint Protection and Response (EDR) to Extended Detection and Response (XDR).

But does the naming really make a difference?

If you want to keep your data safe, the short answer is yes.

In general, EDR is different than XDR in that the “E” refers to endpoints specifically, whereas the “X” in XDR indicates it handles network and cloud data as well.

While the endpoint is a major target for cybercriminals and must be protected, each endpoint is only a component of an organization’s IT infrastructure. An enterprise network is composed of a large number of systems of varying types. Attempting to manage a diverse network infrastructure with point solutions can be complex and overwhelming to security teams.

Extended Detection and Response (XDR) is designed to simplify enterprise network security management. XDR solutions integrate security visibility across an organization’s entire infrastructure, including endpoints, cloud infrastructure, mobile devices and more. This single management platform simplifies security management and enforcement of consistent security policies across the enterprise.

EDR and XDR solutions are both designed to replace legacy, reactive approaches to cybersecurity. As a result, EDR and XDR solutions are similar in several ways, such as:

  • Preventative Approach: EDR and XDR attempt to prevent security incidents by collecting in-depth data and applying data analytics and threat intelligence to identify threats before they occur.
  • Rapid Threat Response: EDR and XDR both support automated threat detection and response. This enables an organization to minimize the cost, impact and damage caused by a cyberattack by preventing or rapidly remediating it.
  • Threat Hunting Support: Threat hunting enables proactive security by allowing analysts to identify and remediate potential security issues before an attacker exploits them. EDR and XDR provide deep visibility and easy access to data, which aids threat hunting efforts.

As the endpoint becomes an increasingly vulnerable and vital component of an organization’s cybersecurity strategy, strong endpoint protection is a priority. However, this focus on the endpoint should not come at the cost of greater security complexity and a lack of visibility and security integration for the enterprise network as a whole.

Looking to boost your data protection? Contact Yeo & Yeo Technology to learn about our cybersecurity solutions.

Source: Check Point Software Technologies, LTD

2020 was full of change for the IT industry. Increased emphasis on remote working has resulted in new cybersecurity risks and software and hardware demands.

With the drama that last year brought about, lots of businesses like yours are cutting back and stretching their IT budgets further this year. Getting value for money from everything you do is essential.

That goes for your IT budget too.

Hopefully, you already realize that cutting back on your IT support spend is a very bad idea. One that is almost certain to cost you more money in the long run.

But there’s another element of your IT budget you may not have considered before: your devices, more specifically, whether it makes better financial sense to repair or replace a device when things start to go awry.

Yes, the outlay for a new device can be high. The outlay for a whole fleet of devices can be scary. But if your PC or laptop is getting towards the end of its life span, you will probably save more if you replace it than if you opt for trying to squeeze another year out of it. 

Need Help With Strategic Technology Planning?

Yeo & Yeo Technology’s team of IT professionals is here to help you procure, implement, configure, and support technology products and services that maximize your total cost of ownership. We provide businesses throughout Michigan with fully managed computer hardware, software, and ergonomic procurement solutions. Contact us to learn more.

How should we dispose of old devices?

Never just throw your old devices away. First, ensure they are fully wiped of any data that may have once been stored on them. Then, if they are not fit for use, recycle them.

Can I retrieve a deleted email in Outlook?

If you’ve already checked your deleted folder and can’t find the email, click on ‘Recover deleted items.’ This will open a new window and display recently permanently deleted emails. Find the email in question and click ‘Recover.’

Why does my router keep prompting a reset?

With so many of us working from home, this has become more common. It’s usually because it’s overheating, or there are too many people using it. But it may also need replacing. Contact your internet provider if it’s happening regularly, and they may send you a new one.

As a result of the COVID-19 pandemic, your organization may have had to shift the way it does business, either by adopting mobile delivery models, accommodating staff with children at home, or embracing remote work as the new normal.

This may mean you have to transform the way you manage your customer relationships as well. As employees adapt to remote work, it becomes critical to have a central repository for files, a history of client interactions, and a means of communication internally across teams.

Putting Technology to Work

Technology-enabled remote work means that your customer won’t miss a beat just because your staff can’t make it to the office. With a good CRM system in place and appropriate processes, any colleague can easily pick up the relationship thread with the customer because you have their history logged into the system, with all details quickly accessible to anyone in your organization.

Creating a centralized, cloud-enabled location means that instant knowledge share is facilitated, with the added benefit of reducing customer wait times. All you need is an internet connection on a smart device or desktop to access notifications and pipelines.

Sage CRM offers more flexibility for your workforce and more benefits for your customers, it:

  1. Enables more informed communication between your staff and customers based upon a knowledge of their history with your organization
  2. Allows for the successful collection of information about customers, which streamlines a better understanding of their needs now and what they may ask for in the future
  3. Eases efficient handling of tasks in-line with overall company goals or objectives
  4. Provides seamless analytics and reporting on outputs or campaigns

As we head into the new working normal, strengthening and adding flexibility to your business operations will empower your organization and people to serve your customers better no matter what.

Want to learn more about our Sage CRM solution? Contact Yeo & Yeo Technology.

Information used in this article was provided by our partners at Sage.

“People are our most important asset.” You’ve heard that a million times. And, it’s true. How long can you survive if that vital resource is inadvertently allowed to become detached, devalued, and departed? Answer: Not very long. Preventing that outcome requires monitoring critical workforce trends and responding accordingly.

Here are five common workforce trends and their implications for your business.

Trend #1: Rise of remote working

COVID has put remote working and collaborative technology at the forefront of business processes and planning. Although the day will come when companies can once again welcome their full staff back into the office, many professionals expect remote working to remain more common than before.

Trend #2: Regulatory uncertainty

As the world deals with unprecedented changes brought on by COVID-19, regulatory uncertainty is at an all-time high. With the regulatory environment in a state of flux, employers have to take extra care to avoid running afoul of employment laws and incurring substantial penalties.

Trend #3: Multi-generation workforce

Members of each generation typically have different perspectives on work both because of their age and the formative experiences of their early adulthood. Distinct generational characteristics are often overstated but nevertheless result in age-based demographic diversity that must be considered to run a business optimally.

Trend #4: Reliance on contingent workers

The dynamic business climate has employers seeking greater workforce management flexibility, which is often achieved by hiring contingent or temporary workers. However, the practice is accompanied by different management, collaboration, and regulatory challenges compared to salaried workers.

Trend #5: Digital disruption in the workforce

As information technology grows ever more sophisticated, employees are forced to become computer technicians to hold down jobs that previously required a different set of skills. Such sweeping changes place new demands on workers and managers alike.

Responding to workforce trends

Consider the following HR functions: attendance and leave management, payroll, compensation, benefits, and talent acquisition. When the technology used to administer those HR functions is integrated, you’re better equipped to streamline workflows, make better decisions, improve compliance, and stay on top of workforce trends.

Looking to implement an integrated HR solution? Contact Yeo & Yeo Technology. Our Sage HRMS solution is a single source for flawless payroll processing, employee administration, registration, analysis, employee life-cycle management, and all other crucial employee-related information.

Information used in this article was provided by our partners at Sage.

Yeo & Yeo Technology would like to remind you about the importance of installing patches for known vulnerabilities on both network devices and servers. If YYTECH manages your network firewalls, no updates are necessary.
 
However, if your network firewalls are self-managed, you may need updates as cybercriminals are exploiting known firewall vulnerabilities.

For example, active exploits have recently been observed by the ConnectWise SOC on Fortigate firewalls vulnerable to CVE-2018-133. This CVE is nearly three years old but demonstrates the importance of patching. Attackers are leveraging this vulnerability to access the /dev/cmdb/sslvpn_websession file resulting in exposure of plaintext credentials for any logged-in SSL VPN users. Combining the common usage of ADsync and credential re-use, these firewall attacks present a serious risk of compromising emails and networks.

Available patches should be installed as soon as possible for those with self-managed networks to protect their data and credentials.

How do you welcome a new employee you’ve never met face to face? It’s a question that companies everywhere are grappling with as the COVID-19 crisis forces them to work remotely. Figuring out how to find and hire new recruits in this environment is tough enough. How do you tackle remote onboarding once they’re ready to join the team?

To avoid the common pitfalls of remote onboarding, consider incorporating these steps into your process.

Prepare, prepare, prepare

You don’t want your employee’s first day to be filled with confusion and chaos, so take the time to make sure everything is in place before they log on.

If your company provides employees with the tech they need to perform their job, make sure it’s in their hands before their start date. The same goes for any documents they may need to sign or review. Most forms can now be signed virtually, so choose a service and advise new hires to create an account ahead of time.

Set clear expectations

We all know the feeling: It’s the first day of a new job, and you’re sitting at your desk trying to figure out what you’re supposed to be doing. Now imagine that same scenario, except the desk is your kitchen table and your nearest coworker is 100 miles away.

When onboarding employees remotely, it’s essential to set clear goals and expectations for the short and long term. Provide the new employee with a task calendar containing the objectives, and schedule regular one-on-one follow-ups to discuss progress and adjust expectations.

Meet small, then meet big

Even at a small company, meeting all of your new coworkers at once can be intimidating. On your new employee’s first day, start them off with small virtual meetings or phone calls with their team, supervisors, and direct reports. Save the full-staff introduction for later in the day. This way, they will have familiar faces to refer to when scanning the crowd.

Share your culture

Your culture makes your company unique. But without an office, how will new hires get a sense of that culture? To truly integrate new employees, it’s important to include aspects of your corporate culture into the remote onboarding process. This can be accomplished in several ways:

  • Make a slideshow of pictures and videos showing your physical workspace and past social gatherings among coworkers.
  • Host a virtual happy hour to welcome your new employees. Include games or activities to foster useful interactions.
  • Create virtual versions of any office rituals, such as weekly group lunches or trivia nights.
  • Randomly team up new hires with one or two other staff members for semi-private “Get to Know You” video chats.

Sooner or later, the day will come when companies can once again welcome their full staff back into the office. But even then, professionals expect remote working to remain more common than before. With that in mind, approach your remote onboarding protocol not just as an emergency measure but as an investment in your company’s future.

Need help onboarding remote employees? Contact Yeo and Yeo Technology. Our Sage HRMS solution is a single source for flawless payroll processing, employee administration, registration, analysis, employee life-cycle management, and all other crucial employee-related information.

Information used in this article was provided by our partners at Sage