The Number 1 Customer-Requested Add-on For Sage 100cloud

According to a 2017 survey that Sage conducted of customers, accounts payable automation was the most requested new functionality. So it should come as no surprise that Sage recently introduced Sage AP Automation powered by Beanworks. Let’s take a look at this new suite of AP automation features now available for Sage 100cloud.

What is Sage AP Automation?

Sage AP Automation is designed to simplify and remove manual tasks from your entire accounts payable process, from purchase to payment. Invoices enter your Sage 100cloud system with guaranteed accuracy and are stored securely in the cloud, saving time and removing the complexity from manual data entry. Other benefits include:

  • Improved visibility into invoices and AP documents
  • Better cash management
  • Higher levels of payment accuracy
  • Mitigation of payment related fraud

Why Sage AP Automation?

There are a variety of reasons that automating your accounts payable process could be highly beneficial to your business. Here are some common questions to ask yourself:

  • Does your current process require a lot of touch points, moving parts, and paper filing?
  • Is your invoice approval process manual and inefficient?
  • Do you spend a lot of time manually entering AP data?
  • Do you have remote employees and/or multiple locations that need access to AP invoices?

On average, a single invoice can cost businesses up to $15.96 to process manually when you consider the price of labor, materials, printing, and postage. But automating the accounts payable (AP) workflow can drastically reduce that cost to just $2.94 on average. With Sage AP Automation, the more invoices you process, the more your per-invoice (and overall) costs decrease.

What’s more, manual AP processes can take approximately 11.4 days to complete as you enter data, code invoices, chase down approvals through emails and phone calls, and cut printed checks. AP automation can reduce that processing time down to just 3.6 days.

Now Available for Sage 100cloud

Sage AP Automation is now available for customers on a Sage 100c subscription. Be sure to get in touch with your Sage Authorized Partner, such as Yeo & Yeo Technology, if you’d like to learn more about Sage AP Automation pricing, capabilities, or benefits.

*Blog post courtesy of www.top-sage-resellers.com.

Microsoft has announced a new licensing bundle for businesses called Microsoft 365. This new licensing option gives users access to Office 365, Enterprise Mobility + Security (EMS) and the Windows 10 operating system.

Microsoft 365 will debut this fall and will be offered in two bundles, Enterprise and Business. The Enterprise bundle is built for larger organizations while Business has been designed for small and medium-sized organizations (SMB).

Microsoft 365 Enterprise will be available in E3 and E5 plans and highlights a number of high security features, Office 365 applications and Power BI Pro analytics. For SMBs with up to 300 users, Microsoft 365 Business is a perfect fit and touts integrates Office 365 Business Premium with tailored security and management features from Windows 10 and EMS.

Sales of Microsoft 365 Enterprise and Business will begin on August 1 and 2 respectively.


Crystal Reports is a great tool for creating complex reports and creating a more professional report with your company logo is not challenging. YYTECH’s Cristopher O’Brien has created this short video to teach users how to locate and open a Crystal Report, add an image by choosing it from a file, placing it, and resizing it. There are many out of the box Macola forms and after learning this quick skill users can make their forms their own, while at the same time, making forms more meaningful to end users.

 

The time of the year to start your IT planning for 2018 is here. Much like 2016, in 2017, security was a major focus at Yeo & Yeo Technology and we believe that security is going to be a focus for years to come. 

This is a great time to review your needs. As many of us look at our budgets for 2018, we feel it’s important to consider the following:

Security Upgrades: Staying current is important and making room in your budget for security upgrades is vital. Many of the tools we use, like Microsoft Office, automatically receive upgrades and you need to be sure your computers are getting them. Some of you may have an IT staff in place while others may need managed services. Keeping up with all of the patches that are released can be daunting and many of you are going to need assistance.

Next-Generation Antivirus: While looking into your security infrastructure, it’s also good to look at new that’s making its way into the industry. One we have been keeping an eye on is Next-Generation Antivirus (NGAV). Hackers are constantly inventing and innovating ways to steal our vital information. This is where NGAV has entered the market.

There are countless ways NGAV benefits users. The biggest benefit being protection going beyond just malware attacks. For many years, traditional antivirus was enough. Not anymore. Many organizations, with good traditional antivirus, fall victim to ransomware-type attacks that go undetected by standard antivirus . NGAV incorporates the industry’s newest features that target the tools, techniques, tactics, and procedures used every day by both mass scale opportunistic attackers and targeted advanced threats.

Ransomware: We have hit on Ransomware a lot this year. However, there is a reason for that – it continues to grow. We have some tips on prevention and what to do if you believe your system is infected.

Preventative Measures

  • Do not follow unsolicited web links in email messages or submit any information to webpages in links.
  • Use caution when opening email attachments.
  • Keep operating systems and third-party software, including anti-virus, up-to-date with the latest patches.
  • Perform regular backups of all systems/data to avoid serious consequences should your system fall under attack. Testing of your backup should be done monthly.

If you believe your system may be infected with the CryptoLocker Malware, follow these steps

  • Immediately disconnect the infected system from the wireless or wired network. This may prevent the malware from further encrypting any more files on the network
  • Change your passwords AFTER removing the malware from your system
  • Users infected with the malware should consult with a reputable security expert to assist in removing the malware, or users can retrieve encrypted files by restoring from backup, restoring from a shadow copy or by performing a system restore

Updating Your PC: Every year it’s important to consider the state of your PC. Hardware and software are always getting better and both need to be considered when looking at your budget. Consider the following:

  • Does your PC still have enough storage?
  • How old is your PC?
  • Is it running slow?
  • Is your software up to date?

Most small and medium sized businesses don’t spend nearly as much on IT as they should. In a 2015 study by Alinean, Inc., the average small business spends 6.9 percent of revenue on IT while medium sized businesses spend just over 4 percent. Gartner said that IT spending decreased 0.5 percent in 2016. Everyone has a budget they need to stick to but there should always be room for keeping your IT current, updated and secure.

 

By now we all know that protecting ourselves against viruses and malware is vital, and having a secure antivirus solution in place is a great, proactive step.

First, let’s make sure we understand what antivirus (AV) is. AV, in simple terms, is a software program or designed to prevent, search for, detect, and remove software viruses. Next-Generation Antivirus (NGAV) is the evolution of traditional AV that protects computers from the full spectrum of modern cyberattacks, delivering the best endpoint protection with the least amount of work. NGAV speaks to a fundamentally different technical approach in the way malicious activity is detected and blocked.*

So how do we know when it’s time to make the transition from traditional AV to NGAV? Here are a few steps to help you decide.

Step 1: Understand your organization’s resources

Consider what your employees are using (desktops, laptops servers) and the types of software and information they need to do their job. If your employees work remotely, they may be even more susceptible to malicious attacks by simply connecting to an open network.

Step 2: Know your environment

Consider the information running through your organization. Records, billing information, all of your data (and your client’s data) can be hacked into. NGAV examines every process on every endpoint to detect and block malicious content hackers use to steal information.

Step 3: Choose a respected vendor

This is the bottom line when looking as solutions that can protect your data. Although the concept is still fairly new, there are a number of NGAV vendors available that can provide the right solution for you. Whether you’re an SMB or large-scale enterprise, leaders in the firewall space know the future, for all business types, is to inevitably switch from the traditional AV solutions to NGAV.

The threat landscape is becoming more and more treacherous. Whatever you choose, be sure to do your research before taking the leap into new . YYTECH’s professionals are always available to make sure you choose the right solution for your organization.

*Information courtesy of Carbon Black

A new reality in printing

HP has long been known for developing high quality printers for home and business use. Now HP has developed a new generation of printing solutions, HP PageWide with HP Thermal InkJet Printheads.

HP PageWide and HP Officejet Pro X Series desktop printers deliver up to twice the speed at up to half the printing cost compared with color laser printers. This new class of devices offer the best of both ink and toner technologies.

HP PageWide Offers

  • Fast printing speed, up to 70 pages per minute in General Office quality mode
  • Powerful savings—up to 50 percent lower cost per page than standard color laser printers
  • Compatibility with corporate enterprise networks for management and workflow solutions

See how HP Thermal InkJet Printheads power HP PageWide

 

 

A new ransomware attack known as “Petya” has begun to spread across the globe. This attack is similar to the WannaCry attack from last month and could be even more dangerous. 

How does Ransomware work?

Hackers use ransomware attacks to lock down computers and threaten to delete all data unless a ransom is paid.

What can you do to keep your data safe?

It’s simple. Patch your computers with the latest software updates. Proper patching lowers the risk of falling victim to attacks.

Ransomware is on track to be an $1 billion crime in 2017, according to FBI data. To keep your data as secure as possible be sure that you are doing the following:

  • Back up data regularly
  • Secure your offline backups
  • Configure firewalls
  • Logically separate networks
  • Patch operating systems, software, and firmware on devices
  • Implement an awareness and training program
  • Scan all incoming and outgoing emails
  • Enable strong spam filters to prevent phishing emails
  • Block ads
  • Use the principle of “least privilege” to manage accounts
  • Leverage next-generation antivirus (NGAV)
  • Use application whitelisting
  • Categorize data based on organizational value
  • Conduct an annual penetration test

What do I need to do?

If you are currently a YeoCare Client, all of your equipment is up-to-date on patches, as long as it has been consistently connected to the Internet.

If you are not a YeoCare Client, you will want to be certain that your equipment has the latest patches and security updates available. If you need assistance, please contact helpdesk to schedule technical assistance.

If you would like to know more about ransomware and how YYTECH keeps clients secure, with our YeoCare Managed Services, contact us today.

 

 

Are your staff saving important documents in several different locations (Desktop, Shared folders, flash drives)? Is your company using a third party product such as Drop-Box for sharing and collaborating on documents? Are you concerned that your data may not be secure, and could be vulnerable to hackers?
 
SharePoint may be the solution to these common business concerns. SharePoint increases company productivity and efficiency by reducing cost and risk, while allowing staff to more easily and safely access information and collaborate with one another.
 
If you are interested in learning more about SharePoint, and would like to see a demo, contact Yeo & Yeo Technology for more information.

 

Streamline your organization’s enrollment process by giving employees the ability to view their current benefits, participate in open enrollment and be proactive with life changing events as they occur. Learn more about how the open enrollment process through Sage HRMS by checking out this video.

 

A worldwide ransomware attack known as “WannaCry” has affected over 200,000 victims in 150 countries. WannaCry targeted a flaw in Microsoft’s Windows operating system. Back on March 14, Microsoft issued a patch for the vulnerability, but many computers hadn’t run the update. Many of the computers impacted run older Windows systems like XP. This caused Microsoft to issue a rare patch for XP, which is no longer supported.

How does Ransomware work?

Hackers use ransomware attacks to lock down computers and threaten to delete all data unless a ransom is paid.

What can you do to keep your data safe?

It’s simple. Patch your computers with the latest software updates. Proper patching lowers the risk of falling victim to attacks.

Ransomware is on track to be an $1 billion crime in 2017, according to FBI data. To keep your data as secure as possible be sure that you are doing the following:

  • Back up data regularly
  • Secure your offline backups
  • Configure firewalls
  • Logically separate networks
  • Patch operating systems, software, and firmware on devices
  • Implement an awareness and training program
  • Scan all incoming and outgoing emails
  • Enable strong spam filters to prevent phishing emails
  • Block ads
  • Use the principle of “least privilege” to manage accounts
  • Leverage next-generation antivirus (NGAV)
  • Use application whitelisting
  • Categorize data based on organizational value
  • Conduct an annual penetration test

What do I need to do?

If you are currently a YeoCare Client, all of your equipment is up-to-date on patches, as long as it has been consistently connected to the Internet.

If you are not a YeoCare Client, you will want to be certain that your equipment has the latest patches and security updates available. If you need assistance, please contact helpdesk to schedule technical assistance.

If you would like to know more about ransomware and how YYTECH keeps clients secure, with our YeoCare Managed Services, contact us today.   

The manufacturing industry has become the main target for cybercriminals over the years. The news, trade journals, and professional organizations such as the Michigan Manufacturing Center (MMTC) and the Michigan Manufacturers Association (MMA) all have stressed the importance of manufacturers becoming aware of this growing threat.

  • The most recent Carbon Black Threat Report places the manufacturing industry at the top of the target lists for ransomware and malware.
  • According to the Ponemom Institute, the average price for a small business to clean up after they have been hacked stands at $690,000; for mid-market companies, it is more than $1 million.

The Carbon Black Threat Report states that when considering the total amount of ransomware seen in 2016, manufacturing companies (16% of total ransomware instances), utility/energy companies (15.4% of all ransomware instances) and companies (12.6% of all ransomware instances) led the way.

The Carbon Black Threat Report also states that overall, malware continues to target every industry with manufacturing companies (21.8% of total malware), non-profit organizations (16.4% of total malware), and utility/energy companies (15.6% of total malware) leading the way in 2016.

DoD Guidelines

Manufacturers with government contracts, issued by the U.S. Department of Defense, have until December 31 to conform to new federal guidelines mandating suppliers adopt a variety of cybersecurity best practices, countermeasures, and reporting standards to continue to qualify for contracts. The new mandates, covered in the standards described in NIST Special Publication 800-171, apply to contractors for the Department of Defense, National Aeronautics and Space Administration (NASA) and the General Services Administration.

Thankfully you’re not alone. Click here to learn how YYTECH can help.

Learn more about the DoD’s Guidelines:

MMTC Datasheet

NIST Guidelines

Microsoft Office 2007, and its suite of applications, will no longer be supported by Microsoft as of October 10, 2017.

What does this mean for me?

Unsupported applications turn environments into security and compliance risks. If a security flaw is found after the end of support date, no patches for security updates will be released to systems using Office 2007. In other words, if you’re still using Office 2007 applications, such as Word 2007 and Excel 2007, beyond the support date your company will be at risk for network security vulnerabilities.

What should I do?

It’s important to assess your network to determine what machines that need to be upgraded. If you would like more information on how to upgrade Microsoft Office on you system, our dedicated sales and support teams are available for assistance. Yeo & Yeo Technology specializes in Microsoft Office 365 and Office 2016.

Contact YYTECH today if you would like to upgrade.

 

Ever wonder what Sage HRMS looks like or how it functions? Take a look at this quick overview video. If you would like to learn more about Sage HRMS, visit our webpage or contact us today!

Most accounting and ERP systems come with a variety of built in Financial and Business Reports. These reports are often very general, and non-specific, and can frequently leave you wanting more. Whether it is a pinpointed category of data you are looking for, or a seemingly simple mathematical calculation that you want to perform with the data, these “canned” reports are often not able give the desired output. This is where Crystal Reports comes into the picture.

Crystal Reports offers an easy solution to your report generation and customization needs. It allows you to connect to your accounting and ERP data, and “slice and dice” it until you have the information you need in the format you want.

Yeo & Yeo Technology offers training on how to use this powerful tool to access, view, and ultimately distribute your data in the easiest to understand, and most visually appealing ways. If you aren’t looking to learn a new piece of software, but would rather have someone else gather the data and create the reports for you, YYTECH has several software consultants and programmers on staff that are well versed in the use of Crystal, and can offer that service as well.

We are in a new era of cybersecurity. Hackers are constantly inventing and innovating ways to steal our vital information. This is where Next-Generation Antivirus (NGAV) has entered the market. YYTECH is proud to offer a new NGAV solution for clients.

There are countless ways NGAV benefits users. The biggest benefit being protection going beyond just malware attacks. For many years, traditional antivirus was enough. Not anymore. Many organizations, with good traditional antivirus, fall victim to ransomware-type attacks that go undetected by standard antivirus . NGAV incorporates the industry’s newest features that target the tools, techniques, tactics, and procedures used every day by both mass scale opportunistic attackers and targeted advanced threats.

NGAV is the natural evolution of traditional antivirus that protects computers from the full spectrum of modern cyberattacks, delivering the best endpoint protection with the least amount of work. NGAV speaks to a fundamentally different technical approach in the way malicious activity is detected and blocked.

NGAV takes a system-centric view of endpoint security, examining every process on every endpoint to algorithmically detect and block the malicious tools, tactics, techniques and procedures (TTPs) on which attackers rely.

 

Manufacturers with government contracts have until December 31 to conform to new federal guidelines, issued by the U.S. Department of Defense, mandating suppliers adopt a variety of cybersecurity best practices, countermeasures, and reporting standards to continue to qualify for contracts.

The new mandates, covered in the standards described in NIST Special Publication 800-171, apply to contractors for the Department of Defense, National Aeronautics and Space Administration (NASA) and the General Services Administration. Many Michigan manufacturers have worked with federal agencies on classified projects; these regulations are meant to safeguard sensitive information in unclassified material, particularly as the threat of cybersecurity breaches grows.

The manufacturing industry has become the main target for cybercriminals over the years. The news, trade journals, and professional organizations such as the Michigan Manufacturers Association all have stressed the importance of manufacturers becoming aware of this growing threat.

  • The most recent Carbon Black Threat Report places the manufacturing industry at the top of the target lists for ransomware and malware.
  • According to the Ponemom Institute, the average price for a small business to clean up after they have been hacked stands at $690,000; for mid-market companies, it is more than $1 million.

The Carbon Black Threat Report states that when considering the total amount of ransomware seen in 2016, manufacturing companies (16% of total ransomware instances), utility/energy companies (15.4% of all ransomware instances) and companies (12.6% of all ransomware instances) led the way.

The Carbon Black Threat Report also states that overall, malware continues to target every industry with manufacturing companies (21.8% of total malware), non-profit organizations (16.4% of total malware), and utility/energy companies (15.6% of total malware) leading the way in 2016.

YYTECH Can Help

Yeo & Yeo Technology, along with the Michigan Manufacturing Center (MMTC), has implemented a process to ensure manufacturers meet the necessary qualifications of NIST Special Publication 800-171.

We begin the process with an exploratory call between YYTECH, your team, and MMTC. This is done to acquire technical info on your network, firewall, etc. to assess your company’s practices related to the new standards.

Once this discovery call is complete, YYTECH and the MMTC will provide your company with a list of necessary fixes to assure compliance. This is where the work gets done. New standards may include updates to your network, policies, firewalls and employee training. Once we test and validate that all security aspects are up-to-date, we can establish ongoing support, motoring and reporting to ensure standards continue are met and your data is secure.

Contact your YYTECH Account Executive to learn more about this program and how YYTECH can get you on track before December 31!

If you work in an office, chances are you’re sitting at a desk most of the day. In fact, 86 percent of Americans sit all day at work. There are many health risks that come with sitting all day. According to Martha Grogan, Cardiologist at the Mayo Clinic, people who sit all day share the same heart attack risks as smokers.

Yeo & Yeo Technology is proud to announce a new partnership with Ergotron to help our clients change the way they work.

What is Ergotron?
Ergotron products are designed to help adapt to the physical needs of individuals. Ergotron’s WorkFit line of desktop workstations gives users the ability to stand and sit at their desk, giving them a healthier daily routine. Ergotron products bring ultimate adjustability and aid in overall health and wellness.

Where are Ergoton Products Used?
As standing and mobile workstations increase in popularity, you will typically find them being used in:

  • Schools
  • Health Care (Carts)
  • Offices
If you would like to learn more about Ergotron, contact YYTECH at info@yeoandyeo.com or your Account Executive.

 

Cloud has been a buzzword in IT for the last few years. In fact, there are aspects of cloud computing many people find confusing. We have come across a few myths we want to debunk for you today. Here are the top three cloud myths we have seen the most and the truth you should know.

Myth 1

Everyone can access your data

The Truth: When you partner with a reputable cloud storage provider, your data will stay secure. There are numerous ways data is protected including encryption, firewalls and data backup. Having proper data backup might be the most important step an organization can take in protecting its information. Hackers and cyber-criminals are getting smarter and stronger every day. By replicating and backing up data in the cloud, users are able to get back up and running quickly in the event a disaster strikes.
 

Myth 2

Data kept on site is safer than the cloud 

The Truth: Having all of your information on site, with your own server, might seem safe because it’s tangible. However, the requirements for maintaining network security, on site, is demanding and costly. It’s safer to keep data in the cloud. With cloud applications, security features are built in and are updated in real-time. This allows users to work with the latest updated applications with the most up-to-date security features.
 

Myth 3

Everything must move to the cloud

The Truth: When an organization takes its first steps into cloud computing, many start with a hybrid approach. For example, they move a single application, such as email, and grow from there. This is a great way for users to become more comfortable with the cloud and allows providers a great way to show the capabilities and scalability of cloud computing.
 
The cloud has long been a benefit for large organizations but now, small and medium size businesses have the same advantages at their fingertips! Reduced costs, improved security, scalability and access from anywhere are just a few examples. If you are interested in learning more about YYTECH’s Cloud offerings contact us today.

 

Design for Movement and Flexibility

allows us to be more mobile than ever before. So why do we keep sitting around? Ergotron is rethinking the way we design our environments, for more flexibility, greater collaboration and opportunities to move more. Workspace transformation is here! Learn about the science behind standing and get ideas for spaces where people can move more at JustStand.org.


*The content for this post is provided by Ergotron.

In the past, we have told you about Security Awareness Training and all of the benefits it provides. Having users who think before they click is one of the most valuable firewalls your organization can invest in. Now we are proud to announce a new level of training with over 300 new ways to keep users from clicking on malicious content.

The new Diamond level is now available to YYTECH clients. It gives you an all-you-can-eat buffet of more than 300 items like interactive learning modules, videos, animations, games, posters, tip sheets, and other downloadable items. It includes:
  • 20 e-learning modules
  • 8 interactive learning modules
  • 7 compliance modules
  • 100+ videos, bite-size 1-3 minute
  • 33 trivia games
  • 125+ pieces of artwork
YYTECH offers three additional plan options: Silver, Gold, and Platinum. No matter the size of your organization, there is an offering for you. To learn more about YYTECH’s Security Awareness Training plans, contact us today!