According to a 2017 survey that Sage conducted of customers, accounts payable automation was the most requested new functionality. So it should come as no surprise that Sage recently introduced Sage AP Automation powered by Beanworks. Let’s take a look at this new suite of AP automation features now available for Sage 100cloud.
What is Sage AP Automation?
- Improved visibility into invoices and AP documents
- Better cash management
- Higher levels of payment accuracy
- Mitigation of payment related fraud
Why Sage AP Automation?
- Does your current process require a lot of touch points, moving parts, and paper filing?
- Is your invoice approval process manual and inefficient?
- Do you spend a lot of time manually entering AP data?
- Do you have remote employees and/or multiple locations that need access to AP invoices?
On average, a single invoice can cost businesses up to $15.96 to process manually when you consider the price of labor, materials, printing, and postage. But automating the accounts payable (AP) workflow can drastically reduce that cost to just $2.94 on average. With Sage AP Automation, the more invoices you process, the more your per-invoice (and overall) costs decrease.
What’s more, manual AP processes can take approximately 11.4 days to complete as you enter data, code invoices, chase down approvals through emails and phone calls, and cut printed checks. AP automation can reduce that processing time down to just 3.6 days.
Now Available for Sage 100cloud
*Blog post courtesy of www.top-sage-resellers.com.
Microsoft has announced a new licensing bundle for businesses called Microsoft 365. This new licensing option gives users access to Office 365, Enterprise Mobility + Security (EMS) and the Windows 10 operating system.
Microsoft 365 will debut this fall and will be offered in two bundles, Enterprise and Business. The Enterprise bundle is built for larger organizations while Business has been designed for small and medium-sized organizations (SMB).
Microsoft 365 Enterprise will be available in E3 and E5 plans and highlights a number of high security features, Office 365 applications and Power BI Pro analytics. For SMBs with up to 300 users, Microsoft 365 Business is a perfect fit and touts integrates Office 365 Business Premium with tailored security and management features from Windows 10 and EMS.
Sales of Microsoft 365 Enterprise and Business will begin on August 1 and 2 respectively.
Crystal Reports is a great tool for creating complex reports and creating a more professional report with your company logo is not challenging. YYTECH’s
Cristopher O’Brien has created this short video to teach users how to locate and open a Crystal Report, add an image by choosing it from a file, placing
it, and resizing it. There are many out of the box Macola forms and after learning this quick skill users can make their forms their own, while at
the same time, making forms more meaningful to end users.
The time of the year to start your IT planning for 2018 is here. Much like 2016, in 2017, security was a major focus at Yeo & Yeo Technology and we believe that security is going to be a focus for years to come.
This is a great time to review your needs. As many of us look at our budgets for 2018, we feel it’s important to consider the following:
Security Upgrades: Staying current is important and making room in your budget for security upgrades is vital. Many of the tools we use, like Microsoft Office, automatically receive upgrades and you need to be sure your computers are getting them. Some of you may have an IT staff in place while others may need managed services. Keeping up with all of the patches that are released can be daunting and many of you are going to need assistance.
Next-Generation Antivirus: While looking into your security infrastructure, it’s also good to look at new that’s making its way into the industry. One we have been keeping an eye on is Next-Generation Antivirus (NGAV). Hackers are constantly inventing and innovating ways to steal our vital information. This is where NGAV has entered the market.
There are countless ways NGAV benefits users. The biggest benefit being protection going beyond just malware attacks. For many years, traditional antivirus was enough. Not anymore. Many organizations, with good traditional antivirus, fall victim to ransomware-type attacks that go undetected by standard antivirus . NGAV incorporates the industry’s newest features that target the tools, techniques, tactics, and procedures used every day by both mass scale opportunistic attackers and targeted advanced threats.
Ransomware: We have hit on Ransomware a lot this year. However, there is a reason for that – it continues to grow. We have some tips on prevention and what to do if you believe your system is infected.
Preventative Measures
- Do not follow unsolicited web links in email messages or submit any information to webpages in links.
- Use caution when opening email attachments.
- Keep operating systems and third-party software, including anti-virus, up-to-date with the latest patches.
- Perform regular backups of all systems/data to avoid serious consequences should your system fall under attack. Testing of your backup should be done monthly.
If you believe your system may be infected with the CryptoLocker Malware, follow these steps
- Immediately disconnect the infected system from the wireless or wired network. This may prevent the malware from further encrypting any more files on the network
- Change your passwords AFTER removing the malware from your system
- Users infected with the malware should consult with a reputable security expert to assist in removing the malware, or users can retrieve encrypted files by restoring from backup, restoring from a shadow copy or by performing a system restore
Updating Your PC: Every year it’s important to consider the state of your PC. Hardware and software are always getting better and both need to be considered when looking at your budget. Consider the following:
- Does your PC still have enough storage?
- How old is your PC?
- Is it running slow?
- Is your software up to date?
Most small and medium sized businesses don’t spend nearly as much on IT as they should. In a 2015 study by Alinean, Inc., the average small business spends 6.9 percent of revenue on IT while medium sized businesses spend just over 4 percent. Gartner said that IT spending decreased 0.5 percent in 2016. Everyone has a budget they need to stick to but there should always be room for keeping your IT current, updated and secure.
By now we all know that protecting ourselves against viruses and malware is vital, and having a secure antivirus solution in place is a great, proactive step.
First, let’s make sure we understand what antivirus (AV) is. AV, in simple terms, is a software program or designed to prevent, search for, detect, and remove software viruses. Next-Generation Antivirus (NGAV) is the evolution of traditional AV that protects computers from the full spectrum of modern cyberattacks, delivering the best endpoint protection with the least amount of work. NGAV speaks to a fundamentally different technical approach in the way malicious activity is detected and blocked.*
So how do we know when it’s time to make the transition from traditional AV to NGAV? Here are a few steps to help you decide.
Step 1: Understand your organization’s resources
Consider what your employees are using (desktops, laptops servers) and the types of software and information they need to do their job. If your employees work remotely, they may be even more susceptible to malicious attacks by simply connecting to an open network.
Step 2: Know your environment
Consider the information running through your organization. Records, billing information, all of your data (and your client’s data) can be hacked into. NGAV examines every process on every endpoint to detect and block malicious content hackers use to steal information.
Step 3: Choose a respected vendor
This is the bottom line when looking as solutions that can protect your data. Although the concept is still fairly new, there are a number of NGAV vendors available that can provide the right solution for you. Whether you’re an SMB or large-scale enterprise, leaders in the firewall space know the future, for all business types, is to inevitably switch from the traditional AV solutions to NGAV.
The threat landscape is becoming more and more treacherous. Whatever you choose, be sure to do your research before taking the leap into new . YYTECH’s professionals are always available to make sure you choose the right solution for your organization.
*Information courtesy of Carbon Black
A new reality in printing
HP has long been known for developing high quality printers for home and business use. Now HP has developed a new generation of printing solutions, HP
PageWide with HP Thermal InkJet Printheads.
HP PageWide and HP Officejet Pro X Series desktop printers deliver up to twice the speed at up to half the printing cost compared with color laser printers. This new class of devices offer the best of both ink and toner technologies.
HP PageWide Offers
- Fast printing speed, up to 70 pages per minute in General Office quality mode
- Powerful savings—up to 50 percent lower cost per page than standard color laser printers
- Compatibility with corporate enterprise networks for management and workflow solutions
See how HP Thermal InkJet Printheads power HP PageWide
A new ransomware attack known as “Petya” has begun to spread across the globe. This attack is similar to the WannaCry attack from last month and could be even more dangerous.
How does Ransomware work?
Hackers use ransomware attacks to lock down computers and threaten to delete all data unless a ransom is paid.
What can you do to keep your data safe?
It’s simple. Patch your computers with the latest software updates. Proper patching lowers the risk of falling victim to attacks.
Ransomware is on track to be an $1 billion crime in 2017, according to FBI data. To keep your data as secure as possible be sure that you are doing the following:
- Back up data regularly
- Secure your offline backups
- Configure firewalls
- Logically separate networks
- Patch operating systems, software, and firmware on devices
- Implement an awareness and training program
- Scan all incoming and outgoing emails
- Enable strong spam filters to prevent phishing emails
- Block ads
- Use the principle of “least privilege” to manage accounts
- Leverage next-generation antivirus (NGAV)
- Use application whitelisting
- Categorize data based on organizational value
- Conduct an annual penetration test
What do I need to do?
If you are currently a YeoCare Client, all of your equipment is up-to-date on patches, as long as it has been consistently connected to the Internet.
If you are not a YeoCare Client, you will want to be certain that your equipment has the latest patches and security updates available. If you need assistance, please contact helpdesk to schedule technical assistance.
If you would like to know more about ransomware and how YYTECH keeps clients secure, with our YeoCare Managed Services, contact us today.
Streamline your organization’s enrollment process by giving employees the ability to view their current benefits, participate in open enrollment and be proactive with life changing events as they occur. Learn more about how the open enrollment process through Sage HRMS by checking out this video.
A worldwide ransomware attack known as “WannaCry” has affected over 200,000 victims in 150 countries. WannaCry targeted a flaw in Microsoft’s Windows operating system. Back on March 14, Microsoft issued a patch for the vulnerability, but many computers hadn’t run the update. Many of the computers impacted run older Windows systems like XP. This caused Microsoft to issue a rare patch for XP, which is no longer supported.
How does Ransomware work?
Hackers use ransomware attacks to lock down computers and threaten to delete all data unless a ransom is paid.
What can you do to keep your data safe?
It’s simple. Patch your computers with the latest software updates. Proper patching lowers the risk of falling victim to attacks.
Ransomware is on track to be an $1 billion crime in 2017, according to FBI data. To keep your data as secure as possible be sure that you are doing the
following:
- Back up data regularly
- Secure your offline backups
- Configure firewalls
- Logically separate networks
- Patch operating systems, software, and firmware on devices
- Implement an awareness and training program
- Scan all incoming and outgoing emails
- Enable strong spam filters to prevent phishing emails
- Block ads
- Use the principle of “least privilege” to manage accounts
- Leverage next-generation antivirus (NGAV)
- Use application whitelisting
- Categorize data based on organizational value
- Conduct an annual penetration test
What do I need to do?
If you are currently a YeoCare Client, all of your equipment is up-to-date on patches, as long as it has been consistently connected to the Internet.
If you are not a YeoCare Client, you will want to be certain that your equipment has the latest patches and security updates available. If you need assistance,
please contact helpdesk to schedule technical assistance.
If you would like to know more about ransomware and how YYTECH keeps clients secure, with our YeoCare Managed Services,
contact us today.
The manufacturing industry has become the main target for cybercriminals over the years. The news, trade journals, and professional organizations such as the Michigan Manufacturing Center (MMTC) and the Michigan Manufacturers Association (MMA) all have stressed the importance of manufacturers becoming aware of this growing threat.
- IBM released a study in 2016 titled, X-Force Research 2016 Cyber Security Intelligence Index, which found that the manufacturing sector was second only to healthcare as the most attacked industry in the country.
- The most recent Carbon Black Threat Report places the manufacturing industry at the top of the target lists for ransomware and malware.
- According to the Ponemom Institute, the average price for a small business to clean up after they have been hacked stands at $690,000; for mid-market companies, it is more than $1 million.
The Carbon Black Threat Report states that when considering the total amount of ransomware seen in 2016, manufacturing companies (16% of total ransomware instances), utility/energy companies (15.4% of all ransomware instances) and companies (12.6% of all ransomware instances) led the way.
The Carbon Black Threat Report also states that overall, malware continues to target every industry with manufacturing companies (21.8% of total malware), non-profit organizations (16.4% of total malware), and utility/energy companies (15.6% of total malware) leading the way in 2016.
DoD Guidelines
Manufacturers with government contracts, issued by the U.S. Department of Defense, have until December 31 to conform to new federal guidelines mandating suppliers adopt a variety of cybersecurity best practices, countermeasures, and reporting standards to continue to qualify for contracts. The new mandates, covered in the standards described in NIST Special Publication 800-171, apply to contractors for the Department of Defense, National Aeronautics and Space Administration (NASA) and the General Services Administration.
Thankfully you’re not alone. Click here to learn how YYTECH can help.
Learn more about the DoD’s Guidelines:
Microsoft Office 2007, and its suite of applications, will no longer be supported by Microsoft as of October 10, 2017.
What does this mean for me?
Unsupported applications turn environments into security and compliance risks. If a security flaw is found after the end of support date, no patches for security updates will be released to systems using Office 2007. In other words, if you’re still using Office 2007 applications, such as Word 2007 and Excel 2007, beyond the support date your company will be at risk for network security vulnerabilities.
What should I do?
It’s important to assess your network to determine what machines that need to be upgraded. If you would like more information on how to upgrade Microsoft Office on you system, our dedicated sales and support teams are available for assistance. Yeo & Yeo Technology specializes in Microsoft Office 365 and Office 2016.
Contact YYTECH today if you would like to upgrade.
Ever wonder what Sage HRMS looks like or how it functions? Take a look at this quick overview video. If you would like to learn more about Sage HRMS, visit our webpage or contact us today!
Most accounting and ERP systems come with a variety of built in Financial and Business Reports. These reports are often very general, and non-specific, and can frequently leave you wanting more. Whether it is a pinpointed category of data you are looking for, or a seemingly simple mathematical calculation that you want to perform with the data, these “canned” reports are often not able give the desired output. This is where Crystal Reports comes into the picture.
Crystal Reports offers an easy solution to your report generation and customization needs. It allows you to connect to your accounting and ERP data, and “slice and dice” it until you have the information you need in the format you want.
Yeo & Yeo Technology offers training on how to use this powerful tool to access, view, and ultimately distribute your data in the easiest to understand, and most visually appealing ways. If you aren’t looking to learn a new piece of software, but would rather have someone else gather the data and create the reports for you, YYTECH has several software consultants and programmers on staff that are well versed in the use of Crystal, and can offer that service as well.
We are in a new era of cybersecurity. Hackers are constantly inventing and innovating ways to steal our vital information. This is where Next-Generation Antivirus (NGAV) has entered the market. YYTECH is proud to offer a new NGAV solution for clients.
There are countless ways NGAV benefits users. The biggest benefit being protection going beyond just malware attacks. For many years, traditional antivirus was enough. Not anymore. Many organizations, with good traditional antivirus, fall victim to ransomware-type attacks that go undetected by standard antivirus . NGAV incorporates the industry’s newest features that target the tools, techniques, tactics, and procedures used every day by both mass scale opportunistic attackers and targeted advanced threats.
NGAV is the natural evolution of traditional antivirus that protects computers from the full spectrum of modern cyberattacks, delivering the best endpoint protection with the least amount of work. NGAV speaks to a fundamentally different technical approach in the way malicious activity is detected and blocked.
NGAV takes a system-centric view of endpoint security, examining every process on every endpoint to algorithmically detect and block the malicious tools, tactics, techniques and procedures (TTPs) on which attackers rely.
Manufacturers with government contracts have until December 31 to conform to new federal guidelines, issued by the U.S. Department of Defense, mandating suppliers adopt a variety of cybersecurity best practices, countermeasures, and reporting standards to continue to qualify for contracts.
The new mandates, covered in the standards described in NIST Special Publication 800-171, apply to contractors for the Department of Defense, National Aeronautics and Space Administration (NASA) and the General Services Administration. Many Michigan manufacturers have worked with federal agencies on classified projects; these regulations are meant to safeguard sensitive information in unclassified material, particularly as the threat of cybersecurity breaches grows.
The manufacturing industry has become the main target for cybercriminals over the years. The news, trade journals, and professional organizations such as the Michigan Manufacturers Association all have stressed the importance of manufacturers becoming aware of this growing threat.
- IBM released a study in 2016 titled, X-Force Research 2016 Cyber Security Intelligence Index, which found that the manufacturing sector was second only to healthcare as the most attacked industry in the country.
- The most recent Carbon Black Threat Report places the manufacturing industry at the top of the target lists for ransomware and malware.
- According to the Ponemom Institute, the average price for a small business to clean up after they have been hacked stands at $690,000; for mid-market companies, it is more than $1 million.
The Carbon Black Threat Report states that when considering the total amount of ransomware seen in 2016, manufacturing companies (16% of total ransomware instances), utility/energy companies (15.4% of all ransomware instances) and companies (12.6% of all ransomware instances) led the way.
The Carbon Black Threat Report also states that overall, malware continues to target every industry with manufacturing companies (21.8% of total malware), non-profit organizations (16.4% of total malware), and utility/energy companies (15.6% of total malware) leading the way in 2016.
YYTECH Can Help
Yeo & Yeo Technology, along with the Michigan Manufacturing Center (MMTC), has implemented a process to ensure manufacturers meet the necessary qualifications of NIST Special Publication 800-171.
We begin the process with an exploratory call between YYTECH, your team, and MMTC. This is done to acquire technical info on your network, firewall, etc. to assess your company’s practices related to the new standards.
Once this discovery call is complete, YYTECH and the MMTC will provide your company with a list of necessary fixes to assure compliance. This is where the work gets done. New standards may include updates to your network, policies, firewalls and employee training. Once we test and validate that all security aspects are up-to-date, we can establish ongoing support, motoring and reporting to ensure standards continue are met and your data is secure.
Contact your YYTECH Account Executive to learn more about this program and how YYTECH can get you on track before December 31!
If you work in an office, chances are you’re sitting at a desk most of the day. In fact, 86 percent of Americans sit all day at work. There are many health risks that come with sitting all day. According to Martha Grogan, Cardiologist at the Mayo Clinic, people who sit all day share the same heart attack risks as smokers.
Yeo & Yeo Technology is proud to announce a new partnership with Ergotron to help our clients change the way they work.
What is Ergotron?
Ergotron products are designed to help adapt to the physical needs of individuals. Ergotron’s WorkFit line of desktop workstations gives users the ability to stand and sit at their desk, giving them a healthier daily routine. Ergotron products bring ultimate adjustability and aid in overall health and wellness.
Where are Ergoton Products Used?
As standing and mobile workstations increase in popularity, you will typically find them being used in:
- Schools
- Health Care (Carts)
- Offices
Cloud has been a buzzword in IT for the last few years. In fact, there are aspects of cloud computing many people find confusing. We have come across a few myths we want to debunk for you today. Here are the top three cloud myths we have seen the most and the truth you should know.
Myth 1
Everyone can access your data
Myth 2
Data kept on site is safer than the cloud
Myth 3
Everything must move to the cloud
Design for Movement and Flexibility
allows us to be more mobile than ever before. So why do we keep sitting around? Ergotron is rethinking the way we design our environments, for more flexibility, greater collaboration and opportunities to move more. Workspace transformation is here! Learn about the science behind standing and get ideas for spaces where people can move more at JustStand.org.
*The content for this post is provided by Ergotron.
In the past, we have told you about Security Awareness Training and all of the benefits it provides. Having users who think before they click is one of the most valuable firewalls your organization can invest in. Now we are proud to announce a new level of training with over 300 new ways to keep users from clicking on malicious content.
- 20 e-learning modules
- 8 interactive learning modules
- 7 compliance modules
- 100+ videos, bite-size 1-3 minute
- 33 trivia games
- 125+ pieces of artwork