Crystal Reports: reporting made easy

Managing your business data can be challenging. Many people struggle to get data out of their software in an efficient way. They’re buried in data. YYTECH’s software consultants specialize in Crystal Reports, helping our clients get the most out of their data.

What is Crystal Reports?
Crystal Reports is a reporting tool designed to help you create rich, formatted reports from your data source, such as Microsoft Excel, Sage 100 and Exact Macola. Once connected to a data source, users design reports by adding the fields from the database that are displayed from the data source and adding them to the report. The basic capabilities of Crystal Reports are to add columns, headers, groupings, and formulas. You can also add parameters that can be used to filter the data set down into a report for viewing.

Are you buried in Excel sheets all day? Crystal Reports can help.

How YYTECH Can Help
Having Crystal Reports isn’t any good if you don’t know how to use the software. YYTECH has software consultants on staff to get new Crystal Reports users up and running through proper training and guidance.

When a client signs up for Crystal Reports, they are trained step-by-step. First, we show how to connect to the database using the Crystal Report Database Connection Wizard. We then review the designer view and put fields into columns and preview a basic report. We add groupings, headers, and footers to the report and also build and add a formula to the report. Lastly, we add a parameter and run a report using it.

One of the best ways our consultants can show users the power of Crystal Reports is to let them generate a report that has been giving them trouble.

YYTECH has been consulting with Crystal Reports for nearly 20 years. If you believe that Crystal Reports could help make reporting easier, contact us today.

 

By now your 2017 budget is probably nearing completion. Before your budget is set in stone, we wanted to remind you to not neglect your organization’s spending.

In order to help you understand the areas you should focus your IT budget on, we have compiled a list of areas you should consider focusing your planning around. In 2016, security was a major focus at Yeo & Yeo Technology and, as you will read, we believe that security is going to be a focus for many years to come.

Security Upgrades: Staying current is vitally important. Hackers are always finding ways to exploit software and steal information. Making room in your budget for security upgrades is important. Many of the tools we use, like Microsoft Office, automatically receive upgrades and you need to be sure you are getting them. Even if you have IT staff in place, keeping track of every update, you may need to consider managed services. Keeping up with all of the patches that are released can be daunting and many small businesses are going to need assistance.

Ransomware: We have pushed out a lot of updates on Ransomware this year and for good reason – it continues to grow. We have some tips on prevention and what to do if you believe your system is infected.

Preventative Measures

  • Do not follow unsolicited web links in email messages or submit any information to webpages in links.
  • Use caution when opening email attachments.
  • Keep operating systems and third-party software, including anti-virus, up-to-date with the latest patches.
  • Perform regular backups of all systems/data to avoid serious consequences should your system fall under attack. Testing of your backup should be done monthly.

If you believe your system may be infected with the CryptoLocker Malware, follow these steps

  • Immediately disconnect the infected system from the wireless or wired network. This may prevent the malware from further encrypting any more files on the network
  • Change your passwords AFTER removing the malware from your system
  • Users infected with the malware should consult with a reputable security expert to assist in removing the malware, or users can retrieve encrypted files by restoring from backup, restoring from a shadow copy or by performing a system restore

Microsoft: Outside of security Microsoft had another big year with the release of Office 2016 and Windows 10 Anniversary Update. Windows 10 has continued to grow in users and is currently operating on over 350 million devices. Office 365 has also continued to be a big success for Microsoft with over 70 million active users. Microsoft is continuously updating and adding new features to Office 365. YYTECH will continue to inform you about any major changes and updates Microsoft releases.

Updating Your PC: Every year it’s important to consider the state of your PC. Hardware and software are always getting better and both need to be considered when looking at your budget. Consider the following:

  • Does your PC still have enough storage?
  • How old is your PC?
  • Is it running slow?
  • Is your software up to date?

If you would like to learn more about planning your IT budget or YYTECH’s suite of services, contact us today!

 

This blog post originally appeared at www.yeoandyeo.com.

Protecting a company from attack by third parties intent on stealing money, data — or both — is a constant challenge. Companies must anticipate where the threat is the most severe and defenses are the weakest and dedicate the appropriate resources there.

However, given the complexity of a company’s information environment, as well as its physical footprint, it is often a challenge to identify and prioritize which areas in the organization pose the greatest threat.

Understanding how the enemy views your company’s infrastructure is critical to deploying a robust defense. Companies of all sizes are asking “red teams” — a covert team of experienced professionals — to launch attacks against their infrastructure and report back on the findings. For example, companies that are interested in assessing their network security can engage a team of network intrusion analysts who have experience penetrating corporate and government networks.

Regardless of the exact makeup of the teams deployed, the primary goal of a red team is to find the weaknesses in your company’s IT and/or physical environment. Simply put, if the red team can uncover vulnerabilities, so too can attackers.

Before your company deploys a red team to probe its defenses, think about the following elements of the team’s responsibilities and feedback process:

  • Start with the end in mind.

The end result of the team’s work must be actionable intelligence that places the company in a better position to combat attacks. To that end, ask the red team leader to provide an example of the report that your company will receive at the conclusion of the exercise. Unfortunately, despite the best intentions, companies can sometimes be overwhelmed with the results of the red team exercise and fail to implement a plan to bridge gaps uncovered during the process.

  • Test the red team’s defenses.

Given the highly sensitive nature of the work that red teams conduct, it is important that members of that team treat the information uncovered as highly confidential. The professional services firm must have processes and in place to prevent unauthorized access. Before engaging a firm, ask them how it protects customer and client data.

For example, is client data shared on a central server within the company’s offices — or placed on a third-party cloud server? How will the firm ensure that only those with a “need to know” will be granted access to the data?

  • Convene a steering committee.

In anticipation of the red team exercise, it is important that your company form a steering committee with representatives from the departments most likely to be affected by the exercise. Before sharing information regarding the red team project, require that all steering committee members sign a non-disclosure agreement. Doing so will impress upon the members that the company views the exercise as highly sensitive and that secrecy must be maintained in order for it to be beneficial.

Timing is important in red team exercises. A company needs to test during a time when other important IT projects and upgrades are not going on. Further, in the event that the team triggers red flags in a particular area of the company, the department head should be able to monitor his or her department’s response without losing focus since ultimately he or she knows it is part of an exercise.

  • Suspend disbelief and interference.

Since the red team’s approach is supposed to mimic the activity of a criminal or attacker, it is not meant to be a highly structured event that is defined by the same people and thinking that created the company’s defenses in the first place. The red team must be able to explore the company’s defenses with relatively few limitations — just as an attacker would do. Short of inflicting harm on a business and creating significant financial losses, the red team should be allowed to conduct their work unimpeded.

The key concept that staff members must firmly grasp is that attackers intent on overcoming your company’s defenses are typically limited only by their imagination and the time needed to defeat your organization’s countermeasures. The same should apply to the red team’s efforts.

  • Share results on a need-to-know basis.

At the conclusion of the exercise, your company should make sure the intelligence gathered during the process is only made available to those who have a defined business need. In addition, ensure that all meetings that take place within the organization to discuss the red team findings are controlled to prevent the introduction of individuals who have not been suitably briefed on the purpose of the exercise and the associated sensitivity of the data.

  • Look beyond your company’s infrastructure.

Depending on the size and nature of your company’s business, employees may be asked to travel domestically as well as internationally. When they do so, they are obviously subject to an entirely different set of risks than are present in their offices.

For example, if employees travel to foreign countries, has your company taken the time to determine which hotels offer the best physical security so that laptops and smart phones are less likely to be stolen? If employees use wireless networks while in the hotel, what protections can your company put in place to minimize the potential that data will be intercepted by a third party? Hotels and offices overseas can be easily overlooked if an organization’s people and assets are largely concentrated in the company’s home market.

  • Red team exercises are not a one-time event.

As your business grows, the risks that it faces change. Periodically, your company should consider re-engaging the red team to conduct additional exercises. In fact, conducting regular tests can reduce your company’s risk exposure and the associated costs involved in remediating potential gaps. The drive and determination of “would be” attackers seldom wavers. A commitment to use red teams over an extended period can ultimately help your company deflect attackers and will help reveal system vulnerabilities. Your competitors may not be so prepared.

© 2016

You’re starting a new business and it’s the most exciting thing you’ve ever done. How do you convey your enthusiasm and make the best possible impression?

You need an elevator pitch, a concise, persuasive story that sums up your business in no more than a minute. The term elevator pitch comes from Hollywood, where producers would try to sell their blockbuster ideas to studio executives in the span of a short elevator ride. How to craft an effective sales pitch?

Step 1

First impression. It takes just a few seconds of meeting someone to make a first impression. Even before you utter a single syllable. Nonverbal cues are important, so be sure to dress and present yourself in a way that’s consistent with your business.

Step 2

The right start. You have 15 seconds or less to grab a prospect’s attention. Use engaging language such as a clever twist on a familiar saying or an intriguing question. Steer away from industry jargon, and use references that everyone can understand.

Step 3

The middle. Simplify, take no more than 25 seconds. Present the key benefits: what is your product, what makes it unique, and what does it do for the customer. A photo or short video on your Windows device can help engage your prospect.

Step 4

The wrap up. End on a high note, 15-seconds maximum. Remember that the purpose of the elevator pitch is to interest your audience and leave them eager for more information.

Step 5

The finish. Leave a way for the prospect to get in touch with you. You can send your thank-you note and contact information from your mobile device using Office 365. And immediately track that interaction with Microsoft Dynamics CRM Online on your device.

Step 6

Next steps. You can’t count on a prospect getting back in touch with you, no matter how good your pitch. But, you don’t want to miss their call
when they do. Use Lync in Office 365 on your mobile device lets you conference in other members of the team to answer a prospect’s questions.

*This article was provided by Microsoft Community Connections

 

Rules for credit card and debit card information security are set forth in the Payment Card Industry Data Security Standards (PCI-DSS), a set of industry regulations. Failure to comply with these standards can result in penalties and increased transaction costs. In additional, stolen credit cards are often used to fund other criminal activity.

As part of maintaining PCI compliance, you should know what to look for and how to respond to possible credit or debit card fraud. Here are some tips to help you keep your company and customer information secure:
 
Report suspicious activity immediately. If you see unusual behavior in your organization, report it. For example, if someone looks like they are handling the card reader at an ATM or credit card machine, they could be installing a skimmer to steal data from unsuspecting customers. Or, if you see an unidentified individual attempt to tailgate an employee into your building, this should be reported. Even if they are in a courier uniform and carrying heavy boxes, their identity and purpose should be identified.
 
Report strange computer behavior to your IT team. Many data breaches happen because of an employee clicking on a link or opening an attachment in an email they weren’t expecting. Not paying attention to social engineering cues and failing to report possible phishing or scam attempts can leave your organization susceptible to and at the mercy of hackers. If you suspect you may have been the victim of a phishing attack, the best thing you can do is contact your IT team, or help desk immediately, so they can minimize the affect of a security breach. Don’t wait.
 
Use strong passwords. If your passwords are weak, you are putting your company at risk of being easily infiltrated by hackers.
 
Do not send or save sensitive card information on unsecured or unapproved devices. You should not store any sensitive data unless absolutely necessary. If data must be stored, it should be on a very secure, company-approved device. Also, if you need to write down a credit card number on paper for any reason, you should shred it immediately once you’re done using it. Do not just throw it away. Additionally, credit or debit card information should never be sent through unsecured means, such as through email or a publicly used fax machine.
 
Receipts or imprint machine transactions should be stored or disposed of properly. Paper records can be stolen or compromised, so they must be disposed of properly (such as in a shredding machine), or stored in a secure area, according to your company’s policy.
Employees who do not take care of sensitive information can lead their organizations into fines, increased operating costs, loss of customer confidence, and even more governmental regulation. Do your part to keep sensitive information safe at all times.
 
The tips included in this message are meant to remind you to keep sensitive information secure. Remember, your organization’s privacy, security, and compliance policies for handling sensitive information should be followed first and foremost.

Last week Yahoo announced that 500 million of their accounts were hacked and were sold to internet criminals. These cyber criminals are going to use this information in a variety of ways. For instance, they will send phishing emails claiming you need to change your Yahoo account password. Although these scam emails look legit, assume they are not. If you have a Yahoo account, YYTECH suggests you do the following:

 
  1. Open your browser and go to Yahoo. Do not use a link in any email. Reset your password and make it a strong and complex password.
  2. If you were using that same password on multiple websites, you need to stop now. Using the same password for multiple logins is an invitation to get hacked. If you did use your Yahoo passwords on other sites, go to those sites and change the password there too. Also change the security questions and make the answer something complex.
  3. Watch out for any phishing emails that relate to Yahoo in any way and ask for information.
 

So, let’s do a quick analysis of the cyber battlefield here. What are the bad guys up to? Check Point Software provided some fresh data a few days ago, which gives us the correct order of magnitude of what we are dealing with here. This by the way is great ammo to get more IT security budget. 

  • 205 Billion emails sent every day
  • 39 percent of attachments contain malicious files
  • 34 percent of links embedded in emails are malicious
  • 77 percent of all malware is installed via email
  • Malware by file type: 52 percent are PDF, and 44 percent are EXE format

Now, how about the good guys? What are the Law Enforcement resources at our disposal to protect us against this digital onslaught? I found a September 7, 2016 interview with FBI Special Agent Lawrence Wolfenden who provided some worrisome stats.

He said: “Accept that a breach is going to occur, the issue is, what do you do about it.” That in itself is nothing new, but here are some interesting numbers:

The FBI has about 800 cyber agents, including 600 agents who conduct investigations, so the agency doesn’t have the ability to address every attack, and must triage the most significant ones.

By law, a $5,000 loss must occur before the FBI can get involved in a case, but as a practical matter, the U.S. Attorney’s Office wants to see about $50,000 or more in losses before the FBI gets involved, and the agency itself generally wants to see $100,000 to $200,000 of loss before it can justify spending investigative resources, Wolfenden said.

In other words, if you get infected with ransomware and the ransom is less than 100-200K, you are on your own. Good thing to know.

You’ve probably seen articles about the power of to “disrupt” entire industries, whether it’s Uber upending the taxi business or Facebook changing how people communicate. News stories about business disruption focus on dramatic tales of companies that grew to hundreds of millions in revenue almost overnight.

But disruption can happen on a smaller scale, too. And you don’t necessarily have to invent the to take advantage of it in a way that lets you positively disrupt how business is done in your industry. For any size of company, using digital technologies to disrupt your business requires strategic thinking, smart investment, and a commitment to long-term success. Let’s take a look at a few disruptive small business trends and technologies that could transform how you do business.

Mobile Internet

Just about everybody has affordable, fast mobile Internet these days. Mobile business is a rich source of competitive advantage for companies who really exploit it. To start with, make sure your website, ads, and e-commerce store are mobile-ready. The mobile Internet is great for employees, too. It empowers them to get work done anywhere using tools such as the mobile versions of Microsoft Office applications, available through Office 365.

The Internet of Things

Networks of low-cost sensors communicating and collecting data 24/7? Now that sounds disruptive. It also sounds like something only big companies are considering, but increasingly, Internet-connected equipment and devices are available across a range of industries. With these connected devices, you can monitor performance, perform maintenance, collect data, and control functions remotely. The key is to consider how such investments can accelerate your business and not just buy them for the “wow” factor. If you are pursuing an Internet of Things strategy, take a look at Microsoft Azure. It offers completely managed services that take a lot of work out of connecting devices together and capturing information from them.

Knowledge work automation

We’ve seen manufacturing become increasingly automated. Now, the average office worker is facing much the same scenario. For example, at one time almost every loan application was scrutinized by an individual human underwriter. Now, banks use sophisticated software to make decisions based on data. In a small and mid-size business, where there never seems to be enough time to get everything done, these kinds of tools can be invaluable. A simple example is voice recognition—a powerful too few people take advantage of. Take Cortana in Windows 10. With Cortana, you can write and search for information very efficiently just by speaking, which can save you time and keep you focused on adding value.

Cloud

The cloud—the ability to access IT infrastructure, applications, and services over the Internet—has been a focus of business innovators for many years now, but the opportunities to disrupt your business keep on growing. And it’s especially relevant for small and mid-size businesses, who now have affordable access to computing power previously accessible only to the largest enterprises. The easiest way to start with cloud is adopting software as a service, such as switching from traditional Microsoft Office to Office 365. You don’t have to run servers or worry about security because it’s all taken care of behind the scenes, and your software is always up to date with the latest (dare we say disruptive?) features.

Big Data

It’s an increasingly data-driven world, and every business needs to be looking at how they can use information to make better decisions, connect with customers, and find new opportunities. And, you don’t have to be talking terabytes to get value from data. The first step is to make sure you’re collecting and storing data somewhere you can access it. Do an inventory of the types of data your business collects, and the types of data it could collect, and make some decisions about what’s truly valuable. Then, you need tools that help you explore and make sense of the data. Excel is the go-to classic for Office users, and you can get the latest with Office 365. If you want to take things a step further, try PowerBI, which provides easy-to-use tools for asking and answering questions from your data.

Most of all, remember: business disruption is relative, and it doesn’t always have to make headlines. If your competitors aren’t following the small business trends and making the most of innovation, maybe it’s time to do a little disrupting of your own.

This article was provided through our partnership with Microsoft. 

 

When a vendor releases software, they believe that it’s safe to use and reliable. However, this isn’t always the case. Often there are holes in the software that vendors are unaware of. These can be exploited by hackers and are known as Zero-Day attacks.

Types of Zero-Day attacks include malware, spyware, and openings in your private information. After an attack is launched, a vendor has to rush to develop and release a patch. This minimizes the damage that’s been done but for many users, it’s too little too late.

Research conducted by our partners at Symantec shows that Zero-Day attacks are increasing. In 2015 there were 54 Zero-Day vulnerabilities, which more than doubles the 24 that were found in 2014. The most attacked software is Adobe’s Flash Player. Adobe has acknowledged major vulnerabilities, as recently as June 2016 and accounted for 10 Zero-Day vulnerabilities in 2015.

There’s no way you can completely stop a Zero-Day attack but there are many ways you can protect yourself.

  • 1.Have a secure firewall in place: Your firewall can play a critical role in protecting your PC against threats. Discuss with your IT consultant on proper configurations that are right for you.
  • 2.Only use applications that are essential: The more browsers and software you use the most vulnerable you are to a Zero-Day attack. Use only the applications you need to reduce risk.
  • 3.Keep current with patches: Make sure that your PC is being properly patched. If you would like to learn more about proper patch management, take a look at one of our recent newsletter articles.
  • 4.Have a backup and disaster recovery option in place: Keep your data replicated, offsite and secure. Should your information be compromised, have the option to recover it.

Although attacks are increasing, the ways we can protect our data has never been stronger. If you are unsure about your preparedness for Zero-Day, or any other cyber-attack, contact your account executive today.

 

1 Compare documents side-by-side

Sometimes you may need to compare two documents to see how they differ. Word can help.

Here’s what you do:

  1. Open both of the files that you want to compare.
  2. From within one of the documents, on the View tab, in the Window group, select View Side by Side. If you have multiple documents open, you’ll see a display that will ask you which document you want to compare with your current document.
  3. To scroll both documents at the same time, on the View tab, in the Windows group, select Synchronous Scrolling.
  4. To close Side by Side view, in the Window group on the View tab, deselect View Side by Side.

Note: When you are comparing documents, these commands may appear only as icons:

View Side by Side word_2016_small_1

Synchronous Scrolling word_2016_small_2

Feature available since Office 2010. These instructions are for Office 365; your version may vary.

2 Double-click anywhere to start typing

Word has a cool feature called ‘Click and Type,’ that allows you to put text just about anywhere on the page. You don’t have to start at the left and move to the right, or tab to get to where you want to start! It’s intended to give you the same experience as writing on paper.

Here’s what you do:

Left double-click wherever you want text on your document and start typing. Voila! There’s your text. If you’re using a tablet, you can double tap on the document.

How to use:

  • Brainstorming and mind maps
  • Insert text and graphics anywhere (formatting brochures and flyers)

Note: Click and Type is available only in Print Layout and Web Layout views, not in Draft, Outline, or Read Mode.

Feature available since Office 2003. These instructions are for Office 365; your version may vary.

3 Quickly replace styles and formatting

Ever want to change a formatting style, such as changing the text color in a particular font from black to blue, but don’t want to scroll through your entire document to find all the places you have used this font style? Use the Replace function in Word.

Here’s what to do:

  1. On the Home tab, in the Editing group, select Replace.
  2. Place your cursor in the Find what text box (You do not need to type anything).
  3. Select the Format drop-down menu, and then select the format that you want to replace. For instance, if you wanted to replace the font for all subheads in Segoe UI, 16 pt with Arial, 18 pt, you would select Font. Then you would select Segoe UI under Font, Regular under Font Style, and 16 under Size.
  4. Select OK.
  5. Place your cursor in the Replace with text box.
  6. Select the Format drop-down box, and then choose your replacement format. (Using our example in Step 3, you would select Font, then Arial under Font, Regular under Font Style, and 18 under Font Size.
  7. Select OK.

Word_2016_2

Note: If you don’t see the Format drop-down menu, select More. The drop-down is at the bottom of the pop-up display under Replace.

You can search and replace almost any text formatting, including line spacing, margins and font types, sizes, and styles by using this feature.

Feature available since Office 2010. These instructions are for Office 365; your version may vary.

Information provided in this post is courtesy of Microsoft Community Connections. 

 

It seems like everywhere you look, there’s a new fitness trend. There’s fitness tracking devices, diet fads and new health foods to try. I’ll pass on the kale chips, thank you. 

For many of us, one of the biggest detriments to our health is sitting at our desk all day. Seriously, sitting is the new smoking. You might be reading this blog post while sitting, right now! Don’t panic. You don’t have to stand up right this minute. But what if there was a way to improve your health, daily. That’s what the WorkFit-T series from Ergotron is designed to do. Stand or sit at your desk in a snap. Just take a look at how easy it is to use in this video.

 

Yeo & Yeo Technology is proud to work with Ergotron to deliver products that can help improve your overall health. If you’re still unsure if a WorkFit-TL is right for you, give it a try for free! Ergotron offers qualifying clients an opportunity to try a WorkFit-TL at no cost. 

 

 

In addition to solving unique business challenges, Mobile CRM offers several unique benefits, one of which is lowering the cost of sales by up to 15 percent.

There are several methods by which Mobile CRM can contribute to a lower cost of sales.

For instance, Mobile CRM allows information to be immediately requested and retrieved, which streamlines and even accelerates sales and service processes and improves the mobile user’s ability for on-the-spot problem solving.

Many to-dos and follow-up action items that used to be done offline can be eliminated as problem resolution can be initiated in real time.

Also, closing sales with fewer interactions keep sales people working on new opportunities that build revenues.

In addition to the benefits like, lower cost of sales, higher sales pipeline velocity, and faster inventory turns accelerated sales cycles allow your company to generate more revenue and your sales people to earn more commissions.

To learn more about the advantages, benefits, challenges and considerations of mobile CRM solutions: Download the Mobile CRM: Advantages, Benefits, Challenges and Considerations white paper today. You can also contact Yeo & Yeo Technology and speak to a representative. 

 

Each quarter, our partners at Proofpoint release a threat summary report. What are some of the biggest threats of 2016? Read the first quarter report to learn more and prepare your organization for the rest of the year. 

Click here to view the report in its entirety.

Highlights:
  • Multiple threats continue to target your email inbox
  • Social media targeting continues to increase
  • Andriod phones and tablets are the most vulnerable to malicious apps
About Proofpoint:
Yeo & Yeo Technology is proud to partner with Proofpoint. Proofpoint, a next-generation cybersecurity company, enables organizations to protect the way their people work today from advanced threats and compliance risks. Proofpoint helps cybersecurity professionals protect their users from the advanced attacks that target them (via email, mobile apps, and social media), protect the critical information people create, and equip their teams with the right intelligence and tools to respond quickly when things go wrong. Leading organizations of all sizes, including over 50 percent of the Fortune 100, rely on Proofpoint solutions, which are built for today’s mobile and social-enabled IT environments and leverage both the power of the cloud and a big-data-driven analytics platform to combat modern advanced threats.

All information provided in this post was provided by Proofpoint.

In a recent report, Forrester notes that on-demand CRM is becoming the default choice as buyers look to see if this approach meets their needs before they seriously consider an on-premises CRM.

A look at the numbers supports that viewpoint. Analysts forecast that in 2016, one-third of all spending on customer relationship management software will be for on-demand versus 26 percent in 2010.

Information analyst Gartner predicts that the CRM market will enter a shakeup, as a number of key trends, primarily involving social networks and CRM, begin to take hold. This includes changes to marketing and customer service technologies and the introduction of new projects and implementations.

But before you lock down your choice, you need to determine if you can achieve maximum business value from an on-demand CRM solution – or if on-premises CRM will better meet current and future business objectives.

Weigh the benefits of each, and then ask yourself some key questions to help you define what your company really needs and expects from your CRM solution.

Learn more by reading our Whitepaper CRM: On-Premises vs. On-Demand – 5 Key Considerations. You may also register to attend a free webinar on June 21 “On-Demand Cloud CRM vs. On-Premises CRM: Key Considerations.” 

Our affiliates, Yeo &Yeo CPAs and Business Consultants, recently posted an excellent article about what to know when facing a HIPAA audit. We thought this article would be great to share with you as well. To read this post, click here

© 2016

We have all heard the line, “just clear your cache.” But what does clearing your browser’s cache really do? Let’s first look at what cache is and, second, why you should clear it from time to time.

What is cache
Cache was created by web browser designers to speed up your Internet browsing experience. Basically, it’s faster for your computer to pull information from its hard disk than the Internet. When you visit a website, your browser sends things like images and graphics to your hard disk to store for future use. When you go back to that site the images won’t need to be reloaded from the browser, they will already be stored on your hard disk. 

Clearing your cache?
Clearing the cache just simply means emptying its history. The next time you display a web page everything will download fresh and new. The reason you should clear your cache is to simply clear any confusion your cache may have. This could be partially downloaded files or badly formatted sites causing issues. Clearing your cache is a great way to fix these issues and is one of the first things your IT department will suggest if you’re having trouble with your browser. 

Depending on what browser you’re using, like Chrome, Firefox or IE, there are different ways to clear your cache. A quick online search can show you how to perform this task. 
 

With a new year comes the opportunity to reassess your organization and the way you do business. It’s a chance to ask yourself, “What can be done better? How can we improve?” Now is the perfect time to take a look at your IT and ensure that 2016 is your best year yet. Here are 5 New Year’s “resolutions” to help get started on the right foot in 2016.

1. Budget
If you spent a lot of time working on your budget in December, it’s time to put those funds to work. According to CIO Magazine, the average IT budget for small businesses is between 4 and 6 percent of the overall budget annually. When your IT isn’t working efficiently, chances are your staff isn’t either. 

2. Security Health Check
How secure is your network? Staying secure doesn’t just mean locking the doors when you leave. There are constant threats like malware and ransomware can easily hold your network hostage. All it takes is one misguided click.  

3. Implement Managed Services There are many benefits to outsourcing IT. Even if you have an internal IT employee and you’re not outsourcing your IT, it might be time to think about it. First, consider the fact you can set fixed and controlled cost. Managed services are much more than that! When IT is outsourced, you’re free to spend more time focusing on the other needs of your organization. You also open your up to certified technicians and engineers to assist with any IT related issues that your organization may have. 

4. Disaster Recovery Disaster Recovery falls under the same theme as security. If something does happen, you need to have a backup plan in place to recover your information from. This usually means an offsite backup location, hosting a replicated copy of your information. If you already have a backup in place, make sure it’s tested and verified. 

5. Process Automation  
Your should be working for you, not against you. If the programs you use every day require work-arounds to function properly, your software is working against you. Don’t let the work-arounds become the norm. Improving and streamlining your business processes will increase your profit and maximize your efficiency, but don’t let upgrading overwhelm you. You don’t have to break the bank to improve the quality and consistency of your business processes. Set realistic expectations, upgrade the biggest trouble areas first.  

Yeo & Yeo Technology (YYTECH), today announced it has achieved a Silver Small and Midmarket Cloud competency, demonstrating its ability to meet
Microsoft Corp. customers’ evolving needs in today’s dynamic business environment. To earn a Microsoft silver competency, partners must successfully demonstrate
expertise through rigorous exams, culminating in Microsoft certifications. And to ensure the highest quality of services, Microsoft requires customer references
for successful integration and customer satisfaction.

YYTECH has three decades of experience and knowledge in the IT industry and stays on top of ever-changing technologies with certified professionals
that help them design, build and maintain cost-effective solutions for clients.
YYTECH’s expertise is backed by their Microsoft certifications, combined with their partnerships with Cisco, VMware, HP and other leading companies.
The Microsoft Silver Small and Midmarket Cloud competency gives clients peace of mind that they have chosen a partner with experience and certifications
that are needed to assist them with their IT pain points, as well as with future IT growth and advancement.  
“This Microsoft Silver Small and Midmarket Cloud competency showcases our expertise in today’s market and demonstrates our knowledge of
Microsoft and its products,” said Jeff McCulloch, President. “Our plan is to accelerate our customers’ success by serving as advisors
for their business demands.”
“By achieving a silver competency, organizations have proven their expertise in specific areas, placing them among the top 5 percent
of Microsoft partners worldwide,” said Phil Sorgen, corporate vice president, Worldwide Partner Group at Microsoft Corp. “When customers look
for an IT partner to meet their business challenges, choosing a company that has attained Microsoft competencies is a smart move. These are
highly qualified professionals with access to Microsoft technical support and product teams.”
Microsoft Office 365 is Microsoft’s fastest growing commercial product ever. The Silver Small and Midmarket Cloud competency enables YYTECH the
ability to capitalize on the demand from the small and midmarket customer marketplace for cloud and hybrid solutions built on Microsoft
Office 365, providing them with additional support and incentives.
The Microsoft Partner Network helps partners strengthen their capabilities to showcase leadership in the marketplace on the latest ,
to better serve customers and, with 640,000 Microsoft partners in their ecosystem, to easily connect with one of the most active, diverse
networks in the world.
 
This article was originally posted on Nov. 4. 
 

If you use a PC at home, chances are you have received a notice to upgrade to Windows 10. Now there are some cases where older devices don’t qualify for the free upgrade, based on hardware and software requirements. For the most part, Microsoft wants to make your transition to Windows 10 as easy as possible. Here are some reasons you should consider making the upgrade.

It’s Free
Believe it or not, Windows 10 has already been around since July 29, 2015. Microsoft has made the upgrade free for Windows 7, 8, 8.1 and Windows Phone 8.1 devices. Microsoft sees Windows 10 as a service and want to get it on as many devices as possible. Once you upgrade to Windows 10 your device will be upgraded to newest version of Windows for the duration of its life.

Cortana
Cortana is your new personal assistant. Ask her questions, schedule reminders or get the weather. Cortana has you covered. 

No More Start Screen
One of the biggest issues with Windows 8 was the dreaded Start Screen. Windows 10 takes the best features from the Start Screen and combines it with the Start Menu we all know and love. It’s also fully customizable based on your specific likes. It works on both desktops and mobile devices. Think of it as a hybrid of Windows 7 and 8.

Mobile
If you use multiple Windows devices, Windows 10 is a seamless transition for all of them. Windows 10 gives you a similar user experience on your mobile device that you will find on your PC.  

Cross-Compatibility
If you are using Windows 10 on your mobile device, laptop, and gaming system (Xbox One) you can stream your games and information across all of the Windows 10 devices. Your Windows devices are no longer separate entities!

Smaller installation size
Microsoft has said that Windows 10 uses a more efficient compression algorithm for files. Files can be 1.5 to 2.6 GB smaller, depending on your device. This opens up more space on your hard drive. 

There are many other great features of Windows 10 that aren’t listed here. But the most important thing to remember is to make sure that upgrading is right for you. If you’re device is running Windows 7 or higher, there’s really no reason not to upgrade. Just make sure your computer is equipped to run Windows 10 and doesn’t have any hardware or software conflicts. Here is a great way to check the compatibility of your PC. 

Also, remember that there is a difference between upgrading your home PC and your work PC. It’s important to note that if your work PC receives the Windows 10 update prompt that you do not click it. 

 
Another security scam has presented itself in our area. Most of us are used to seeing scams that hit our email inbox or pop up on our screens. Now scammers are attempting to use phones, pretending to be a computer technician, to gain access to vital information.

How a Tech Support Scam Works
This type of scam is different from what we typically see. It begins with a phone call from an individual claiming to be support for a well-known company like Microsoft. The scammer will then walk users through complex steps to find legitimate files that they claim to be viruses. This is all in an attempt to gain your trust. Once they have it, they will begin asking for things like, remote access, credit card information, directing you to false websites.

What you can do if you get a call
If you receive a call from a person who claims to be tech support, hang up and contact a number or organization you know to be legitimate. Remember to never give remote access or vital information to someone you do not trust. If, for whatever reason, you believe that you have ever responded to a scam, be sure to change any passwords you have given out and cancel any credit cards that have been compromised. 

If you believe that your organization has been targeted by a tech support scam, please contact Yeo & Yeo Technology at 989.797.4075.