Technology & Cyber Security

Security Awareness Training ― CyberSecurity for Your Manufacturing Organization

Jeff McCulloch

Take a moment and think about all of the security features that are used to keep your organization’s network safe. Passwords and firewalls help keep the bad guys away from your vital information. But all of these security measures don’t mean a thing if someone clicks on a malware link inside an email. As phishing attacks have grown, so ... Learn More

Protect Your Data! Attend Yeo & Yeo’s Webinar on CyberSecurity

Jeff McCulloch

Our affiliate, Yeo & Yeo Computer Consulting, will host the webinar, CyberSecurity Threat Landscape, on November 10, 2016 from 10:00 to 11:00 a.m. EST. Cybercrime is a rapidly growing criminal business, impacting millions of people and organizations around the world. In fact, one in five small and medium-sized businesses have... Register Today

Ransomware Alert: Be on the Lookout for Suspicious Files

Yeo & Yeo CPAs & Business Consultants

Ransomware is a malicious software that blocks user access to data and demands payment to restore access. Ransomware criminal networks are continuously finding new ways to hijack your information. Now, we have discovered that cyber criminals have begun to use macro-enabled Word, Excel, Access and PowerPoint files to compromise data. Macros ... Learn More

Zero-day Vulnerabilities Continue to Increase

Jeff McCulloch

When a vendor releases software, they believe that it is reliable and safe to use. However, this is not always the case. Often there are holes in the software that vendors are unaware of, and these can be exploited by hackers immediately. These attacks are known as “Zero-day” because on the same day that the flaw becomes known, the software ve... Protect Yourself

Estate Planning Should Include Your Online Accounts

Michael Espinoza

Helping you plan for and protect your assets and your legacy is something we are very passionate about. We want to pass along some information about an area that you cannot afford to overlook in the estate planning process.      Estate planning 2.0 – protecting your digital footprint The growing popula... Learn More

Security Awareness Training ― CyberSecurity for Your Healthcare Organization

Jeff McCulloch

Take a moment and think about all of the security features that are used to keep your organization’s network safe. Passwords and firewalls help keep the bad guys away from your vital information. But all of these security measures don’t mean a thing if someone clicks on a malware link inside an email. As phishing at...

Take Preventive Measures Against CryptoLocker Malware That Holds Data for Ransom

Jeff McCulloch

You may have heard about CryptoLocker or Ransomware over the past couple of years. CryptoLocker has continued to infect computers worldwide while baffling leading IT security experts. A February 2016 article on BBC describes how CryptoLocker held a Los Angeles-based hospital's information for ransom; its computer systems were offline f... Learn How

Michigan Attacks Identity Theft With Online Verification Quiz

Yeo & Yeo CPAs & Business Consultants

The Michigan Department of Treasury has increased security measures in an effort to protect Michigan taxpayers and the state from tax-related identity theft. If an income tax return is selected for identity confirmation, the taxpayer will receive a letter from the Department of Treasury asking them to confirm their identity by completi... Learn How

File Early to Avoid Identity Theft

Yeo & Yeo CPAs & Business Consultants

If you’re like many Americans, you may not start thinking about filing your tax return until the April 15 deadline (this year, April 18) is just a few weeks — or perhaps even just a few days — away. But there’s another date you should keep in mind: January 19. That’s the date the IRS began accepting 2015 returns, and filing... Read More