Technology & Cyber Security


Look Out for These Five Fraud Perpetrators

Amy Buben

The Embezzler. The Common Thief. The Hacker. The Inventor. The Glutton. No, these aren't cartoon villains. They're all-too-real occupational fraud perpetrators who fleeced their employers of thousands — or even millions — of dollars. Although we've attached the names to actual criminals in cases reported by the U.S. Justice D... Look out

File Early to Avoid Identity Theft

Yeo & Yeo CPAs & Business Consultants

If you’re like many Americans, you may not start thinking about filing your tax return until the deadline. Filing as close to the start date as possible could protect you from tax identity theft. How filing early helps In this increasingly common scam, thieves use victims’ personal information to file fraudulent tax returns electronically ... File early

Statewide Manufacturing Forum to Address Emerging Critical Issues

Amy Buben

Technology trends change in the blink of an eye. To stay competitive, manufacturers need to know what will move their business forward, what processes have become obsolete and what innovations are on the horizon. The 2018 MFG Forum will guide industry leaders through these emerging issues and provide resources to maintain Michigan’s manufacturin... Learn More

Three Questions to Ask Your IT Staff About Cybersecurity

Joe Malott

As a responsible party to the security of your companies data, it boils down to a simple question – when it comes to cybersecurity, how do you know that your organization is secure? Yeo & Yeo Computer Consulting is providing three questions, and a little background about each topic, so you can be confident when reporting to ... Learn More

Unclaimed Property – State of Michigan Filing Requirements

Kristi Krafft-Bellsky

It’s that time of the year when the State of Michigan would like all organizations to look through their bank reconciliations to determine if there are any uncleared checks that have reached a dormancy period as of March 31, 2018, that would require reporting to the state. A general rule of thumb is that the dormancy period is one year f... Learn More

Security Awareness Training ― Cybersecurity for Your Manufacturing Organization

Jeff McCulloch

Take a moment and think about all of the security features that are used to keep your organization’s network safe. Passwords and firewalls help keep the bad guys away from your vital information. But all of these security measures don’t mean a thing if someone clicks on a malware link inside an email. As phishing attacks have grown, so ... Learn More

Protect Your Data! Attend Yeo & Yeo’s Webinar on CyberSecurity

Jeff McCulloch

Our affiliate, Yeo & Yeo Computer Consulting, will host the webinar, CyberSecurity Threat Landscape, on November 10, 2016 from 10:00 to 11:00 a.m. EST. Cybercrime is a rapidly growing criminal business, impacting millions of people and organizations around the world. In fact, one in five small and medium-sized businesses have... Register Today

Ransomware Alert: Be on the Lookout for Suspicious Files

Yeo & Yeo CPAs & Business Consultants

Ransomware is a malicious software that blocks user access to data and demands payment to restore access. Ransomware criminal networks are continuously finding new ways to hijack your information. Now, we have discovered that cyber criminals have begun to use macro-enabled Word, Excel, Access and PowerPoint files to compromise data. Macros ... Learn More

Zero-day Vulnerabilities Continue to Increase

Jeff McCulloch

When a vendor releases software, they believe that it is reliable and safe to use. However, this is not always the case. Often there are holes in the software that vendors are unaware of, and these can be exploited by hackers immediately. These attacks are known as “Zero-day” because on the same day that the flaw becomes known, the software ve... Protect Yourself