We combine our expertise with accounting skills and systems experience, tailoring our services and solutions to satisfy your technology needs.
While many of us are stuck at home, we have started to use social media more to stay connected with family and friends. While this seems to be a simple solution to remain connected and pass the time until we can return back to a normal life, there .
Continue readingSage X3 Version 12, released earlier this year, introduced Electronic Signature and Journal Traceability that improve the safety and integrity of your sales transactions and journal entries. Here’s a closer look at these two new security and .
Continue readingThis year at the Lancaster County Chamber of Commerce EXPO, our team ran dark web searches of visitors and their businesses. Of the dozens of searches that we ran throughout the event, only THREE came up clean, meaning the majority of visitors to .
Continue readingThe prevalence of the Internet in business today has opened us up to a world of opportunity. We can streamline processes, access data and connect teams and remote offices like never before. Unfortunately over all of these benefits of doing business .
Continue readingBeware of suspicious calls from Sage impostors By now, most people are aware of phishing scams and how to recognize suspicious emails from unknown senders or emails that contain strange hyperlinks. But what happens when the impostor calls you .
Continue readingWe sat down with our business partner Joe Cudzik from Expedient to discuss cyber security and how small and midsized businesses can protect themselves from malicious attacks. 1. Can you provide an overview of Expedient? Expedient is a service .
Continue readingPreparing for Data Breach Storing data, whether customer or proprietary, is a key part of any organization. As the reliance upon computers and networking has become essential for businesses to remain competitive, it comes with a new set of .
Continue readingIt seems that dangerous phishing emails has become a regular to many inboxes. What: a business contact and friend of mine had his business email account “cleverly hacked” (his words, whatever that means). As a result, I received a dangerous phishing .
Continue reading