The EstesGroup Blog
Articles To Improve Your Business Process And Move Forward.Epicor ERP Event: EstesGroup Fall Summit 2020 (Video)
An Epicor ERP Event to Begin a New Season Are you ready for change? In June, we gathered friends and strangers together at an Epicor user event covering everything from master file setup to security to embedded customization. To further support this ERP community,...
How to Manage Epicor Part Replacement
One area of Epicor consulting that we frequently get asked about spins around engineering change orders. Engineering updates to the part master once the company is live has been likened to working on a car’s engine while speeding down the freeway. This is especially...
5 Ways to Secure Remote Workers & Keep Your Data Safe
Cybersecurity: On-site and Remote Cyberattacks can't stop us from developing new technology solutions. As a result of the pandemic, 2020 increased the demand for ways to secure remote workers, devices, and networks. The numbers aren't in yet, but some reports are...
Epicor Administration & Helpful Tools of the Trade
A Day in the Life of an Epicor Admin One of the best parts of working as an ERP consultant is the opportunity to work with so many smart people, and you'll find many working in Epicor administration. Companies are successful for a variety of reasons, and the...
Social Engineering Techniques: How Hackers Come Home
WELCOME HOME, MALWARE TIME TO MAKE YOURSELF AT HOME Human manipulation fuels social engineering techniques, and basic security measures, like anti-virus software, often can’t prevent innocent behaviors, like trust, from compromising your data. Hackers...
Epicor DMT: Data Management Tool Tips & Tricks
The Magic of Epicor DMT Licensing A common user challenge over the years with Epicor’s Data Management Tool (DMT) relates to the licensing of the actual module. Epicor DMT came from a very different evolutionary thread than the main application, and when trying...
EternalBlue Hacks & Tales from the Unpatched (Video)
EternalBlue, which is an ancient set of hacks — ancient: going back three years — is still applicable, especially in regard to some of the technology and vulnerabilities that we are seeing today. EternalBlue is a software that the NSA developed to hack Windows...
In-House, Web-Based or Private Cloud Solutions
If only purchasing software for business enablement could be as simple as tapping a button in an app — click once for on-premise installation, twice for web-based deployment, thrice for private cloud solutions. When considering software, users normally think about...
Dark Web Protection: Assessment, Awareness & Actualization
Business owners, especially those who have been through the challenges involved in a data breach, often hope the dark web goes completely dark — as in nonexistent. Wouldn't it be nice if trending IT services, like advanced web scans and security audits, go out with...
Getting QWERTY with Password Management
Common Password Management Security Mistakes qwerty, password, 12345, iloveyou, 111111, 54321 An average individual comes into daily contact with a variety of personal apps, websites, remote connections and enterprise applications. And this concoction of connections...
Epicor BAQ: Returning Too Much of a Good Thing
The Epicor BAQ (Business Activity Query) toolset allows you to leverage the mounds of data that your system generates. But the problem with mounds of data is its volume—when we say mounds, we mean… mounds. As such, Epicor has built in a feature to its BAQ designer to...
Part Master Best Practices? Ask Brad
Epicor Part Master Q&A Q: What are some of the first things that someone should consider when setting up parts in Epicor? A: We could have a long, harrowing conversation about part naming conventions, but arguments over part naming philosophies have ruined...
IT Services in a 1 + 1: 4 Signs You Need Managed IT
The word “outsourced” makes some business owners curious and others nervous when it comes to IT services. “MSP” is another term floating around, and you might also come across “IT-in-a-Box” when you go looking for help with your systems. Managed IT (our favorite code...
Epicor Engineer-to-Order at Your Service
The Role of Order Entry in ETO and CTO Environments Epicor Engineer-to-Order environments are their own special breed. Based on an almost infinite notion of product variability, their business models are hard to shoehorn into an ERP system. I once had a job shop...
Mobile Device Theft Prevention Tips
Cell Phone Theft Prevention: Digital Assets vs. Liabilities With more people working outside of the office, companies need to prepare their employees for the possibility that company and personal mobile devices could be lost to theft or misplacement. Remotely...