Your Key to Communication

October 2017 Teceri Newsletter

on Oct 9, 2017 in Blog, Newsletter

 


Here is your October 2017 newsletter. In this issue…

• Letter from the President
• Teceri News: AV vs IT: Disruption or Evolution?
• Equifax Breach: What Should You Do to Protect Yourself?
• 7 Tips to Prevent Ransomware
• Customer Profile: Bonnell’s Auto Group
• Are Social Logins Safe to Use?
Start With Security – And Stick With It
• Why Bother With Updates and Upgrades?
Windows 10 Tip: Three Ways to Get Started With OneNote
• Employee Highlight: Certifications and Specializations

Letter from the President

In the Seven Habits of Highly Effective People, author Peter Drucker
discusses “Sharpening the Saw” as seventh habit. He describes this habit as “preserving and enhancing the greatest asset you have—you.” As an organization, we believe it is our responsibility not just to our organization but also to you, our customers, to ensure our team is practicing this habit. To this end, we put a strong emphasis on continuing education and certifications for our entire team, and we love to celebrate these accomplishments.

We are in the education business as much as we are in the technology business. We see our job as providing you guidance, information and resources so you can make the best decision possible for your company. To do this, our team has to be on the cutting edge of a variety of solutions and products and demonstrate ongoing competencies in the latest technology and advances in the industry. So, this month, we invite you to celebrate with us in recognizing recent certifications renewed or newly earned by our staff. You can read more about the recent certifications in this month’s newsletter.

Also complementing to our team’s expertise is the recent addition Steve Mackrel as System Support Specialist within our Managed Service Practice and the Network Operations Center. Steve’s work ethic, degree in Information Technology, and years of experience in customer service and management make him a perfect fit for our team.

Finally, take a minute to read our new Customer Spotlight. This month’s feature focuses on how both Networking Technologies and Teceri have assisted Bonnell’s Auto Group in serving their customers and the Erie community. If you would be interested in having your company highlighted in future editions, please email marketing@net-cloud.com.

From all of us at Networking Technologies and Teceri,

James Bahm
President, Networking Technologies

AV vs IT: Disruption or Evolution?
Dr. Stephen Jenks Co-Founder /
Chief Scientist
August 04, 2017
Comparing traditional AV approaches with more IT-style approaches is important in understanding the evolution of content distribution technologies used for video walls and digital signage. A few examples are from Hiperwall technology for illustrative purposes, though the ideas are general enough to apply to other IT-based systems and technologies.

The purpose of the technology behind a video wall or a digital signage system is to get content (typically video and images) to the monitors or
projectors that make up the system. That technology may be simple or complicated depending on how many inputs and outputs are needed and how the content needs to be presented.
Read more →
Equifax Breach: What Should You Do to Protect
Yourself?
The big news this past month has been the Equifax breach.
On September 7, Equifax — a top credit reporting firm — announced that hackers stole consumer data from mid-May through July 2017, affecting 143 million people. Hackers stole customer names, Social Security numbers, birthdates, and addresses. A smaller set of consumers also had their credit card numbers and other documents taken.This is one of the largest data breaches in US history and the biggest known leak so far in 2017. The size of this breach has alarmed consumers and lawmakers, and Equifax has been highly criticized for its handling of the breach so far.Read more →
7 Tips to Prevent Ransomware
used with
permission from Norton by Symantec
Malicious software that uses encryption to hold data for
ransom has become wildly successful over the last few years.
The purpose of this software is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it. Ransomware, as it is known, scores high profile victims like hospitals, public schools and police departments. Now it has found its way into home computers.Read more →
Customer Profile: Bonnell’s Auto Group
Bonnell’s Auto Group has been a long-time customer of Networking Technologies, and after Teceri was established, Bonnell’s was one of the first clients on board, adding digital signage to some of their locations to better
communicate with their customers. We sat down with Chrystal
Waite, Office Manager/HR Administrator, at Bonnell’s recently to talk about their experience.Can you tell me about a few solutions that Networking Technologies and Teceri has offered over the years that stand out to you?
We decided to make a big change in our estimating software a few years ago. This change would merge us from using multiple programs, which everyone was used to, into one, web-based program with cloud storage. So, there was a lot involved with this switch.Read more →
Are Social Logins Safe to Use?
used with permission from Norton by Symantec

By now you’ve noticed you typically have two options to log in to an online account. One is the traditional username and
password combination. The other is the social login, which uses your credentials for a social networking account, such as Facebook, Google+, or Twitter.

Until recently the login method you prefer might have hinged on convenience. However, you may want to consider security and privacy before you click that “Log in with Facebook” button again.

Read more →

Start With Security – And Stick With It
used with permission from FTC.gov
by Thomas B. Pahl, Acting
Director, FTC Bureau of Consumer Protection

When it comes to data security, what’s  reasonable will depend
on the size and nature of your business and the kind of data you deal with. But certain principles apply across the board:

  • Don’t collect sensitive information you don’t need.
  • Protect the information you maintain.
  • And train your staff to carry out your policies.

The FTC’s Start with Security initiative was built on those fundamentals.

Read more →

 

Why Bother With Updates and Upgrades?

When was the last time you thought about software updates
and hardware upgrades? For many, updating software and hardware is not a priority because “If it ain’t broke, don’t fix it”. However, it’s clear that today’s cyber attacks prey on vulnerabilities present in old software and hardware. (This holds especially true for operating systems such as Microsoft Windows.)

It may not be “broke”, but it’s still old. “Working” does not mean “secure”.

Read more →

Windows 10 Tip: Three Ways to Get Started
With OneNote
used with permission from Microsoft
by Elana Pidgeon

Did you know with OneNote, you can easily create, revise and share notes — all in one place?

OneNote is a great way to collect important information from various sources and organize it for reference later, from thoughts and ideas to homework, meetings, and more!

Start by customizing your pens:

Read more →

 

Certifications and Specializations Fall 2017
on Sep 25, 2017
As an organization, we believe it is our responsibility not just to our organization but also to you, our customers, to ensure our team stays on the cutting edge. To this end, we put a strong emphasis on continuing education and certifications for our entire team, and we love to celebrate these accomplishments. We are in the education business as much as we are in the technology business. We see our job as providing you guidance, information and resources so you can make the best decision possible for your company. To do this, our team has to be on the cutting edge of a variety of solutions and products and demonstrate ongoing competencies in the latest technology and advances in the industry. Here are the most recent certifications and specializations earned by our team!

Read more →
Let’s Get Social
We are now providing customers with
regular posts on Twitter, LinkedIn and Facebook. Check us out!
Networking Technologies





Teceri





 

Monthly Quote

“The cure for boredom is curiosity. There is
no cure for curiosity.”


– Dorothy Parker

 

Monthly Cartoon