Your Key to Communication

Teceri News

Read about the latest news from Teceri. Remember to follow us on Twitter and LinkedIn!

May 2017 Newsletter

May 1, 2017 in News

May 2017  |  In this issue…

What the Accounting Standards Updates Mean for IT
Five Ways to Give Your Business A Strategic Refresh
Office 365: Take Advantage of Office Anywhere
• News From Teceri: Three Reasons to Consider Digital Signage
Why You Need to Get Serious About Cybersecurity
The Top 5 Office 365 Features You Don’t Want to Miss
Employee Highlight of the Month
• Letter From the President

What the Accounting Standards Updates Mean for IT
In late February, the Financial Accounting Standards Board issued an Accounting Standards Update relating to leasing transaction reporting, which affects any business that leases assets. The ASU on leases will take effect for public companies for fiscal years, and interim periods within those fiscal years, beginning after Dec. 15, 2018. For nonpublic companies, the ASU on leases will take effect for fiscal years beginning after Dec. 15, 2019, and interim periods within fiscal years beginning after Dec. 15, 2020. For non-public, calendar year-end organizations, adoption will be Jan. 1, 2020, with retroactive application to previously issued annual financial statements for 2018 and 2019. All organizations can proceed with early adoption.

Read more →

Five Ways to Give Your Business A Strategic Refresh
used with
permission from Microsoft

Do any one of these five simple refresh ideas and you’ll
help yourself manage your business goals, growth, and execution. Do all five and you have a perfect lean business plan.

Refocus Strategy

Strategy is focus. It’s what you do and what you don’t do.
It’s who is in your market and who isn’t. It’s how you’re different, and you hope better, than your competition. Take a step back from the day-to-day details and look at the long-term course of your business. Don’t do a big text, but do write down your key strategy points in bullets, do use as reminders.

Read more →

Office 365: Take Advantage of Office Anywhere
used with
permission from SBA.gov
by Tim Berry

If you canvas what is being covered by the media and statements
made by technology vendors, you might come away with the notion
that we’re all just years—or even months—away from being able
to have our own personal artificial intelligence (AI) assistants,
and businesses will be able to enjoy off-the-shelf AIs that
they can train to perform various complex functions.

It is seductive to imagine downloading open source AI software
like Google’s Tensorflow or Microsoft’s CNTK and training it to perform trend analysis on sales over the last 2 years to identify your best customers. Or, use it to pore over customer service interactions and online forums to understand customer satisfaction.

Read more →

News From Teceri: Three Reasons to Consider Digital Signage
Whether you have an older slide-the-letters in sign, a bulletin board full of memos or no sign at all, your business may be missing opportunities that digital signage can afford. Is a digital sign worth the investment? The simple answer is ‘absolutely’. The longer answer includes hundreds of reasons but for brevity’s sake, we’ve boiled them down to the top three:

Visibility

Getting your messages to the public, to your employees or to your existing customers is essential in day-to-day operations. But, chances are, the messages your sending aren’t reaching your intended audiences. This is because the methods that we choose are often not a good match for the way people prefer to receive them. Our brains are wired for visual data, especially if that information is in motion. In fact, the recall rate from digital signage, which uses a combination of text, images and motion, is 83%, much higher than other traditional forms of communication like email. Digital signage allows our audiences to focus in a way that their brains appreciate.

Read more →

Why You Need to Get Serious About Cybersecurity
used with
permission from HP Technology at Work

More than half of small
and midsize businesses in the U.S. have suffered a cyber attack in the past year—but despite this frightening reality, very
few businesses are making IT security a priority this year. That’s a big mistake, because small business owners are at a
greater risk than they may think for data security problems and cybercrime.

Read more →

The Top 5 Office 365 Features You Don’t Want to Miss

Whether you are considering a move to Microsoft 365 or are
already there, you may be surprised to learn the sheer
number of resources that are available to support you – regardless of your position or knowledge level. It would be
impossible to detail everything provided through office.com, but we wanted to give you five of our favorites:

1. LinkedIn Learning for You and You Teams

Read more →

 

Networking Technologies Employee Highlight of the Month
Andy Almquist, Software Developer
Networking Technologies

For nearly a decade, Andy has served as a Software Developer with Networking Technologies where he views the customer’s satisfaction as
paramount. “If the customer isn’t happy, I’m doing something wrong,” he explains. He works with customers to understand what is important to them so he can develop an application that meets their needs, saves them time and makes their job easier in the process. He also works with customers on maintaining these custom solutions and making modifications to further enhance the user experience. Andy holds a degree in Computer Science and, prior to Networking Technologies, worked as a Developer at both Synctomi and Tiresias Coding Corporation. He has been recognized
as an inventor on two patents in computer security systems and methods and systems for establishing the identity of an originator of computer transactions.

Read more →

Letter from the President

Strategic planning is not just done once every five to 10 years, especially when it comes to IT. Strategic planning helps you think through the next few years so you are able to take advantage of existing opportunities, avoid pitfalls and spend resources wisely. Yes, there is a component of IT to any
organizational strategic plan, but the question is: Is your IT strategy
aligned with your business strategy or does your IT team have its own
strategic plan for the next few years? If your answer is ‘no’ or ‘it
needs updated’, the changes to the Financial Accounting Standards make this a perfect time to start the process.


As you may already know, the Financial Accounting Standards Board issued an Accounting Standards Update that will take effect in 2018. This
change will move both capital and operational lease type purchases to the balance sheet. Have you considered how these changes will affect your IT purchasing and management? For some businesses this will significantly impact the way capital and operational expenditures are managed, including IT products. I believe this change is the perfect time to begin discussions on what the next few years look like for your IT strategy. If your planning skills are rusty, you can check out this month’s article on
giving your business a strategic refresh. We’ve also provided an article on how the new Accounting Standards Update may affect your IT services.


Of course, we are always here to help as well with any questions you may have or solutions you need.


From all of us at Networking Technologies and Teceri,

James Bahm
President, Networking Technologies

Monthly Quote
“Clear thinking requires courage rather than
intelligence.”
– Thomas Szasz
Monthly Cartoon

 

Networking Technologies | Teceri Technologies
ERI 814.836.0000 | BUF 716.216.3104 | CLE 216.487.3104 | service@net-cloud.com
3910 Caughey Rd. Suite 207 Erie, PA 16506 | 403 Main St. Suite 411 Buffalo, NY 14203

April 2017 Newsletter

April 14, 2017 in News

April 2017  |  In this issue…

• What is the Cloud and How Can it Benefit You?
Teceriology: What You Need to Know About Voice and Conferencing
Wanted: Smart Humans
• How to Create an Effective Cyber Hygiene Program
Six Imperatives to Future Proof Your Digital Business
Azure Backup Protects Against Ransomware
Employee Highlight of the Month
• Letter From the President
• Upcoming Events

What is the Cloud and How Can it Benefit You?
As a kid, I used to make a tin can telephone by tying a string
to each of two soup cans. When two tin cans are connected, you can send and receive sound waves. Imagine, for a moment, that this tin can string spans the width of your office. Two of your employees need to communicate through the tin cans, so they build the connection. A third employee is invited to “join the call”, so he ties his tin can to the string of the first two cans. Then a fourth employee ties his string, then a fifth, and so on. This concept is the very foundation on which the Internet works: sending and receiving information over a wire (in the tin can example, sound waves).Read more →

What You Need to Know About Voice and Conferencing
Used with permission from Cisco

Combining your company’s voice and data systems makes it easier to keep in touch and share information. By unifying your business’ phone and computer network, team members can easily find each other, wherever they are, and customers and prospects can be quickly routed to the best resources.

As your business grows, IP based communications technology lets you add new employees, remote offices and teleworkers with minimal effort and expense. At each step, your team has the communications tools it needs to help your business succeed.

Read more →

Wanted: Smart Humans
used  with permission from IBM Big Data & Analytics Hub
by Greg Council

If you canvas what is being covered by the media and statements made by technology vendors, you might come away with the notion that we’re all just years—or even months—away from being able to have our own personal artificial intelligence (AI) assistants, and businesses will be able to enjoy off-the-shelf AIs that they can train to perform various complex functions.

It is seductive to imagine downloading open source AI software like Google’s Tensorflow or Microsoft’s CNTK and training it to perform trend analysis on sales over the last 2 years to identify your best customers. Or, use it to pore over customer service interactions and online forums to understand customer satisfaction.

Read more →

How to Create an Effective Cyber Hygiene Program
used with permission from the Microsoft Secure Blog
by Ann Johnson, Vice-President, Enterprise Cybersecurity Group

As noted in the 2016
Verizon Data Breach Incident Report
, 63% of confirmed breaches
involved leveraging weak, default or stolen passwords, 30% of
phishing messages were opened in 2015, and 12% of targets clicked on the malicious attachment or link. Given this, organizations
of all types can make significant gains in their security posture by educating their user base on best practices for digital engagement and cyber hygiene.

Read more →

Six Imperatives to Future Proof Your Digital Business
used with the permission of  http://thenetwork.cisco.com
by Ruba Borno

Technology is driving business strategy as never before, and the competitive landscape is changing with each innovation.  Companies need a new approach to IT that can keep pace with
the evolution of IoT, automation, augmented reality, virtual reality, massively distributed computing, software analytics — and the vast increases in complexity brought about by these shifts.

Read more →

 

Azure Backup Protects Against Ransomware
used with permission from Microsoft Secure Blog

According to the most recent CRN Quarterly Ransomware Report, malicious infrastructure attacks increased 3500% in 2016 and the percentage is expected to increase in 2017. One important way that organizations can help protect against losses in a ransomware attack is to have a backup of business critical information in case other defenses fail. Since ransomware attackers have invested heavily into neutralizing backup applications and operating system features like volume shadow copy, it is critical to have backups that are inaccessible to a malicious attacker.

Read more →

Networking Technologies Employee Highlight of the Month
Jeff Duwe, Cleveland Technician
Networking Technologies

For more than 30 years, Jeff Duwe has served the Cleveland area
in a variety of capacities in integrated IT. Networking Technologies was
lucky enough to bring him on board in 2012 to serve as the technician
for our Cleveland market. Before starting at Networking Technologies, Jeff served as Pre- and Post-Sales Engineer at Integrators of New Systems, LLC, in Cleveland, and as a Field Services Engineer for Digital
Equipment Corporation, Compaq and Hewlett Packard.

Read more →

Letter from the President

A recent survey indicated that nearly half of top-level managers believe
cloud computing would revolutionize the way they do business. The
research also showed that the number of businesses transitioning to the
cloud is increasing. We have seen this growing trend in our region with
a steady uptick in the number of businesses asking us to assist them
with planning and implementation of a cloud migration. These businesses
range from small businesses to large enterprise operations. In fact, we
just met with a 65,000-employee business that transitioned 85% of its
data to the cloud. But, we also know that many companies haven’t started the process. Hesitation with new systems and technology is understandable – it’s a significant business decision; however, hesitating to the point of not moving forward could cost your business revenue in inefficiencies and lost collaboration opportunities. That’s why I want to encourage you to talk to us about your hesitations with cloud computing; we are happy to educate you and provide resources to alleviate your fears. I also encourage you to check out the article in this month’s newsletter on cloud technologies and how it can benefit your company.

We are hosting and attending a variety of educational opportunities for you in April—we hope you’ll join us! Check out our events listing in this month’s newsletter and other events on our events page.

Also, remember to watch your email in the next few weeks for a short (less than five minute) survey. You will receive a free webcam cover for taking time to complete it – we sincerely appreciate your feedback!

From all of us at Networking Technologies and Teceri,

James Bahm
President, Networking Technologies

Monthly Quote
“If you don’t like something, change it. If
you can’t change it, change your attitude.”
– Maya Angelou
Monthly Cartoon

 

Lunch & Learn Event
Join us at our upcoming Lunch & Learns

Attendees at all of our April Lunch & Learns will be entered to win an Amazon Echo. You must be present to win!

HPE 3PAR and Veeam
Don Lind, Senior Storage Solution Architect with HPE, will be discussing the HPE 3PAR and Veeam relationship and how your business can benefit from implementing their storage / backup solutions.

April 18 | 11:30-230 p.m.
Maritime Museum – 150 E Front St #100
Erie, PA 16507

HPE SimpliVity and Aruba
Do you know who or what devices are on your network at any given time? Are
you able to profile every device on your network at any time and automatically place each device into a secure policy and role regardless of whether it’s a guest, a BYOD worker or an IoT device that may or may not support 802.1x authentication? If you answered ‘no’ to either of these questions, HPE Aruba Networks may be your solution. Join HPE experts as they talk about Aruba Networks and Hyperconverged with SimpliVity – the most complete hyperconverged solution in the market today that combines all infrastructure and advanced data services—including guaranteed data efficiency, built-in data protection, and VM-centric mobility.

BUFFALO
April 25 | 11:30-2:00 p.m.
SEAR Steakhouse – 200 Delaware Ave.
Buffalo, NY 14202

ERIE
April 26 | 11:30-2:00 p.m.
Sheraton Erie Bayfront Hotel – 55 West Bay Dr.
Erie, PA 16507

Click here to register for any of these events.

Networking Technologies | Teceri Technologies
ERI 814.836.0000 | BUF 716.216.3104 | CLE 216.487.3104 |service@net-cloud.com
3910 Caughey Rd. Suite 207 Erie, PA 16506 | 403 Main St. Suite 411 Buffalo, NY 14203

February 2017 Newsletter

February 23, 2017 in News

 

Letter from the President

Even though Punxsutawney Phil
predicted 6 more weeks of winter, we are enjoying these beautiful spring
temperatures and I am pleased to say that so far 2017
has been a pretty exciting year for all of us at Teceri and Networking
Technologies. I am proud to inform you that with our recent growth, we
have built a team like no other. We are enthusiastic each day moving
forward in providing our customers with continued support, services and
solutions. In looking to the next few months, we are branching out with
some of our Platinum partners to offer more educational seminars and
events in Erie, Buffalo and Cleveland. Also, our sales and service teams
are continuously attending training webinars and classes to stay current
and exceed certification standards.



As our goal is to always provide
positive IT outcomes, we welcome your questions, opinions and feedback
in all areas of our organization. Is there a new, cutting-edge product
you would like more information on? Is there an aspect of our services
and solutions that we could improve upon? Is there a topic that you
would like us to further discuss in our newsletter? We are here to serve
you and we greatly value your input. If there is any feedback that you
would like to provide us with, please feel free to contact me
directly.


As always, I would like to
personally thank you for reading the Networking Technologies Monthly
Insight.

From all of us
at Networking Technologies and Teceri,

James Bahm
President, Networking Technologies

Protecting your SMB from a Cyber Attack
By Sara Lintz- Communications & Marketing Specialist at Teceri
and Networking Technologies

According to the
National
Cyber Security Alliance:

  • Almost 50% of small businesses have experienced a
    cyberattack.
  • More than 70% of attacks target SMALL businesses.
  • There’s a good chance (75%) your employees are leaving
    their computer unsecured.
  • When experiencing a cyber attack, a mere 28% of SMBs
    reported it to the authorities.

What exactly does that mean for your small business?
A breach or attack can result in a significant loss of income,
and if the attack goes public your brand, reputation and
customers can suffer.

Read more →

How to improve disaster recovery preparedness
used with permission from Microsoft US Small and Midsize
Business Blog

If you woke up tomorrow and ran a marathon, how would you
fare? It’s highly doubtful that you would successfully run the
26.2 miles without months of training, drills, and exercises.

The same is true for disaster recovery (DR): The chance
that you could successfully recover IT operations without having
exercised your DR plans on a regular basis is slim at best.

Read more →

Top Ten Cyber Security Predictions for 2017
used with permission from Norton by Symantec
by Nadia Kovacs

The Internet threat landscape was booming last year for cybercriminals. We
reported on 54 major events in 2016. And that’s not counting
the little stuff. The threat landscape shifted slightly in the
past year, and we have seen some new trends. However, some of
the older ones are sticking around and still going strong.

New Threat Predictions for 2017
Read more →

 

The Highways of Communication:
Network Cables and Structured
Cabling
Written by Sara Lintz, Communications and Marketing Specialist

What are Networking Cables?
Networking cables are networking hardware used to connect one
network device to another network device or to connect two or
more computers to share information over multiple devices.

Different types of network cables, such as
coaxial cable, optical fiber cable, and twisted pair cables, are
used depending on the network’s physical layer, topology, and
size.
Read more →


Ten Reasons To
Switch To IP-Based Video

Used with permission from Axis
Communications

From resolution and installation to intelligence and
integration, IP- based video is gaining popularity at an
alarming speed.
When
protecting your employees, customers, and organization,
implementing IP video surveillance is the way to go.
Some features of Axis
Communication video surveillance are:

  1. System management and storage can be handled remotely for
    24/7 accessibility
  2. IP-based systems allow room for expansion as your business grows
    and faces new challenges and opportunities
  3. With IP video your videos are safe from third-party
    manipulation with HTTPS encryption and VPN support

For more information on
how IP-based video surveillance can benefit your business, read
the full article
here.

Azure Backup protects against ransomware
used with permission from Microsoft Secure Blog

According to the most recent CRN Quarterly Ransomware
Report, malicious infrastructure attacks increased 3500% in
2016 and the percentage is expected to increase in 2017. One
important way that organizations can help protect against losses
in a ransomware attack is to have a backup of business critical
information in case other defenses fail. Since ransomware attackers
have invested heavily into neutralizing backup applications
and operating system features like volume shadow copy, it is
critical to have backups that are inaccessible to a malicious
attacker.

Read more →

3 Signs You Need Managed Services
reprinted with permission of HTS


If you’ve researched methods of taking care of your IT needs,
you’ve probably come across “managed services” or “managed IT
services”. What is it—and do you need it?

“Managed services” can be generally defined as “outsourcing
day-to-day management responsibilities […] for improving operations
and cutting expenses.”1

Read more →

Three new ways your business will use the cloud this year
used with permission from Microsoft US Small and Midsize
Business Blog

The cloud.

Yes, we get it. After years
of hearing “cloud, cloud, cloud” from our IT consultants and
tech geeks it’s sinking in. We see that cloud-based applications
perform well. They’re secure. They’re easy to access. They can
be updated faster and supported better by the software
developers that make them. The cloud is for real and we’re just
getting started.

Read more →

Networking Technologies Employee Highlight of the Month

Dave Smoulder – Service Manager (Teceri and Networking
Technologies)

Dave started as the Service
Manager for Networking Technologies in November of 2015. Prior
to his experience with Networking Technologies, Dave had 15
years of management experience in the Telecommunications
industry and 5 years in the manufacturing industry. He received
his Bachelor’s Degree in Business Administration from Gannon
University and his Master’s from St. Bonaventure University.

When he is not at the
office supporting our growing customer base, he is most likely
to be found on his boat on Chautauqua Lake during the spring and
summer months or at the Lake View Country Club trying to sneak
in a round or two of golf as soon as the temperature is above
40. He also has two daughters, Angela and Elizabeth. Elizabeth
is a sophomore in high school and Angela is finishing her
Bachelor’s degree in Accounting at Washington State University.

Never say no to an opportunity!

Monthly Cartoon

 

Win 2 tickets to the Erie Otters!

 

Teceri and Networking Technologies are giving away
two (2) tickets to the Erie Otters: Game 33 on
Tuesday March 14th! The deadline to enter is 4:00pm,
February 28, 2017. The winner will be selected at
random and notified March 1st via the email
provided.


Click here to enter!

Networking Technologies
814.836.0000  |

service@net-cloud.com
  |
716.216.3104
3910 Caughey Rd.
Suite 207 Erie, PA 16506  |  403 Main
St. Suite 411 Buffalo, NY 14203