Letter from the President

Even though Punxsutawney Phil
predicted 6 more weeks of winter, we are enjoying these beautiful spring
temperatures and I am pleased to say that so far 2017
has been a pretty exciting year for all of us at Teceri and Networking
Technologies. I am proud to inform you that with our recent growth, we
have built a team like no other. We are enthusiastic each day moving
forward in providing our customers with continued support, services and
solutions. In looking to the next few months, we are branching out with
some of our Platinum partners to offer more educational seminars and
events in Erie, Buffalo and Cleveland. Also, our sales and service teams
are continuously attending training webinars and classes to stay current
and exceed certification standards.

As our goal is to always provide
positive IT outcomes, we welcome your questions, opinions and feedback
in all areas of our organization. Is there a new, cutting-edge product
you would like more information on? Is there an aspect of our services
and solutions that we could improve upon? Is there a topic that you
would like us to further discuss in our newsletter? We are here to serve
you and we greatly value your input. If there is any feedback that you
would like to provide us with, please feel free to contact me

As always, I would like to
personally thank you for reading the Networking Technologies Monthly

From all of us
at Networking Technologies and Teceri,

James Bahm
President, Networking Technologies

Protecting your SMB from a Cyber Attack
By Sara Lintz- Communications & Marketing Specialist at Teceri
and Networking Technologies

According to the
Cyber Security Alliance:

  • Almost 50% of small businesses have experienced a
  • More than 70% of attacks target SMALL businesses.
  • There’s a good chance (75%) your employees are leaving
    their computer unsecured.
  • When experiencing a cyber attack, a mere 28% of SMBs
    reported it to the authorities.

What exactly does that mean for your small business?
A breach or attack can result in a significant loss of income,
and if the attack goes public your brand, reputation and
customers can suffer.

Read more →

How to improve disaster recovery preparedness
used with permission from Microsoft US Small and Midsize
Business Blog

If you woke up tomorrow and ran a marathon, how would you
fare? It’s highly doubtful that you would successfully run the
26.2 miles without months of training, drills, and exercises.

The same is true for disaster recovery (DR): The chance
that you could successfully recover IT operations without having
exercised your DR plans on a regular basis is slim at best.

Read more →

Top Ten Cyber Security Predictions for 2017
used with permission from Norton by Symantec
by Nadia Kovacs

The Internet threat landscape was booming last year for cybercriminals. We
reported on 54 major events in 2016. And that’s not counting
the little stuff. The threat landscape shifted slightly in the
past year, and we have seen some new trends. However, some of
the older ones are sticking around and still going strong.

New Threat Predictions for 2017
Read more →


The Highways of Communication:
Network Cables and Structured

What are Networking Cables?
Networking cables are networking hardware used to connect one
network device to another network device or to connect two or
more computers to share information over multiple devices.

Different types of network cables, such as
coaxial cable, optical fiber cable, and twisted pair cables, are
used depending on the network’s physical layer, topology, and
Read more →

Ten Reasons To
Switch To IP-Based Video

Used with permission from Axis

From resolution and installation to intelligence and
integration, IP- based video is gaining popularity at an
alarming speed.
protecting your employees, customers, and organization,
implementing IP video surveillance is the way to go.
Some features of Axis
Communication video surveillance are:

  1. System management and storage can be handled remotely for
    24/7 accessibility
  2. IP-based systems allow room for expansion as your business grows
    and faces new challenges and opportunities
  3. With IP video your videos are safe from third-party
    manipulation with HTTPS encryption and VPN support

For more information on
how IP-based video surveillance can benefit your business, read
the full article

Azure Backup protects against ransomware
used with permission from Microsoft Secure Blog

According to the most recent CRN Quarterly Ransomware
Report, malicious infrastructure attacks increased 3500% in
2016 and the percentage is expected to increase in 2017. One
important way that organizations can help protect against losses
in a ransomware attack is to have a backup of business critical
information in case other defenses fail. Since ransomware attackers
have invested heavily into neutralizing backup applications
and operating system features like volume shadow copy, it is
critical to have backups that are inaccessible to a malicious

Read more →

3 Signs You Need Managed Services
reprinted with permission of HTS

If you’ve researched methods of taking care of your IT needs,
you’ve probably come across “managed services” or “managed IT
services”. What is it—and do you need it?

“Managed services” can be generally defined as “outsourcing
day-to-day management responsibilities […] for improving operations
and cutting expenses.”1

Read more →

Three new ways your business will use the cloud this year
used with permission from Microsoft US Small and Midsize
Business Blog

The cloud.

Yes, we get it. After years
of hearing “cloud, cloud, cloud” from our IT consultants and
tech geeks it’s sinking in. We see that cloud-based applications
perform well. They’re secure. They’re easy to access. They can
be updated faster and supported better by the software
developers that make them. The cloud is for real and we’re just
getting started.

Read more →

Networking Technologies Employee Highlight of the Month

Dave Smoulder – Service Manager (Teceri and Networking

Dave started as the Service
Manager for Networking Technologies in November of 2015. Prior
to his experience with Networking Technologies, Dave had 15
years of management experience in the Telecommunications
industry and 5 years in the manufacturing industry. He received
his Bachelor’s Degree in Business Administration from Gannon
University and his Master’s from St. Bonaventure University.

When he is not at the
office supporting our growing customer base, he is most likely
to be found on his boat on Chautauqua Lake during the spring and
summer months or at the Lake View Country Club trying to sneak
in a round or two of golf as soon as the temperature is above
40. He also has two daughters, Angela and Elizabeth. Elizabeth
is a sophomore in high school and Angela is finishing her
Bachelor’s degree in Accounting at Washington State University.

Never say no to an opportunity!

Monthly Cartoon


Win 2 tickets to the Erie Otters!


Teceri and Networking Technologies are giving away
two (2) tickets to the Erie Otters: Game 33 on
Tuesday March 14th! The deadline to enter is 4:00pm,
February 28, 2017. The winner will be selected at
random and notified March 1st via the email

Click here to enter!

Networking Technologies
814.836.0000  |

3910 Caughey Rd.
Suite 207 Erie, PA 16506  |  403 Main
St. Suite 411 Buffalo, NY 14203