Blog

Accent Imaging’s Charlotte Location

Accent Imaging, Inc. has expanded with the addition of a new location, opening Tuesday, November 12th at 920 Blairhill Road, Suite B 115, Charlotte, NC 28217.

Mike Stodder, Owner and President of Accent Imaging, comments that, “Accent Imaging has proudly served the North Carolina Triangle region and beyond for over 35 years. We have also been developing a large base of customers in the Charlotte area for some time now. We are excited to be opening a location in Charlotte to enhance the services we offer to those clients as well as new clients. Charlotte is a prosperous city with a lot of opportunity. We’re extremely enthusiastic about our expansion into that market.”

Established in 1984, Accent Imaging, Inc. has been proudly serving the business community as a leading technology solutions provider. Our company offers the highest quality and most technologically advanced products on the market today from brands such as Canon, HP, KIP, Brother and Leica. Accent Imaging’s print, graphics and digital media services are available from our Accent Corporate Graphics division. Top-of-the-line office technology, services, and IT solutions are available from our Accent Office Automation division. Accent Imaging strives to be your full-service provider for all your print and office technology needs.

Accent Imaging’s new Charlotte facility is located right off I-77 South and will be open from 8am until 5pm, Monday through Friday.

Canon Emerges as #1 A3 Copier/MFP U.S. Market Share Leader

Demonstrating a dedicated commitment to developing office advancements, Canon U.S.A., Inc., a leader in digital imaging solutions, emerges as the #1 market share leader in three U.S. A3 Copier/MFP market segments in the IDC Quarterly Hardcopy Peripherals Tracker. The Company is the only manufacturer to place in the top three in every A3 and A4 market segment in the IDC tracker.

“As offices look to restructure and automate their workflow processes, Canon continues to develop advanced digital imaging solutions that incorporate nextgeneration technologies to support the future of work,” says Keith Kmetz, programvice president, Imaging, Printing & Document Solutions, IDC. “The company’s smart MFP portfolio is a testament to that.”

Canon emerged as the market leader across three categories: 2017 Total A3 U.S. Copier/MFP (monochrome and color), 2017 Total U.S. A3 Copier/MFP(monochrome), and 2017 Total U.S. A3 Copier/MFP (color). Canon’s evolving imageRUNNER ADVANCE color and monochrome solutions incorporate an array of security features as standard and also support cloud connectivity. Canon also provides horizontal- and vertical-specific workflow solutions built around NT-ware’s uniFLOW, Nuance’s eCopy ShareScan, and Therefore solutions. Strategic partnerships with Box and mxHero further help Canon to provide its end users with the flexibility to help foster collaboration in the workforce, while offering document security features.

“We will continue to exemplify our market intelligence in delivering advanced document imaging solutions to market,” says Toyotsugu Kuwamura, executive vice president and general manager, Business Imaging Solutions Group, Canon U.S.A., Inc. “We are honored to emerge as a clear market leader in the latest IDC U.S. HCP Tracker results.”

Source: PRNewswire/ Canon

To request a quote for a Canon MFP click here…

5 Ways to Protect Your Construction Business Against Cybersecurity Threats

Admit it—you’ve clicked on a questionable link, answered an unnecessary online survey, or been too lazy to update an app. Everyone’s done it. If you’re feeling a bit queasy about these lapses in cybersecurity judgment now, imagine if one of these errors cost your construction business millions of dollars. What if responding to an illicit email put you and all your colleagues out of work?

These worst-case scenarios do happen in the real world, from high-profile breaches like those at Uber, Equifax, and Target to hackers defrauding small to midsize construction companies every day. In fact, the Target breach was the result of security credentials stolen from a third-party HVAC subcontractor.

Perhaps that well-publicized cybersecurity breach has led cybercriminals to view construction firms as easy targets. But according to technology expert Ashkan Soltani—consultant at Soltani LLC and former chief technologist at the Federal Trade Commission and senior adviser at The White House—it depends on the risk profile.

“Say you’re building a bank: By virtue of operating for that client, you’ll have a higher threat or risk profile,” he says. “Every so often, you may have an expensive or high-value client, so you might need better operational security.”

Soltani says that considering risk is a little like protecting a car against theft: “Do you have a car alarm on your car? Do you have a club for the steering wheel? Perhaps if you live in a really sketchy area where car theft is high, and you have an expensive car, you’d take extra precautions. The same concept is true for businesses. Know your own risk and figure out where you need to invest.”

In 2016, Construction Dive reported a 400 percent increase in ransomware attacks on the construction industry over the previous year. And a survey by researchers at the University of Bolton in the UK found that 70 percent of respondents agreed: “People need to take BIM’s security more seriously.” Add the already rampant use of more traditional fraud against architecture, engineering and construction companies, and it becomes a matter of when, not if, your company will be threatened by a hacker.

While no security is foolproof, all construction companies can take steps right now to help thwart cybersecurity attacks. Here are five things your firm can do to protect its data and systems.

1. Don’t Let Your Receptionist Be Too Nice

The media portrayal of a hacker is usually some vitamin-D-deprived loner using his modem to penetrate your digital systems through screens of code. The truth is, most hacks include at least a component of social engineering. Bits of banal information given out by a friendly employee on the phone can be used to trick others into allowing in nefarious code online.

“Social engineering is always the weakest link,” Soltani says. “Bad actors or hackers may go after the receptionist or junior associate. Make security a priority and provide Internet-safety training just like you provide job-site-safety training.”

2. Don’t Skimp on Your Email System

Most folks are smart enough to recognize obvious phishing scams. But what if the email comes from a colleague, a partner, or even the CEO of your company? Those attacks are called “spear phishing” and can be enabled by using discount email services that are hijacked to send fake emails from seemingly legitimate accounts.

In a notable case this year, scammers used what appeared to be a legitimate email account from contractors Adolfson & Peterson Construction to trick the Boulder Valley School District into transferring $850,000 to a fake bank account. Think that’s bad? A similar scam in Edmonton, Canada convinced MacEwan University to transfer nearly $12 million dollars to bank accounts supposedly belonging to Clark Builders.

The question is, which kind of email service is most secure: a private server in your office basement, a server you lease and manage from a data center off-site, or a cloud-based email system?

“A lot of people are worried about cloud email because the provider can read the email,” Soltani says, “but are you worried about Google reading your email or hackers in the Ukraine reading it? If it’s the latter, I think cloud-storage solutions with strong security features turned on—such as two-factor authentication—are the way to go. Cloud-based companies are monitoring and protecting their systems from millions of users.” Take extra steps to protect your credentials on cloud-based source-control systems, as well.

3. Consider Hiring an In-House Security Expert

Maintaining IT personnel is expensive, and your company has tight enough margins when trying to win competitive bids. But failing to secure your data can result in losses that could bankrupt your company—and even result in criminal complaints by the FTC.

“The question is, is security enough of an issue to merit the CIO hiring a junior admin who is sole-tasked with security?” Soltani asks. “Whatever that salary is, say $100,000 a year, is it worth it to your firm to invest in that? If the answer is yes, you hire that person and make him or her responsible for implementing solutions to address your security risk, such as patching systems or setting up VPNs for people when they’re working with client data at Wi-Fi hot spots.”

If you’re not ready to hire full-time IT staff, you need to at least work with an expert who can help you navigate rapidly changing cybersecurity threats. A 2016 report by DHG Assurance Services recommends contracting the services of an IT adviser with CISSP, CCE, CISA, CRISC, and GCIH certifications. And check out this comprehensive Start With Security best-practices guide from the Federal Trade Commission.

4. Limit the Number of Admins

Another area where companies compromise security for convenience is giving too many employees admin-level access. This can become especially problematic, as networked systems like BIM grant access to your intellectual property remotely and throughout many third-party stakeholders.

“Say I’m a hacker looking for access to a company’s servers: If only one person has the passwords, I try my attack on that person, and it doesn’t work, all bets are off,” Soltani says. “But if there are 20 people who have admin access, I just need to use one of them to give me access.”

To guide against circulating too many keys to the castle, a report [PDF] from the Institution of Engineering and Technology offers a set of BIM protocols that include appointing an information manager who is “responsible for managing the CDE [Common Data Environment]; managing project information; and supporting collaborative working, information exchange, and the project team.”

5. Always Update Your Software

Cybersecurity is an ever-evolving threat, and new technology (such as IoT sensors and smart locks) will introduce new security issues. It’s crucial that whatever software you use, you regularly update it to ensure the latest security holes are patched. It can be a time-consuming affair, especially if an update breaks some functionality you’ve come to rely on, but security is the priority.

“A lot of software updates aren’t just feature updates,” Soltani says. “They fix bugs and, more importantly, security bugs. For example, when you get an iOS update, if you look closely, you’ll read that Apple is fixing some sort of attack that someone found. And once that attack is known, everyone knows it’s an attack, so if you don’t patch it, your system is vulnerable.”

SOURCE: Joshua Glazer, Autodesk

For information on how Accent Imaging’s Network Security and IT Solutions can help you secure your business against cybersecurity threats click here >