LATEST NEWS

THE LBP  SERVICE TEAM MET FOR OUR 1ST ANNUAL SUMMIT AT EMBASSY SUITES IN BEACHWOOD, OHIO!

2017 10 17

 

The meeting was two- fold, to enhance the comradery within the group while gaining tips to enable professional improvements in their daily routine. In addition, team members participated in team building events,  facilitated by Culture Shoc, where a variety of food, supplies and various needed items were donated to benefit the Ronald McDonald house.

CYBERINSURANCE , IS YOUR COMPANY READY?

2017 07 11

 

The single biggest challenge faced by insurance companies today is the lack of actuarial data on cyber-attacks which makes pricing these cyber insurance policies very difficult. As a result, insurance companies are increasingly resorting to other methods to assist them in more accurately pricing these policies which is good news for them 

 

 

HACKERS IDENTIFY 6 POORLY PROTECTED AREAS IN YOUR NETWORK COMMONLY ATTACKED

2017 03 21

 

Thousands of hackers travel to Las Vegas annually for the Social Engineering Village at DEF CON to learn about the latest in security research and techniques. Each year the village hosts talks and interactive lessons on human hacking. The following list of data points have been identified by the conference as the ones commonly targeted by hackers.

Canon ImagePROGRAF iPF 830/850 2017 Wide Format Line of the Year

2017 03 31

 

Continuing to build on the success of their impressive portfolio of products, Canon U.S.A., Inc. has once again earned BLI's coveted 2017 Wide Format Printer Line of the Year Award. This honor is testament to Canon's clear commitment to improving it's product line in both technical production/proofing sphere and high-end graphic arts markets,

Canon ImageRUNNER ADVANCE 8505i BLI 2017 Line of the Year

2017 04 01

 


For the second year in a row, Canon U.S.A., Inc. has won BLI’s A3 MFP Line of the Year award for the strength and breadth of its copier models.
“Canon’s A3 products continue to be consistently outstanding from top to bottom,” said George Mikolay, BLI’s Senior Editor for A3 MFPs. “An astounding misfeed rate of just one nearly every

 

 

LAKE BUSINESS PRODUCTS QUALIFIES FOR CANON AWARD

2017 03 27

 

Lake Business Products qualified as a member of the 2017 Canon Advanced Partner Program. The Canon Advanced Partner Program recognizes the best of the dealer community. Less than 10% of Canon authorized dealers qualify for this elite program. Qualified dealers provide the industry’s highest quality products with the highest quality service and

LAKE BUSINESS PRODUCTS WILL HAVE TWO REPRESENTATIVES AT THE CLEVELAND JOB FAIR ON TUESDAY, AUGUST 22, 2017!

2017 07 12

 

Are you looking for a job? Are you tired of sending resumes left and right and never getting an answer? If you are, dress in your best professional clothes, bring resumes and visit our Cleveland Career Fairs. You will have the opportunity to meet top employers and to interview for several positions

 

LAKE BUSINESS PRODUCTS IS NAMED  2017 SMART FAMILY BUSINESS ACHIEVEMENT AWARD HONOREE!

2017 09 07

 

Lake Business Products was started in 1960 by Jack Slattery in his Mentor home.  From a one-man venture, the business grew dramatically.  At present, we have a workforce of 150 including 50 service technicians.   To cope with the growth, Jack moved the business from his house to downtown Cleveland, then to different sites before

STATE OF CYBERCRIME 2017!

Security events decline, but not the impact

2017 11 07

 

Even as the average number of security events dropped year-over-year, events that resulted in a loss or damage rose, and fewer companies reported no losses.

 

The past year has been tough for enterprise security teams. Attacks like Petya and NotPetya suggest that the impact 

IoT DEVICES CAN BE HACKED AT ANY TIME

2017 11 06

Each internet-connected lightbulb is another entrance for hackers looking to break into your network.

  

A number of internet-connected devices are so lacking in even the most basic cybersecurity protocols that it's possible to hack them in as little as three minutes, allowing cyberattackers to