Skip to main content

MFP Copier Blog

Reps: Start using the ‘F-word’

Note from Art:  in the past few months, I've been pushing our sponsors to get more involved with blogging on the site with informative information that will help us SELL MORE and understand new technologies.

 

Right now, UDOCX (Fenestra), Protected Trust and Muratec America are posting blogs for us. I hope this spreads to all of our sponsors because there is some great data/information that we can all use.   So, here Andrew Jones with a blog about the "F-Word". Enjoy!!!  I put the copier part in below!

 

Copier Reps: Start using the ‘F-word’

 

Andrew Jones, Muratec America, Inc.

 

The ‘F-word’ gets a bad rap. Reps avoid using it at all costs when talking with prospects. Truth is, millions of businesses use the ‘F-word’ every day. According to RingCentral, a cloud based phone systems provider, there are currently more than 17 million fax machines in use in the United States. If that’s the case, why do reps always ignore the fax machine? As George Bluth, Sr. [probably] said, “there’s always money in the fax machine.”

 

          John Darlington, Muratec’s area sales manager for the southeast, recently delivered a webinar on how reps can leverage voice over IP (VoIP) into a sales opportunity. In his presentation, John highlighted the differences between a company’s copier lease and their analog phone bill. It’s often difficult to ask, and even harder to obtain, a prospect’s copier lease agreement. However, the phone bill is a different story. The phone bill is viewed as a “cost of doing business”—similar to rent and electricity. Gaining access to this information is often much easier and less risk to obtain than your prospect’s lease agreement.

 

As a rep, when you sit down with a prospect, about what percentage of the time do you lead with your proposed solution’s fax features? Not very often, right? Although proposing a fax solution is often not top of mind, it should always be an issue you address during your initial meeting with a prospect.

 

When you stumble across an organization with one of those 17 million fax machines, Muratec MFPs with Email Gateway can add value and save your customer money by enabling them to eliminate their analog fax lines, which on a national average cost $50/per month/per line. How can you help? It’s pretty simple.

 

Third party faxing companies, such as eFax, MetroFax and RingCentral, receive their customers’ inbound faxes and convert them to emails as PDF and/or TIFF attachments. So, how do you know whether your prospect uses a third party faxing company? Well, there are several schools of thought on this particular subject. We’ve found the most effective method is to ask. If they don’t know, which can often be the case, ask leading questions, such as, “Tell me how you send a fax”? or “Where do you receive your faxes”? If email is involved in any way, shape, or form, chances are, your prospect uses a third party faxing company.

 

Other good indicators your prospect might have a third party faxing system include:

  • Companies with VoIP phone systems. If they’ve modernized their phone system, chances are, they’ve done something with their faxing, too.
  • They receive faxes directly to their email and don’t print
  • Organization with multiple locations. Larger companies’ analog fax line spend is multiplied based on the number of locations, and fax lines aren’t cheap.

 

So, what does all this mean for you, an office equipment sales representative? It allows you to sell value, not just on price. Sending a fax using a third party faxing company can be time consuming and a multi-step process, which often negates the fax line cancellation savings with labor increases (i.e. an employee walking to scanner, scanning the hard copy document back to his or her computer, open his or her email, composing email, attaching file, etc.) What if you could enable the customer to send a fax by simply entering the fax number and pressing [Start], without jumping through multiple hoops?

 

Muratec’s Email Gateway, included in the MFX-3510, MFX-3530 and MFX-3590, among other models, when configured with the third party faxing solution’s suffix, or domain name, transparently converts an “outbound fax” into an email that the third party faxing solution recognizes. So, with Email Gateway, the age old process of walking to the fax machine, dialing a number and pressing ‘Start’ stays the same.

 

Reps, let’s take the stigma out of using the ‘F-word’. Email Gateway could realistically be the differentiator that allows you to win your next deal. It’s all about asking the right questions to uncover all your prospects’ needs. Just give fax a chance.

 

-=good Selling=-

 

 

 

 

BTA Grand Slam 2014 Kicks off in Baltimore

So, so glad I came down on Saturday with the wife to Baltimore.  We arrived about 2PM, checked in to the Marriot (which is right across the street from Camden Yards) and were pleasantly surprised that this was the week for The Star Spangled Banner Event!!!

 

A huge fireworks show on Saturday was then followed up with an awesome Blue Angel Air Show on Sunday!  Awesome weekend!

 

BTA Grand Slam Event started at 2:45PM, our Key Note speaker was Scott Maccabe with Toshiba America Business Solutions.

 

Here's a few takeaway points that tweeted earlier:

 

  • 5 years half of mobile users will use mobile wallets as their preferred payment method
  • 1 in 3 shoppers use their smartphones to find information instead of asking store employees
  • mobile is now the most favored platform for media consumption
  • 50 percent of users indicate mobile is primary means of getting on line.
  • Gartner shows print volume at 3% decline a year

Thus, Digital Signage was yet another avenue that dealers could travel to diversification of their products and offerings. 

 

I've always been intrigued with the business model of Digital Signage. I'm still trying to figure out if there is an on going revenue stream once the piece of hardware is sold and the system has been installed.

 

One of the points made about Digital Signage is that tremendous amounts of data can be stored in the signage for users to access.  One model was that of a car dealership.  In essence a customer could come in and find out everything they need to know about the new car. Choose colors, choose options, choose delivery and even place an order.  Scott stated that car dealerships are a prime example because of the high turnover of sales people!.  I thought, dang, we have the same turnover or more in the copier business. 

 

I thought the keynote address was informative and gave dealers options for diversification.

 

-=Good Selling=-

 

 

 

A Broad Scope of Health Care Data Security

The health care security arena has become more complex and challenging in recent years, driven by all different types of stressors, pain points, new technologies, compliance overhauls and more. In many ways, patient information has been widely viewed as the most sensitive data around, especially because of the more substantial risks that come with exposure, loss and fraudulent manipulation.

 

For example, whereas financial data would generally only be used to steal money directly from an account - which is still serious - medical records often contain this type of information along with actual patient histories. In a worst-case scenario, the thief could commit medical fraud, compromising the record and potentially putting the patient at risk of getting the wrong treatment the next time he or she goes to a hospital.

 

The Health Information Portability and Accountability Act (HIPAA) was launched with the specific purpose of protecting patients from the dangers that abound on the World Wide Web, holding medical organizations accountable for their actions. The Health Information Technology for Economic and Clinical Health Act (HITECH), on the other hand, pushes medical organizations to begin using advanced tools and data management systems such as electronic health records.

 

While these compliance statutes have balanced out a bit, several experts in the IT security community have continued to assert that health care providers are the most at risk of experiencing a major breach, more so than any other industry. To understand why simple deployments such as HIPAA email and more complex ones like new data center services are so important, it might help to know what the sector is working against.

 

The mobile challenge Mobihealthnews recently reported that officials from the Federal Trade Commission further stressed the importance of securing mobile devices and applications that are used in hospitals or for medical purposes in any way. At times, it is somewhat difficult to tell which applications will pose a risk to privacy protection and security, but medical organizations must remain vigilant when working through policy improvement.

 

FTC Commissioner Julie Brill, speaking at a recent event, explained that data privacy and security has been further complicated by the rapid proliferation of new applications that are used for a variety of medical-related functions.

 

"We did a study of about 12 devices and apps and it turned out about 76 entities were receiving information off these apps and devices," Brill affirmed, according to Mobihealthnews. "And it wasn't just things like UDID (the iPhone's unique identifier) and geolocation and whatnot. That was being collected, but it was also information about the consumer's health. One was a pregnancy app and it was the time in which the woman was ovulating, and it was being collected by third parties."

 

Diving further into the broad challenges facing both the regulatory community and health care providers themselves, the source pointed out that the speed with which laws are passed and standards communicated is generally slower than the proliferation of threats. "The law is, on some level, always going to lag behind technology," she said. "Technology is moving at lightning speed. Our job at the commission is to try to instill in communities like the app community, and like the developer community - with respect to platforms and with respect to new technological systems - that there are fundamental consumer protection rules that need to apply and that they need to think about as they move forward at lightning speed." Data centricity? Although the FTC, many experts and other regulators have stressed the importance of securing apps, systems and devices, CSO Online recently reported that taking an entirely data-centric approach might represent the future of digital protection. Considering the fact that data is the actual asset companies are trying to protect in their other security deployments, working to shore up defenses specific to information may just be the perfect medicine.

 

According to the source, when experts gathered at a conference in Boston, there were strong arguments on either side of the discussion, with some attendees pointing out that there must always be protections in place for networks, equipment and the like. However, from the data-centric side, it might be wise to first find ways to protect information in storage and in transit before expanding outward.

 

Who says it has to be one or the other, though? Rather than taking a narrow and tunnel-vision approach to IT security, organizations, especially those operating in health care, must be able to be a bit more comprehensive in their deployments and capabilities. After all, hackers rarely try to break into well-protected aspects of infrastructure, and instead work to identify vulnerabilities and capitalize on them accordingly. Organizations should consider using email encryption and data center services from a provider that can cover HIPAA compliance needs and reduce the overall risk the company faces.

 

David Bailey is Senior Vice President at Protected Trust. 

Protected Trust is a sponsor of the Print4Pay Hotel. I urge members and readers to visit their site to see their full line of products and services.  More and more we need to provide well rounded strategic solutions for our customers. Protected Trust offers some unique solutions that can help us in our day to day efforts. Check them out here.

 

Prospecting, Why You Can't Ever Stop Doing It!

I'm sitting outside of the Marriot Hotel, which is a stones throw from Camden Yards. 

 

I watched and listened to four different guys selling tickets for tonight's SOLD OUT game.  Yankees vs Orioles and Derek Jeter plays his last game in Baltimore.   If you're a Yankee fan and in you're in the area, it's a must see game, right?  

 

So, I'm watching some guys hawking the tickets and making sure they touch everyone that walks by. 

 

In my case, I was kinda interested in some tickets.  Guy started at $80  bucks each, told him I'm not a Yankee fan.  I stated I wanted them for $5 bucks each (seeing it was 10 minutes before game time).  He dropped back to his value points of SOLD OUT game, the last game for Derek Jeter in Baltimore.  I then told him I was a MET fan and none of that is a big deal to me.  In the end he dropped to $15 each, and I walked away.  No big deal for me.  I then saw him sell those same two tickets to the someone else for $80 bucks each. 

 

In the end, the guy prospected enough people to get the price he wanted. But, he would have sold me the two tickets for $15 each, instead of the $80 he was looking for. I turned to my wife and stated he probably sold quite a few at the $80 and the reason he dropped is because he had already made his profit on the ones he sold and the rest of the tickets would be additional gravy for him.

 

I respect the guy because he was hawking everyone, he had a job to do (sell the tickets) and he left no stone unturned. 

 

There are times, when we get to the end of the month, the quarter or the year when we need to leave no stone unturned.  The more we prospect, the more sales we'll sign.  When it comes to price, I think in this day and age there are some deals where we'll be able to hold margin and other deals that we won't or can't.  Identifying which deals we can and can't will help you close more deals. 

 

-=Good Selling=-

This Week in the Copier/Office Equipment Industry 10 Years Ago Second Week of September 2004

This week in 2004.  Hurricane Ivan, still at Category Five strength, continues to travel northward, causing damage throughout the western Caribbean. As of 23:00 local time (0300 UTC September 13), it is located about 285 km (175 miles) southeast of the western tip of Cuba, and it is predicted that the eye of Ivan will pass over that part of the island Monday afternoon or evening.

 

 

Check out these threads from tens years ago this week on the Print4Pay Hotel forums!

 

          9/13/04 11:06 AM
 
          Reply by Neal Neal is offline. Click for Member Snapshot.
          here's the one from Gestetner
 
          9/13/04 8:12 PM
 
          Topic by Guest
RICOH CORPORATION PROVIDES ALL-IN-ONE DESKTOP SOLUTION WITH THE INTRODUCTION OF THE AC204 AC204 Receives Better Buys for Business Editors Choice Award for Low-Volume MFP West Caldwell, NJ, September 08, 2004  Ricoh Corporation, the leading provider of
 
          9/11/04 3:02 PM
 
          Topic by Guest
          We have talked about this before, this is an example of a chargeable call, if your customer updates to SP2 after you have SR set up and running and then they have problems with SR. The following are from Ricoh FAQs: "..Windows XP SP2 closes many ports
 
          9/11/04 3:34 PM
 
          Topic by pcb0960 pcb0960 is offline. Click for Member Snapshot.
          hi trying to help a tech with error codes JP001 and JD024 what are these sc's? TIA Patricia
 
          9/8/04 5:49 PM
 
          Reply by Ted Ted is offline. Click for Member Snapshot.
          With all the equipment that Ricoh has been buying from Samsung, wouldn't it be easier if Ricoh just bought them?  Maybe that is in the works also.
 
          9/8/04 6:28 PM
 
          Reply by Old Glory Old Glory is offline. Click for Member Snapshot.
          I'm not certain Samsung couldn't buy Ricoh. They are huge...office equipment is a very small part of what they do.
 
          9/8/04 11:47 PM
 
          Reply by Guest
          Make sure you have a valid IP address in the scanner server setting, under Scanner in UP mode. Happens to all Ricoh equipment if it can't find the server. Switch ip adress off if you're not using the feature.
 
          9/9/04 12:01 PM
 
          Reply by Darren .... Darren .... is offline. Click for Member Snapshot.
          Basic feature for feature comparable models ... Ricoh seems to be keeping their own control panel to match their product family ... other than that, I believe they are the same. Ricoh 1160L = Samsung SF-555P Ricoh 1170L = Samsung SF-565P Ricoh 2210L
 
          9/9/04 1:53 PM
 
          Reply by dfrazier dfrazier is offline. Click for Member Snapshot.
          Hey p4p hotel. I just wanted to thank you for your website. I had a deal signed on the 240W and was waiting for the equipment to arrive (some of which was on backorder). In the interval Xerox sent my customer a postcard on the 8830. They were
 
          9/14/04 4:46 AM
 
          Reply by Guest
          Guys, Can anyone help me?I've "got in legacy" 50 Canon faxes FaxB155 to service them but have not at all any documentation.I need a sevice manual and parts catalog - can anyone send to my e-mail: pemarinov@abv.bg? Thanks in advance Peter
 
          9/9/04 10:38 AM
 
          Reply by Ron B. Ron B. is offline. Click for Member Snapshot.
          We have 5 in the field. One will not be connected until Ricoh/GBC comes up with a production version of the interposer compatibility update. The 3 remaining have been NOTHING but problems. 4 of these were pre chad update, have been updated and have run
 
          9/8/04 11:57 AM
 
          Topic by Guest
          I need to contact a Ricoh/Savin/Gestetner vendor that services the Califon, New Jersey area. Please email me at wlaursen@techservecopiers.com this is concerning a customer of mine that is opening a new branch there. Thanks, Chris
 
          9/9/04 10:31 AM
 
          Topic by Graham Graham is offline. Click for Member Snapshot.
          Just for whatever it is worth, I was told yesterday that the SMB scanning feature will NOT work with Win2003 server as the backbone. This is a fix that Ricoh is supposed to be working on. I don't know why this is, however, my guess is that it has
 
          9/9/04 12:09 PM
 
          Topic by Junior Junior is offline. Click for Member Snapshot.
          DOES RICOH HAVE RELATIONSHIPS OR BEEN AWARDED TENDERS LATELY TO SUPPLY MACHINES TO COPY SHOPS. PLEASE CAN I GET THIS INFO ASWELL AS THE NO OF OUTLETS AND URL IF YOU CAN. ALSO HOW DO YOU ADDRESS TECHNOLOGICAL REDUNDANCY AND TCO. THANKS JUNIOR NASHUA SOUTH
 
          9/9/04 1:17 PM
 
          Topic by Guest
          The question "Is Virtual Copier the same as Desktop Binder?" comes up quite often. Here is what one of our Ricoh dealers has to say" "If you asked an IT person if VC and DesktopBinder technically do the same thing, they might say yes. That's like saying
 
          9/10/04 10:31 AM
 
          Topic by Anders And Anders And is offline. Click for Member Snapshot.
          Is it possible to buy spareparts for rebuilding the fusing unit? A paperjam can ruin a brand new (expensive) unit. As far as I know Ricoh does not supply seperate parts for these units. ???
 
          9/14/04 8:51 AM
 
          Topic by Guest
 
 
          9/14/04 2:57 PM
 
          Topic by Guest
Ricoh has added another model to the "fuser-eater" line. Based on the DSc332 and 338, this is the DSc328.It is a 28/20 machine. Ricoh doesn have it on its site but it is on Gest/Savin and Lanier. I found it by way of a service bulletin (B147/149/b190-10)
 
          9/15/04 11:20 AM
 
          Topic by Guest
          I set-up scanrouter for scanning on a Savin 4018d(B121/122/123). Since then they called and said that scanning stopped working. I looked on the computer and it shows that they upgraded to service pack 2. I called ricoh's technical support and he didnt
 
          9/9/04 3:58 PM
 
          Reply by Guest
          I would have to concur. I know Ricoh specs the 220/270 and the 1022/1027 as being able to feed envelopes from the second drawer. However, I know from experience that these don't work well either. Star1
 
          9/11/04 12:41 PM
 
          Reply by Guest
          as well.    problem still comes backtry swapping drum unit there is actually a life on those even though ricoh doesnt tell you that,  about800k
 
          9/14/04 7:57 AM
 
          Reply by Neal Neal is offline. Click for Member Snapshot.
          Is mother Ricoh the OEM? If not, who is?
 
          9/14/04 3:54 PM
 
          Reply by Ted Ted is offline. Click for Member Snapshot.
          Here is the launch letter I received.  From the SU Pricing, they are just going to add it aboe the 2232C in the list.  It uses the same accessories as the 2232C & 2238C.

Step 1 - Discover your Strengths and Weaknesses to Help Drive Success

Welcome back! If you are reading this then I didn’t bore you too much with my first blog entry introducing the Five Step Blueprint to Running a Great Business.

 

Knowing your company’s Strengths or Weaknesses can actually help you understand how to drive your success. Many companies attempt a Strengths, Weaknesses, Opportunity and Threats (SWOT) analysis with little or no input. They want to build a strategic plan but struggle for days trying to figure out what’s important and what to do. In my opinion, this is ego driven drivel where company leaders think they know better than the people they are serving.

 

Who really Drives your Business and What do they Think?

This first step is key to building a great strategic plan and it gets other people to do the hard work for you. The other people are your team and your customers. This is the ultimate SWOT analysis. A pretty simple survey for your staff and customers to complete involves 3 easy questions.

 

1. What should <Company Name> Stop doing?

 

2. What should <Company Name> Start doing?

 

3. What should <Company Name> Continue doing?

 

That’s it!

The reason I do Stop, Start, Continue in that order is because people get the things bothering them off their minds first allowing them to be more creative with the ideas they believe you should Start doing.

 

Survey Best Practices?

There are plenty of ways to go about collecting responses for your Stop Start Continue survey. There are web tools likeSurvey Monkey or if you use Google Docs like we do then using Google forms is an awesome way to get the data into one place. As for getting responses, I like to send out the survey by email and LinkedIn to my targets. I do this 3 times. Next, I have a list of my top 20% of customers by revenue and if they have not already filled out the survey I call them directly. I ask for them to either complete the survey online or let me interview them. For the team I make the survey mandatory and for everybody I allow the survey to be anonymous but have a space for them to put their name if they want or need some sort of contact from us.

 

When to do Stop Start Continue?

I suggest that it be ready and sent out 6 weeks before your strategic planning session. Spend the next 2 weeks being obsessive about getting responses from your customers and team members.

 

How to use Stop Start Continue?

You will have to wait until my next post on the ‘Strategic Planning Session’ to find out how to turn the data into a great SWOT analysis.

 

Bonus question number 4!

Add one extra question to your survey and learn where you really stand. This question is used by companies all over the world to determine something called Net Promoter Score (NPS). On a scale of 1 to 10 (10 being the highest), how likely are you to recommend <Company Name> to someone else? Learn more about how Net Promoter can advance your business.

 

Bonus idea! Why did we not get your business?

Send your survey to people who did not become your customer that you really think should have. You might be surprised about what you learn from them.

 

John MacInnes runs several businesses, including Print Audit. The newest one is Payroll by Credit Card where they help business owners pay their payroll on their credit card and collect tons of loyalty reward points for themselves.

 

 

My Top Ten Copy Machines of All Time #2

The BETA, the ZOOM, "From the Mind of Minolta, Tony Randall, bayonet toner load, re-cycled toner and one tenth of 1% was the bomb!

 

I'm not sure when the Minolta Beta 450Z was officially released, something is telling me circa 1985. By 1986 I had my own dealership and was still buying these copiers new from an Authorized Minolta dealer (funny, the dealer that I was buying machines from is the dealer I'm working for now).  Do we remember the word "skating"?  "Skating" was a slang term for an Authorized Dealer that resold copy machines to non-authorized dealers.

 

The quality of the prints were awesome, in fact when we demonstrated copy quality (we don't do that anymore), I would tell the DM to look at the a's, e's & o's in the copy, do you see any fill in the small spaces?  The answer was no, and I would then state "that's excellent copy quality, right"? 

 

The heart of the Minolta 450Z was the ability to reduce or enlarge documents to one tenth of one percent!  Come to think of it, I don't even believe that capability is built in to the new systems that we have.  Since, the Minolta 450Z was the first zoom lens copy machine (meaning you could zoom up to 200% of the image and down to 50%), we had print shops, advertising agencies (remember those), publishers and newspapers buying these machines off of the demo!!  Later, we found out that these systems were also great for engineers that also had to resize or drawings to scale.

 

The system had a non moving platen glass, two paper trays with the by pass built into one of the trays. There was an optional document feeder and I think that was it for the accessories. In some cases we added a third party Gradco sorter to the system.  Those were the days when buyers bought from emotion and the quality of the demonstration.  If you could wow them, and move them along with questions that they answered yes to, in the end you would be signing the deal on the spot.

 

In our demonstrations, we would ask for documents from the customer, from there we would put them on glass and then ask what size they would like to enlarge of reduce the image.  With print shops they would breakout this proportional wheel scale to tell us the percentage of enlargement that they wanted.  They would then break out the ruler to see if the size was to scale, and then the really anal buyers would break out a loop and check out the dot pattern of the image! OMG!!!

 

All in all, we had have a lot of fun demonstrating the Minolta 450Z and made a boat load of sales, because there was no competing model if you needed to size images. It was copier nirvana!!

 

Interesting to note, that it's my belief that there has been a few models of office equipment over the years that stood the test of time, quality and reliability. If there was a Hall of Fame for Office Technology I would rate the Minolta 450Z right along side of the IBM Selectric typewriter, the HP LaserJet II.

 

-=Good Selling=-

 

 

 

 

 

 

In Focus: Two Latest Major Data Breaches

A lack of knowledge can, and often will, cause significant issues in the fight to combat cybercrime, especially as hackers work in an opportunistic fashion - identifying vulnerabilities and capitalizing on them. Many might believe that data breaches are simply unavoidable, a sign of bad luck or the like, assuming that hackers are just the smartest individuals on the planet and conduct highly advanced attacks that penetrate even the strongest armor.

Sure, there are plenty of hackers at the top of the industry, developing new methods to infiltrate systems and data of the most advanced and intelligent defense providers in the world, but these do not make up the majority of the cybercrime community. Rather, with studies indicating that employee error has such a high hit rate for data breach, as well as others affirming that the vast majority of security incidents are entirely avoidable, it should be clear that businesses are battling themselves more than anyone else.

Two major breaches recently hit the news, one of which highlighted the dangers of traditional credential controls and shoddy access management, while the other simply illustrates how quickly the biggest breach in history can be overshadowed in the current state of affairs. Decision-makers must become more aggressive, proactive and comprehensive in their security strategies, and remember all of the tools they need to succeed in their fight.

Act 1: A serious slip
Bloomberg recently reported that the major breach took place over the long weekend. involving the exposure of several pictures containing celebrities in compromising positions. The event might have been the direct result of poor awareness among mobile device users. For a little background, someone - or perhaps multiple people - effectively broke into the iCloud storage of countless female celebrities, stole private pictures and posted them to the Internet.

So far, the source explained that Apple officials believe the issue was likely with customers' knowledge of how their storage works, adding that the company has not yet fully taken responsibility for the event. On the other hand, the news provider pointed out that some experts believe it is a far more systemic issue that transcends only one company's shortfalls, tracing back to the ways in which accounts are accessed and users authenticated in the current market.

"Personal questions as a password recovery mechanism is flawed," manager Chris Morales of security-testing and analysis firm NSS Labs Inc. told Bloomberg. "I never use them. If I have to, I don't provide the obvious expected answers to questions like my mother's maiden name, my pet's name or where I was born. If you have a user's email and know a bit of personal history on that person, it isn't that hard to get the password."

According to the source, this is not the first time that very similar oversight or errors have led to such significant backfire against publicly known individuals.

Act 2: An ominous report
Brian Krebs, writing for his Krebson Security blog, recently reported that several banks and others believe Home Depot might have been breached by a significant hack, going so far as to say that the attack might surpass Target's major event last winter in terms of damage and breadth. When the Target breach occurred, it was hailed as being the most devastating loss of consumer information in history.

It should not be surprising, though, that another firm has already stepped into the spotlight, as hackers are moving quickly and retailers appear to be sleeping on the IT security job. Krebs cited the comments of Home Depot spokesperson to highlight the firm's response to the allegations.

"I can confirm we are looking into some unusual activity and we are working with our banking partners and law enforcement to investigate," Home Depot's Paula Drake said, according to Krebs. "Protecting our customers' information is something we take extremely seriously, and we are aggressively gathering facts at this point while working to protect customers. If we confirm that a breach has occurred, we will make sure customers are notified immediately. Right now, for security reasons, it would be inappropriate for us to speculate further – but we will provide further information as soon as possible."

He noted that the breach is rumored to have originated with a group of hackers in the Ukraine and Russia who are believed to have caused the Target event. Suffice it to say that a change is seriously needed in the battle against cybercrime.

Email security, network monitoring, data center protection services and many other provisions can make a big difference in IT performances and continuity, while business leaders must also supplement these tools with effective training and awareness strategies. At the end of the day, the firms that most swiftly implement these controls will likely be the most successful in safeguarding systems and data from threats.

 

David Bailey is Senior Vice President at Protected Trust. 

Protected Trust is a sponsor of the Print4Pay Hotel. I urge members and readers to visit their site to see their full line of products and services.  More and more we need to provide well rounded strategic solutions for our customers. Protected Trust offers some unique solutions that can help us in our day to day efforts. Check them out here.

This Week in the Copier/Office Equipment Industry 10 Years Ago First Week of September 2004

U.S. presidential election: George W. Bush accepts the Republican nomination for a second term in office as the party's National Convention concludes, signaling the beginning of all-out campaigning by Bush and Senator John Kerry.

 

          9/2/04 8:21 PM
 
          Topic by Guest
          as often as they copy.  they print as often as they copy.  the number of users is greater than the number of copies the unit makes per minute. Paul Albano, Assistant Manager, Product Marketing, Canon U.S.A., Lake Success, NY they find themselves printing
 
          9/3/04 10:34 AM
 
          Reply by Darren .... Darren .... is offline. Click for Member Snapshot.
          Here you go ... I believe this is what we call  the AC104.
 
          9/2/04 8:00 AM
 
          Topic by Guest
Ricoh launches exclusive in-line finishers Story Link Ricoh finishers boost low end black-and-white productivity Unique to Ricoh, the StreamPunch Inline Punch System by GBC, and the Ricoh Booklet Making System by Plockmatic are designed to save
 
glnsk8ter glnsk8ter is offline. Click for Member Snapshot.
Elite P4P'er
 
          9/8/04 5:49 PM
 
          Reply by Ted Ted is offline. Click for Member Snapshot.
          With all the equipment that Ricoh has been buying from Samsung, wouldn't it be easier if Ricoh just bought them?  Maybe that is in the works also.
 
          9/8/04 6:28 PM
 
          Reply by Old Glory Old Glory is offline. Click for Member Snapshot.
          I'm not certain Samsung couldn't buy Ricoh. They are huge...office equipment is a very small part of what they do.
 
          9/7/04 10:24 AM
 
          Topic by Guest
          I am looking for machine comparisons eg. Aficio 2238 vs canon image runner C3200, and others. If anyone can help it will be appreciated. Thanx Warren
 
          9/8/04 11:57 AM
 
          Topic by Guest
          I need to contact a Ricoh/Savin/Gestetner vendor that services the Califon, New Jersey area. Please email me at wlaursen@techservecopiers.com this is concerning a customer of mine that is opening a new branch there. Thanks, Chris

 

 

-=Good Selling=-

 

Why I Still Cold Call in Person!

Last month was excellent!  The prior month was not so excellent, thus with the end of the quarter fast approaching I figured I would venture out on knock on some doors after my first two appointments in the AM.

 

I had a plan for three companies that I wanted to visit and then an additional back up plan if I had some additional time.  Random knocking on doors was not an option because I had a plan.  You see, with cold calling you want to be prepared, today, my focus was with wide format devices.  I wanted to find additional prospects with Engineering, Architects and Surveyors.

 

It was either my second stop or third and it was to a Design/Build company that I had never stopped in before. I had been in that building, but a few months ago, noticed a sign that alerted me to that this company would probably have the need for a wide format system.

 

Walking in the door, and there was no one there?  WTF, I went around the back and the walked back to the from and nothing! In one of the rooms I noticed and old analog copier, CAD drawings taped on the walls and then a spiral staircase that led to the second floor.  So, I stood and listened to hear if there was any activity up there.  As I was looking around I noticed about 20 boxes on the floor.  A closer look told me that these were rolls of plot paper (HP), I thought, OMG, they've got a color plotter somewhere and they may be doing a big volume!  Ok, so now it was time to climb the spiral stair case into the unknown. 

 

I arrived at the top of the stairs and was greeted by the owner, I explained why I was there. In fact this customer had an older HP color plotter, was using about 10 rolls of plot paper per month along with 2.5 ink cartridges. Right away I knew that this account had potential to save money and for me to make some commissions!  You see, years ago I developed a spreadsheet cost analysis for inkjet wide format systems.  The breakpoint for an immediate ROI is 7-8 rolls of paper used per month.  (this document is loaded in the clips section of this site).

 

We spent about 30 minutes talking about the advantages, find out his pain points and left with an appointment to review the cost analysis I would prepare for him!  Yea!  Half the battle was done in 30 minutes or less, and there's a potential net new customer, and someone who can realize an immediate ROI by changing systems.

 

In all my years of selling, I've always taken the approach that you never know what tomorrow will bring you. If you do your work, many of those tomorrows can bring new opportunities!

 

-=Good Selling=-

How Equipment Purchasing Trends Might Impact Corporate Security Strategies

Businesses have been highly fluid in their technology spending throughout the past few years, driven by the need to keep up with the IT evolution so as not to fall behind the competition. Although personal computers are still being used in many companies and legacy systems have not quite yet faded out of the private and public sectors, a change is occurring in rapid fashion with respect to mobility and cloud services.


Agility, speed and spend efficiency are some of the most important characteristics of a successful, digitally enabled enterprise today, and the cloud has allowed companies to achieve these more prolific levels of flexibility in a relatively short period of time. Likewise, trends such as BYOD have helped even small businesses capture the power of mobile devices without putting all that much strain on the budget.


With all of this in mind, though, business leaders must be proactively thinking about what these new environments and technologies will do to their security performance, trying to work ahead of the curve to ensure that data and systems are protected by relevant, timely solutions. It should not be all that surprising that data breaches have become such an issue so recently, as so many firms are still trying to work out the requirements of each new deployment, which takes time.


Still, studies have indicated that more businesses are already beginning to use third-party provided security solutions such as email encryption and data center services to ensure the integrity of their infrastructure and information, as this can help to reduce unpatched vulnerabilities despite rapid deployments. In the coming years, those firms that remain as proactive and comprehensive in their planning will often enjoy the greatest level of protection against threats.


Focus on mobile It has been no secret that the personal computer market is being slowly but surely overshadowed by tablets, smartphones and portable devices, not to mention wearable's and other tools that would fall into the Internet of Thing trend. Now, it appears as though smartphones will remain as some of the more common purchases by companies and consumers for the coming years, as International Data Corporation recently released its latest Worldwide Quarterly Mobile Phone Tracker.


According to the report, roughly 1.25 billion units are expected to be purchased and shipped by year's end, representing roughly 23.8 percent annual growth compared to 2013. Although these prolific numbers have been around for years now, the analysts did point out that global sales will begin to balance out and level off since penetration rates have already reached such high levels.


"The smartphone market, which has experienced runaway growth over the last several years, is starting to slow. Mature markets have slowed considerably but still deliver strong revenues with average selling prices (ASPs) over US$400. Meanwhile, many emerging markets are still barreling along, but with ASPs of less than US$250," Ramon Llamas, research manager with IDC's mobile phone team, explained. "The key for vendors now is to maintain a presence in the higher-margin mature markets, while establishing a sustainable presence within the fast-growing emerging markets. To enable this strategy, operating system companies are partnering with OEMs to provide low-cost handsets."


IDC released a separate report regarding its Worldwide Quarterly Tablet Track, which revealed that sales are beginning to balance off, especially in the developed world where consumers have already purchased a wealth of these tools. However, emerging markets are experiencing significant growth in terms of purchases and shipments, expanding at 88 percent in 2013 and a forecast 12 percent this year.


Despite this slower growth, it is worth noting that personal computers are still falling by the wayside and tablets are likely to see at least a few more spikes in demand in the coming years.


What this means for security With all of this in mind, it should not be that surprising that more companies are beginning to spend higher dollar amounts on security for mobile, cloud computing, social media and data management than ever before on the global scale. Gartner recently released a trends report that called for a 7.9 percent increase in spending on IT security on the global scale this year, rising to a total market revenue volume of $71.1 billion. This is forecast to accelerate again, with the researchers projecting 8.2 percent year-over-year growth in 2014.


"This Nexus of Forces is impacting security in terms of new vulnerabilities," Gartner Research Director Lawrence Pingree explained. "It is also creating new opportunities to improve effectiveness, particularly as a result of better understanding security threats by using contextual information and other security intelligence." Businesses will need to ensure that their security strategies are up to the task when new devices and solutions enter the corporate infrastructure, and leveraging the services of a proven vendor can make a world of difference in the long run.

 

David Bailey is Senior Vice President at Protected Trust. 

Protected Trust is a sponsor of the Print4Pay Hotel. I urge members and readers to visit their site to see their full line of products and services.  More and more we need to provide well rounded strategic solutions for our customers. Protected Trust offers some unique solutions that can help us in our day to day efforts. Check them out here.

Inbound Marketing For Sales Reps (and Sales Vets)

Out with the old, in with the new!

In the wake of today's web savvy entrepreneurs, social media-frenzy Vayniacs and full-time bloggers, "inbound marketing" has recently emerged as a way for businesses to generate inbound leads using the Internet.

 

This creates a huge opportunity for account managers and veterans in our industry alike to embrace this new form of marketing for generating new business.

 

Over the past 12 months you may have noticed a huge surge in web marketing within our industry. (I certainly have.) Last year Xerox was the only company who understood how to leverage Google AdWords. This year, Ricoh's Laserfiche banners and Kyocera's display ads show up on almost every website I visit. Dealers are updating their websites and most of the big players are using Twitter to further engage with their audience.

 

Thanks to pioneers such as Dealer Marketing having great success (Darrell Amy is a great guy), more and more people want a piece of the action offering dealerships blogging and social media services.

 

In this blog post I'm going to shed light on the truth about inbound marketing within our industry. As an ex-affiliate marketer, blogger and social media enthusiast, I feel I have the experience and the expertise to share with you what you can really expect from your efforts... And why for the sake of our industry you should jump on this bandwagon.

 

Copiers Are Always An Afterthought.

 

One of my first sales managers taught me that no one ever wakes up and thinks, "I feel like buying a new copier today!"

 

Our industry is primarily driven through cold calling and always will because it is the most effective way to engage with key decision makers about the benefits of replacing their old print technology. No matter how hard you fight it or how many base customers you have, your income is reflective of your prospecting efforts. I've studied the best in our industry and they all say that having the discipline to prospect daily is the #1 key to long-term success.

 

Take it from me: I've invested dozens of hours into inbound marketing trying to get inbound leads when I should have been out cold calling. Just like writing proposals, inbound marketing should be done off-hours. Using blogs and social media to connect with your customers will not pay off with free, qualified leads. However, it does pay off with Personal Branding.

 

MPS Is Not The Saviour. Personal Branding Is.

 

When Managed Print Services was introduced, it was believed to be the savior of our industry. Hardware sales were in a decline (and still are), so dealerships had to create new revenue streams to increase profits.

 

When I first started with Canon, our training was to pitch solutions. So I cold-called with eCopy PDF Pro Office demos on my USB stick and talked about how our managed print software could effectively reduce your print costs by 50%.

 

UniFlow is great software, but it's hard to compete with it when your local dealership is up against you with Papercut, hardware at wholesale pricing and a cost per copy of $0.006 fix for 5 years. In the end, customers just want cheap boxes.

 

So why did we start pitching software and MPS in the first place? It was a value-add... a consultative approach to winning business by developing more TRUST with the buyer.

 

You all know Sales 101...

 

#1 Buyers decide to make a purchasing decision when the VALUE of your product or service is worth more to them than the PRICE.

 

#2 Buyers use TRUST to choose between similar valued products. When TRUST is missing, buyers use PRICE to choose.

 

 

Personal Branding allows you to build TRUST with your prospects by being able to refer them to your blog/website that contains a wealth of valuable, educational information. In your customers' eyes, this situates you as an industry expert...a trusted adviser. Following your customers on Twitter or LinkedIn continues your relationship with them outside of the "sales cycle" by taking an interest in their activities. Think of re-tweeting your customer's morning breakfast tweet as one more "touch point."

 

This is not new stuff. Business has always been built on successful relationships. Twitter, LinkedIn and Blogging are just new media platforms for doing this.

 

Customers want boxes. But they want to trust their sales rep to choose the right box for them. If all car sales people and real estate agents were as sleazy as their reputation, those industries would not exist. With Personal Branding, our industry can rebuild trust and reputation.

 

So How Do I Start Using Inbound Marketing?

 

Step One: Build a Wordpress website. There are two types of Wordpress blogs you can build, Wordpress.com and Wordpress.org. A Wordpress.com blog is hosted by Wordpress and has a web domain of www.yourblogsite.wordpress.com. A Wordpress.org blog allows you to host your own web domain and offers greater customization of your website. Save yourself the cost of using a web developer and head on over to Studiopress.com for a list of professional designs you can use. My blog cost me $50 and about 10 hours of work to design in full.

 

Step Two: Find out where your customers are. In our industry, LinkedIn and Twitter will be your biggest platforms for connecting with decision makers.

 

Step Three: Spice up your Social Media profiles. Make sure they are filled out completely and that you have a professional-looking picture of your face showing.

 

Step Four: Follow your customers on Twitter and connect with them on LinkedIn. "Listen" to what your customers are saying and build relationships with them by engaging with conversations about the content they post.

 

Step Five: Write blog posts on your website designed to engage with your customers. Make your content interesting and valuable. For example, answer questions that your customers ask you. Or write about success stories and case studies.

 

Step Six: Share your blog post links across your social media profiles.

 

That's it! By combining Content + Customer Interaction you will slowly, overtime, become a more reputable face amongst your key clients.

 

Additional Tips

 

  • Use a combination of Push and Pull marketing. Listen to what your customers are saying on social media, but don't be afraid to self promote either.
  • If you want more followers on Twitter, follow others to get them to follow you. More followers equals more impressions when you post your blog post links.
  • Show your face on your social media profiles and on your website. Show customers online that you are a real person.
  • Be different. If your competitors are already blogging, try using YouTube.
  • Let loose the professionalism and be authentic. Greg Walters is very good at doing this. I don't golf, so I talk about UFC with my customers. Being a chameleon is overrated.

 

Tools and Resources

 

ReciteThis - Create beautiful looking quotes to better engage with your customers through pictures. Pictures are proven to help increase clicks to your blog post.

 

Fiverr - You can buy any product for $5 here, from SEO services to graphic design. Highly recommended.

 

Gary Vaynerchuk's YouTube Channel - The CEO of VaynerMedia and THE foremost authority on social media for businesses today.

 

BlueHost - Create your own Wordpress blog in under 5 minutes.

 

Aweber - Create "optins" so that you can begin collecting email addresses for email marketing purposes.

 

Did you like what you read?

 

These are the fundamentals of Inbound Marketing. If you have questions about getting started or my experiences with Inbound Marketing, please feel free to connect with me on LinkedIn.

 

Cheers!

 

Stop The Presses & Hold Your Horses, the Messiah for the Copier Industry has Arrived!

With everyone jumping through their butts about the downward spiral of the printed page, don't despair the Savior has Arrived!  Leave it up to those inventive Japanese Engineers!!  Fuji Xerox's concept robot printer will deliver those documents right to your desk!!!!

 

There was only a short little blurb about this system, however, the system will only start printing your documents when it arrives at your desk.  How about that!! 

 

Nice idea, but, at my age, I have a tuff enough time walking around the office now and to think that I'd have to navigate around a 3 foot motorized printer bot! 

 

Not a bad idea right?  I could think of some better uses though, like bringing me coffee, or how about picking up mail after you've printed my documents!

 

Truly, I would print as much as possible to see this bot motor around the office.  The ideal location for this bot would be in those Convention Hotels, you know the ones, where we all sit around with our tablets and note books.  The thought of bringing me my documents would be something I would pay for at least once.

 

-=Good Selling=-

The Heavy Toll of Poor Data Security in Healthcare

In what has become a farce of sorts, health care providers appear to remain far behind the learning curve when it comes to data, network and email security, as breaches have been on a torridly rising path in the past few months. Although retailers certainly took up many of the headlines since the last holiday season, medical organizations have quietly racked up some of the most devastating failures in data security ever seen.

The situation has become a farce in the sense that the causes of these breaches, at least for the most part, were entirely avoidable and prove little more than the fact that negligence is running rampant. From communications sent errantly without email encryption solutions in place to misplacing devices that are not protected, the common causes of information loss and exposure in health care - as well as virtually every industry - remain as errors.

There is nothing funny about this particular farce, as tens of millions of individuals have been impacted negatively from these breaches, and patient information is among the most sensitive types of data around. Health care providers must become more proactive, comprehensive and intelligent in their security planning to turn matters around in a more favorable, protected direction.

Raising alarms
The Washington Post recently reported that roughly 30 million patients in the United States have been impacted by a data breach in the past five years since notification standards were first created, citing the findings of analysis it conducted using information from the U.S. Department of Health and Human Services. According to the news provider, a study from the Identity Theft Resource Center found that medical organizations accounted for 43 percent of all breaches last year, and that the frequency of targeting is only going up.

"It is more difficult, perhaps, for that industry to brush something under the rug and want to chance not disclosing it because the ramifications for being found out are pretty significant," ITRC Chief Executive Officer Eva Velasquez told the source. "There's just a lot of regulation in place there."

It is beginning to make sense that one expert several months ago referred to health care as being the "Wild West" when it comes to information governance and general IT security. After all, despite the fact that patient data is so sensitive and can be used by hackers for myriad types of dangerous crimes, chief among them medical identity theft, health care providers continue to be slow to the punch with security provisions and strategies.

Using HHS data, The Washington Post pointed out that records of roughly 17.4 million individuals were stolen, 7.2 million were lost outright and a combined 5.5 million were impacted by illegal access and hacking. The source also explained that the rate of IT professionals in the health care sector to affirm their companies had plans in place increased from 62 percent to 69 percent from 2012 to 2013.

This is still lackluster, as a full 100 percent of organizations that handle patient data must have a formal policy and set of solutions in place to protect information from internal and external threats.

Nonstop frequency
Forbes, in its weekly data breach bulletin, recently highlighted some of the latest events to take place, and most of them were tied back to the medical sector. The source cited a breach that took place at Onsite Health Diagnostics, which accidently lost 60,000 employee evaluations to hackers, as well as an incident at Rady Children's Hospital in San Diego, which exposed 20,000 patients' records in one fell swoop.

Want to take a guess what issue caused the latter incident? According to the news provider, officials believe that an employee sent an email containing the information of these 20,000 patients errantly, and it was not encrypted. This further raises the tally of breach events that took place simply because the company had not instituted an email encryption or general security strategy.

It is time to get smart with data and communications security in health care, and here are a few ways in which decision-makers can get the job done:

Training: This might be the single most important - and most overlooked - aspect of modern data security and information governance. Health care providers that do not have robust training programs in place for their employees will be far more likely to fall victim to a substantial breach.
Email security: Because physicians and other employees in this industry commonly use email to exchange patient information, it is time to leverage encryption and other security services to protect this data.
Data center services: When in doubt, leverage secure data center services from a trusted provider, as this can mitigate many breach and compliance threats.

Above all else, be more proactive and recognize the threats that the sector currently faces.

 

David Bailey is Senior Vice President at Protected Trust. 

Protected Trust is a sponsor of the Print4Pay Hotel. I urge members and readers to visit their site to see their full line of products and services.  More and more we need to provide well rounded strategic solutions for our customers. Protected Trust offers some unique solutions that can help us in our day to day efforts. Check them out here.

 

If I Were King of My Sales Department

Since I've spent so much time in the trenches, I've seen many salespeople and sales managers come and go. I understand that many sales managers are sometimes limited in what they can and cannot do. But, if I were king and had carte blanche, here's what I would do to increase sales and morale:

  1. If I were the sales manager, I would STOP selling. I would divide all of my accounts among my reps. You can't be both a great sales manager and a great salesperson. It's not going to happen.

  2. I would then teach and train my reps on how to prospect (telephone, email, social media). When they get an appointment, I would accompany them so they can sit, listen, and learn from a master.

  3. Once they have mastered prospecting, I would provide additional training on the art of selling. Gradually, I would give them control of the appointments while I support them with specifications and content.

  4. I would introduce "FUN" time. These would be dedicated sessions for prospecting. Too many of us treat prospecting like getting a root canal—we know it's necessary, but we don't want to do it!

    "FUN" times would be engaging. I would have inspirational music playing in the office—louder during breaks and softer during call blocks. Call blocks would last 45 minutes with a 20-minute break in between. I’d schedule five of these call blocks during the day. During our 20-minute breaks, we would discuss responses and results. I’d sit in with each rep during the call blocks to listen in. I’d probably use my Aficio card and hand out $100 in $25 gift cards: one for the best attitude, one for most dials, one for the most promising appointment, and one for the most hang-ups. We need to make it FUN!

  5. Inspirational color banners might sound hokey, but didn’t the first sales close you learned seem hokey too? Inspire, Ignite, & Motivate.

  6. The toughest part of the job is product knowledge. Here, I would have to determine who is best suited for what. Should this person focus on IT services, or are they better suited for hardware? I don’t want them doing both—you’ll do one or the other.

  7. I would set aside time each month to review the compensation plan and ensure my reps know it inside and out. Not understanding the comp plan leads to failure.

  8. I would ensure that lead distribution is fair. Everyone gets the same number of leads.

  9. I don’t want to hire people who need a job; I want to hire people who want a job. I would be involved in the hiring process to identify those who want to excel versus those who are content with the status quo.

  10. Sorry, I didn’t keep these in order. I would also add LinkedIn prospecting blocks. I would ensure every rep has a premium LinkedIn membership and train them on how to leverage it. Oh, and I’d also make sure they all have a premium P4P Hotel membership!

I could probably go on and on, but it’s getting late. I’d probably never take a sales manager’s job—then again, one was never offered to me. However, I kinda like where I am.

Yes, if you have any sales questions or need some advice, please post a reply here!

Post
×
×
×
×
×