Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.

N.Y.–based cybersecurity-resilience program gets federal funding
The federal budget includes at least $38 millio for the Multi-State Information Sharing and Analysis Center (MS-ISAC), a federally funded cybersecurity-resilience program. The Center for Internet Security (CIS) in East Greenbush in Rensselaer County operates the MS-ISAC. The office of U.S. Senator Kirsten Gillibrand (D–N.Y.) on March 10 announced that the federal spending plan included the […]
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
The federal budget includes at least $38 millio for the Multi-State Information Sharing and Analysis Center (MS-ISAC), a federally funded cybersecurity-resilience program.
The Center for Internet Security (CIS) in East Greenbush in Rensselaer County operates the MS-ISAC.
The office of U.S. Senator Kirsten Gillibrand (D–N.Y.) on March 10 announced that the federal spending plan included the funding. The $38 million represents an increase of $11 million over the previous year, Gillibrand’s office noted.
A week earlier, CIS released a statement noting that both Gillibrand and U.S. Senate Majority Leader Charles Schumer (D–N.Y.) had called for additional funding “in light of Russia’s invasion of Ukraine and potential retaliatory attacks against the U.S. and other western nations,” per the March 3 CIS announcement.
The lawmakers in a March 2 announcement had acknowledged the importance of the work of the Multi-State information Sharing and Analysis Center. The additional funding would further enable the nonprofit cybersecurity organization to protect the nation’s state, local, tribal and territorial governments (SLTTs), K-12 public schools, universities and hospitals from cyberattacks, CIS said.
“We stand with Sen. Schumer and Sen. Gillibrand … in continuing to emphasize the importance of supporting the cybersecurity of our nation’s State, Local, Tribal, and Territorial (SLTT) governments. Our members, over 12,000 SLTT, are an integral part of the whole-of-nation approach to protecting both our critical infrastructure and essential civil services across the country,” John Gilligan, president & CEO of the Center for Internet Security, said.
About MS-ISAC
The MS-ISAC program is a “successful example” of a partnership-based approach to building cybersecurity resilience and coordination between federal, state, and local entities, Gillibrand’s office contended.
In 2010, the U.S. Department of Homeland Security designated the MS-ISAC as the focal point for cyber-threat prevention, protection, response, and recovery for the nation’s state, local, territorial, and tribal governments as well as cyber fusion centers.
The MS-ISAC is used by all 56 states and territories and more than 12,500 other local governments to receive up-to-date information on and analysis of cyber threats. Additionally, the Center for Internet Security, which houses the MS-ISAC, also houses the Elections Infrastructure Information Sharing & Analysis Center (EI-ISAC), which provides election-systems professionals with a full cyber-defense suite of hardware, software, and expertise to fend off the threat of foreign interference, Gillibrand’s office said.
VIEWPOINT: 4 Tips for Small Firms to Protect Against Cyberattacks
There are many challenges to running a business that owners must face — including the threat of a cyberattack. Cyberattacks are a growing threat for small businesses and the U.S. economy. In fact, according to a recent U.S. Small Business Administration (SBA) survey, 88 percent of small-business owners felt their business was vulnerable to a
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
There are many challenges to running a business that owners must face — including the threat of a cyberattack. Cyberattacks are a growing threat for small businesses and the U.S. economy. In fact, according to a recent U.S. Small Business Administration (SBA) survey, 88 percent of small-business owners felt their business was vulnerable to a cyberattack. Yet many businesses cannot afford professional IT solutions, have limited time to devote to cybersecurity, or do not know where to begin.
Additionally, there is a common misconception among small to mid-sized business owners that due to their size they are not likely to be targeted or considered “high profile” enough. This false mindset can make businesses even more susceptible to cyberattacks. Small businesses are attractive targets as they have information that cybercriminals want, and they typically lack the security infrastructure of larger businesses. As more business is conducted online through cloud services, without the use of strong encryption technology, a hacker can easily access sensitive data behind a door with an easy lock to pick.
Here are four ways in which small to mid-sized businesses can plan ahead and protect themselves against cyberattacks.
Don’t be ignorant
Oftentimes, businesses and business owners think, “it won’t happen to me,” but it’s not a matter of if a cyberattack will happen, but when. Erring on the side of caution is not only the safest thing to do, but also the right thing to do. It is better to be prepared for any type of threat, breach, or attack than to be caught off guard and left in a vulnerable position.
Plan and create policies
When building a cybersecurity plan, be mindful to include an employee-training program and an incident-response plan. The first step to securing your network is to make sure your employees understand security policies and procedures. Establish basic security practices and policies for employees and create employee and IT-related policies that are compliant with the NY SHIELD Act. Companies are considered compliant if they implement reasonable administrative, physical, and technical safeguards.
Educate employees
Cybercriminals are becoming more sophisticated in their methods and employees are often considered “easy targets.” In fact, the majority of malware is delivered via email, putting a business at risk if an employee unknowingly clicks on a phishing email or downloads a suspicious document. Therefore, educating and training employees on the risks, as well as conducting security trainings, are ways to safeguard a business.
Training should not be a one-and-done event. Rather, schedule yearly or semi-yearly refresher courses to keep security top of mind. Help employees understand the importance of updating their software, using secure passwords, adopting security best practices and knowing what to do if they identify a possible security breach.
Invest in cybersecurity software
On top of planning and training, the next step is to invest in cybersecurity software. Businesses need antivirus software that can protect all devices from malware, viruses, spyware, ransomware, and phishing scams. Software should not only offer protection, but also technology that helps you clean computers as needed and resets them to their pre-infected state. Investing in email gateways such as Mimecast, ProofPoint or Microsoft will support cybersecurity plans and tactics.
Safeguard your Internet connection by using a firewall and encrypting information. A firewall acts as a digital shield, preventing malicious software or traffic from reaching your network. There are many kinds of firewalls, but they fall into two broad categories: hardware or software. If your business has a Wi-Fi network, make sure it is secure and hidden. To hide your Wi-Fi network, set up your wireless access point or router so it does not broadcast the network name, known as the Service Set Identifier (or SSID). Also, password-protect access to the router.
Invest in your firm’s safety with cybersecurity planning
Cyberattacks are not going away any time soon and will continue to pose a threat to small and mid-sized businesses. By taking these necessary steps to protect your business, you will safeguard your firm from attack, which will allow you to spend time doing what matters most — running your successful business.
Charlie Wood is executive VP for the FoxPointe Solutions Information Risk Management Division of The Bonadio Group.
Author disclaimer: The summary information presented in this article should not be considered legal advice or counsel and does not create an attorney-client relationship between the author and the reader. Readers with legal questions are recommended to consult with their attorney.
VIEWPOINT: Adopting the assumed-breach mentality on cybersecurity
The cybersecurity landscape is Constantly changing. Everyday, Stories are told of breaches, ransoms, and threat actors pushing us collectively further into uncomfortable territory. Stories like the Colonial Pipeline and Kaseya were major eye-openers for many, but they weren’t the first and they won’t be the last. The recent report, called the State of Ransomware 2022, from
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
The cybersecurity landscape is Constantly changing. Everyday, Stories are told of breaches, ransoms, and threat actors pushing us collectively further into uncomfortable territory. Stories like the Colonial Pipeline and Kaseya were major eye-openers for many, but they weren’t the first and they won’t be the last.
The recent report, called the State of Ransomware 2022, from Sophos News (https://news.sophos.com/en-us/2022/04/27/the-state-of-ransomware-2022/) states that 66 percent of organizations surveyed were hit with ransomware in 2021, up from 37 percent in 2020. And, the average ransom paid by organizations that had data encrypted increased nearly fivefold to $812,360. While those numbers are staggering, they aren’t exactly a surprise when you consider the almost daily reports of incidents throughout last year. If you take a moment to look at the reports from last year from a variety of vendors, they all paint the same picture. Cybercrime is on the rise, and in a big way. So, where does that leave us this year?
“Everyone has a plan until they get punched in the mouth.” Boxer Mike Tyson is credited with this quote, and it’s been used many times in recent years. Poorly laid plans go out the window once the worst happens. Applied to cybersecurity, it could probably be “no one wants to plan until they get punched in the mouth.” After an incident is when everyone wants to buy and/or implement security solutions. So how do we prepare ahead of time?
There is a security strategy that has gained more steam in recent years called “assumed breach mentality.” What does that mean? It means that we approach our IT security from the perspective of not if, but when. This can come across as pessimistic. Does it mean we just give up and accept defeat? Hardly. If we continue the boxing example it would mean that we don’t plan and train to never get hit, but instead to expect to get hit and endure. There is no perfect solution or defense. There are strategies and tools that will limit our risk, and there are plans and policies that if put in place correctly, can help us endure when the worst happens.
Letting go and adopting the assumed-breach mentality can be liberating and terrifying. We spend a lot of time trying to figure out how to keep threat actors out, and that is still important. Just because we train to be hit doesn’t mean we want to be hit. We limit our risk as much as we can and prepare for the worst. In shifting that mindset now, we need to start thinking like a threat actor. Look internally at your network, your policies, and investigate your weaknesses. How do we limit the movement of the bad guys in our network, how do we protect key information, and perhaps even more vitally — how do we get back to business? Here are three things we can do to make an impact with our newfound state of mind.
First, we need to evaluate our current security posture and know what to look for. The IBM Cost of a Data Breach Report 2021 (https://www.ibm.com/security/data-breach) lists compromised credentials as the most common attack vector at 20 percent of breaches, and business-email compromise has the overall highest average cost. That gives us something to focus on right away. That means securing your email, using multi-factor authentication, and training your users regularly on phishing emails and to recognize anything suspicious. Of course that is just a start, and it is best to have an objective third party evaluate your vulnerabilities or even perform a penetration test to be more thorough in rooting out any issues present in your environment. While there is a cost to these, they can be invaluable at getting an idea of where you are with your security posture and what changes need to be made.
The second point is basic cybersecurity hygiene. It’s important to understand that all of us are somewhere on the scale of cybersecurity journey to maturity. That’s ok. It’s more important to realize where you are and work to move forward. Where do we start? The National Institute of Standards and Technology (NIST) provides a cybersecurity framework, and many organizations look to that as the standard. Another I am fond of is provided by the Center for Internet Security (CIS). That organization has the CIS Controls (https://www.cisecurity.org/controls/implementation-groups/ig1). There are 18 controls with over 150 safeguards, but CIS has them broken into implementation groups. Group 1 is an evolving list of what is considered basic cybersecurity hygiene and a great place to start. It can provide you an excellent checklist with which to start.
Our last point is having an incident-response plan and cyber insurance. If we think back to boxing again, now that we have planned to avoid getting hit, let’s talk about what happens when we are attacked. Too many organizations realize too late that they didn’t have a plan in place, or that they did, and they had no idea what to do with it. CompTIA has an article (https://www.comptia.org/blog/security-awareness-training-incident-response-plans) that can help get you started. An important point about an incident-response plan is don’t skip the tabletop practice. Knowing what do with the plan when the worst happens is what makes it effective. A bunch of words on a page won’t do anything on their own. Additionally, cyber insurance is another important piece. Find a provider your trust and know what your coverage entails, and who your breach coach is (if your insurance plan has one, and it should). A breach coach is the individual who will help guide you through the process if the worst should happen.
In summary, here are the key takeaways:
• Adopt the assumed-breach mentality
• Evaluate your security posture
• Start on the path toward good cybersecurity hygiene
• Design an incident-response plan and obtain cyber insurance
There are no silver bullets, or cure-all potions. It will take time and effort, but it will be worth it when you need it. I wish you the best on your cybersecurity journey.
Nathan Hock is a virtual chief information officer (vCIO) at Usherwood Office Technology in Syracuse.
VIEWPOINT: Online scams are on the rise, make your business cyber-safe
When pandemic shutdowns shifted the nation’s commerce from in-person to online, cybersecurity experts knew that fraud attempts would follow. Circumstances during the past few years forced many Americans to quickly become far more comfortable with working remotely, banking, and making purchases online. Now, as the pandemic begins to recede as the primary focus of our attention,
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
When pandemic shutdowns shifted the nation’s commerce from in-person to online, cybersecurity experts knew that fraud attempts would follow. Circumstances during the past few years forced many Americans to quickly become far more comfortable with working remotely, banking, and making purchases online. Now, as the pandemic begins to recede as the primary focus of our attention, it’s a mistake to think that online threats will fade too.
As geopolitical tensions rise between Ukraine and Russia, it’s even more important to be aware of fraud attempts. Intense public interest and a willingness to help means that Americans are sharing information and donating online to a wide variety of causes. This is where the risk of exposure increases, because all it takes is one click for your business to be at risk.
Think for a moment about some of the posts you might have seen recently on social media. Many of these include images of bombed-out buildings, stranded dogs and cats, or children huddled in below-ground shelters — all intended to capture your attention and elicit a sympathetic or action-oriented response.
Many of these images are from legitimate sources that are trying to raise money to help, but some are bogus images and videos serving as bait for malware or viruses. Even if the sender is familiar, exercise caution and conduct due diligence before clicking or following any links from emails or social media posts.
Make sure your employees and vendors are vigilant against phishing emails
Cyber threats are everywhere, and criminals take advantage of the human desire for information. An action as simple as opening an email or clicking a link can deploy keyloggers (also called keystroke logging — these are programs that record which keys are struck on a keyboard), remote-access tools or other possible malicious software onto a person’s computer — typically, without the victim even noticing.
Remote work, which allowed many businesses to continue to function at the height of the pandemic, has made employer cybersecurity even more of a challenge. Employees who access company systems from personal computers don’t always exercise the same caution with their personal systems as they do at work. Because of this, a simple click on a personal Facebook post that contains malware can allow criminals to steal passwords and access work product or work systems.
Alert your employees to exercise caution in handling any email with the subject line, attachments, or hyperlinks related newsworthy events — even if it appears to originate from a trusted source. Criminals have become very adept at “spoofing” legitimate organizations by designing emails that look like they’ve come from news or philanthropic organizations. Many of these are phishing email campaigns, circulating using subject lines related to the Ukraine crisis. Do not open unexpected attachments or click on links in suspicious emails.
Once cybercriminals gain access to a system, a lot of the damage is done. They can lock you and your employees out of the company network, demanding a ransom in exchange for returning your own systems to your control. They can access your payment-processing systems and either extort your vendors or pose as a representative of your company to withdraw funds.
This raises another important point: your third-party service providers are subject to the same risks. Know how they interact with your systems, monitor vendor access to your network, and ensure they maintain cybersecurity programs that are in line with your risk tolerance.
Make sure you are speaking with experts about cybersecurity, including your commercial lender, and your business-insurance provider. They are your partners in this fight against fraud.
How to avoid becoming a victim of fraud:
• Educate your employees on how to identify potential fraud.
• Know how your vendors interact with your network and ensure they are following cyber-safe practices.
• Follow CISA’s Shields-Up guidance (https://www.cisa.gov/shields-up), which outlines general cybersecurity practices that will help your business resiliency in the event of a cyber-attack.
• Check out the free tools and resources available from the U.S. Small Business Administration (https://www.sba.gov/business-guide/manage-your-business/stay-safe-cybersecurity-threats).
If you do become a victim of fraud, there are steps you can and should take. One of the first things you should do is notify your bank. It is there to offer support if you have an incident, as well as provide guidance to help you build stronger defenses. Additional resources to help you better prepare your company for the current cyberthreat environment are available from the Cybersecurity & Infrastructure Security Agency at www.cisa.gov.
Terra Carnrike-Granata is senior VP and senior director of information security at NBT Bank, where she designs and implements sophisticated controls to prevent loss and mitigate risk, while also developing innovative ways to educate consumers and businesses on cyber threats.
Lockheed’s Syracuse–area plant wins $129M contract modification
SALINA, N.Y. — The U.S. Army has selected the Salina plant of Lockheed Martin Corp. (NYSE: LMT) for a $129 million modification to a previously awarded contract for six radar systems and related equipment and services for the military of Romania. This modification also provides for spare parts, tool kits, remote computer display units, integrated
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
SALINA, N.Y. — The U.S. Army has selected the Salina plant of Lockheed Martin Corp. (NYSE: LMT) for a $129 million modification to a previously awarded contract for six radar systems and related equipment and services for the military of Romania.
This modification also provides for spare parts, tool kits, remote computer display units, integrated computer systems, training, contractor technical assistance, field-service representatives, software support, and program management. That’s according to a May 12 contract announcement from the U.S. Department of Defense.
Work will be performed in Salina with an estimated completion date of Aug. 11, 2026. Fiscal 2022 foreign military sales (Romania) funds totaling $129,040,507 were obligated at the time of the award.
The U.S. Army Contracting Command at Aberdeen Proving Ground, Maryland, is the contracting authority.
Lockheed Martin is a Bethesda, Maryland–based defense contractor. In greater Central New York, it operates plants in Salina and Owego.

St. Elizabeth College of Nursing graduates 47 new nurses in class of 2022
UTICA, N.Y. — The 2022 class of 47 nurses graduated from the St. Elizabeth College of Nursing (SECON) on Saturday, May 14. Of the graduates, 42 attended weekday classes and five participated in the college’s evening/weekend program. Mary, Mother of Our Savior Parish hosted the 116th graduation ceremony, the college said in a news release.
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
UTICA, N.Y. — The 2022 class of 47 nurses graduated from the St. Elizabeth College of Nursing (SECON) on Saturday, May 14.
Of the graduates, 42 attended weekday classes and five participated in the college’s evening/weekend program. Mary, Mother of Our Savior Parish hosted the 116th graduation ceremony, the college said in a news release.
College President Varinya Sheppard, Dean of Student and Faculty Development Julie Wells-Tsiatsos, Weekday Senior Class Advisor MaryAnne Smalls, and Weekend Senior Class Advisor Shannon Holtslag presented the graduates with their associate in applied science degrees and SECON pins.
Symeon Tsoupelis, owner of Symeon’s Greek Restaurant, Inc., gave the commencement address.
Malika Grigoryan, of Utica, was valedictorian, while Danielle DeCarr of Whitesboro was salutatorian.
SECON says it is accredited by the Middle States Commission on Higher Education and the Accreditation Commission for Education in Nursing, Inc., and is registered by the New York State Education Department.

C Squared Systems renews lease on Corporate Drive in DeWitt
DeWITT, N.Y. — Telecommunications company C Squared Systems, LLC recently renewed the lease of its office space at 6027 Corporate Drive in the town of DeWitt. Gary Cottet and Patrick Hillery, of Cushman & Wakefield/Pyramid Brokerage Company, negotiated the lease renewal, according to a release from the real-estate firm. No terms of the lease were
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
DeWITT, N.Y. — Telecommunications company C Squared Systems, LLC recently renewed the lease of its office space at 6027 Corporate Drive in the town of DeWitt.
Gary Cottet and Patrick Hillery, of Cushman & Wakefield/Pyramid Brokerage Company, negotiated the lease renewal, according to a release from the real-estate firm. No terms of the lease were disclosed, including square footage.
Boss Properties, LLC owns the 6027 Corporate Drive property, which includes a one-story, 6,720-square-foot building on just over 1.1 acres of land, according to Onondaga County’s online real-estate records.
C Squared Systems is a radio-frequency engineering, consulting, and software-development company specializing in providing services for wireless coverage. It offers solutions including in-building wireless, Wi-Fi Networks, remote monitoring and management, wireless consulting, and software development, per its website. In addition to the Syracuse–area office C Squared also has locations in Auburn, New Hampshire (headquarters); Clifton, New Jersey; and Lanham, Maryland.

Church Street Apartments in Port Byron are sold
PORT BYRON, N.Y. — The Church Street Apartments, a 39-unit apartment complex at 27 Church St. in Port Byron, has been sold. DePaul Acquisitions, LLC purchased the complex from Port Byron Redevelopment Co., LP for $1, plus the assumption of the mortgage loan, according to a release from Hemisphere Holdings Corp. The loan amount was
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
PORT BYRON, N.Y. — The Church Street Apartments, a 39-unit apartment complex at 27 Church St. in Port Byron, has been sold.
DePaul Acquisitions, LLC purchased the complex from Port Byron Redevelopment Co., LP for $1, plus the assumption of the mortgage loan, according to a release from Hemisphere Holdings Corp. The loan amount was not disclosed.
Richard L. Will, president of Syracuse–based Hemisphere, brokered the sale. The transaction closed on April 29. The real-estate firm says it specializes in brokering multi-family apartment properties across upstate New York.

Three small businesses begin operations in downtown Ithaca
ITHACA, N.Y. — Two eateries and a waxing salon are now conducting business in downtown Ithaca. The businesses are Lev Kitchen, Adam Grill, and the Pretty Peach Wax Studio. Representatives from the City of Ithaca, Downtown Ithaca Alliance (DIA), and Tompkins Chamber participated in April 22 ribbon-cutting ceremonies held at each of the businesses, DIA
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
ITHACA, N.Y. — Two eateries and a waxing salon are now conducting business in downtown Ithaca.
The businesses are Lev Kitchen, Adam Grill, and the Pretty Peach Wax Studio.
Representatives from the City of Ithaca, Downtown Ithaca Alliance (DIA), and Tompkins Chamber participated in April 22 ribbon-cutting ceremonies held at each of the businesses, DIA said.
“We are delighted to welcome these three businesses to our community,” Gary Ferguson, executive director of the Downtown Ithaca Alliance, said. “Each one of them brings a unique experience to our area, and we hope the community will enjoy the dining experiences at Adam Grill and The Lev Kitchen and will try the self-care services at The Pretty Peach. We thank each of them for their investment, and we look forward to seeing them thrive and grow.”
About the businesses

Lev Kitchen, located at 222 E. State St. on the Ithaca Commons, specializes in Middle Eastern cuisine. Its concept is inspired by a Yemeni flatbread called Malawach and the amalgamation of distinctive cuisines and cultures from countries such as Israel, Lebanon, and Syria, as described in the DIA announcement.
Benjamin Plotke and Yen Wu — both Cornell University School of Hotel Administration graduates — are the owners of this new eatery.
For its employees, the couple works with Ithaca Welcomes Refugees; Open Doors English; and Catholic Charities to obtain referrals for people who may be struggling to find a job due to language or cultural barriers.
The story of Adam Grill began in Ithaca two years ago when owner Galal Hassanien (aka Jimmy) brought his family and street-food business from Brooklyn to the Ithaca Commons. Late in 2021, the business found a new home in Center Ithaca’s food court. The eatery focuses on Halal food items such as gyros, kebabs, rice bowls, falafel, and other popular Mediterranean dishes. Souad Azzouay, Galal’s wife, prepares the fresh baklava available daily. Adam Grill also serves other fresh baked goods, such as muffins and croissants, as well, DIA said.

The Pretty Peach Wax Studio has a team of estheticians that treat their clients to an array of body-waxing services. Joy Draper is the creator and owner of the Pretty Peach, which has its flagship location in Syracuse.
Prior to starting the Pretty Peach, Draper worked in the pharmaceutical industry, but she eventually got “tired of corporate America” and decided to start her own business, DIA said. In 2017, she obtained her waxing certification from Shear Ego International School in Rochester. A year later, she launched the Pretty Peach.
“Once again, the vibrancy of our community has been improved by inspiring entrepreneurs such as Joy, Jimmy, and Ben & Yen — adding quality products and services to our mix of locally owned businesses,” Jennifer Taveres, president and CEO of the Tompkins County Chamber of Commerce, said.

PAR’s strong Q1 revenue offset by operating costs
NEW HARTFORD, N.Y. — Last year’s acquisition of loyalty and guest-engagement platform Punchh paid off in double-digit sales growth in the first quarter of 2022 for PAR Technology Corp. (NYSE: PAR), but a number of factors still led to an overall net loss in the period. PAR revenue increased 47.4 percent to $80.3 million in
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
NEW HARTFORD, N.Y. — Last year’s acquisition of loyalty and guest-engagement platform Punchh paid off in double-digit sales growth in the first quarter of 2022 for PAR Technology Corp. (NYSE: PAR), but a number of factors still led to an overall net loss in the period.
PAR revenue increased 47.4 percent to $80.3 million in the quarter, up from $54.4 million in the year-ago period, with the 2021 purchase of Punchh contributing $11.2 million.
“This revenue growth was driven across all business lines and specifically around our software recurring revenues,” PAR CEO Savneet Singh said during a May 10 conference call with investors.
PAR’s net loss in the first quarter was $15.7 million, or 58 cents per share, compared to a net loss of $8.3 million, or 38 cents, in the same quarter in 2021. Adjusted net loss for the latest quarter was $7.1 million, or 26 cents a share, down from
$7.6 million, or 34 cents, a year earlier.
The loss was less than the 41-cent loss predicted by Zacks Equity Research. With a “hold” rating for PAR shares, the research report noted PAR’s revenue surpassed Zacks’ estimate by 5.62 percent. This is the fourth straight time the company has topped Zacks revenue estimates.
Zacks forecasts $78.73 million in revenue for PAR in the second quarter with a loss of 37 cents per share and full-year revenue of $319.3 million with a loss of $1.41 a share.
Speaking about the company’s revenue growth, Singh noted that PAR’s Brink cloud point-of-sale system and Punchh both contributed.
In the first quarter, PAR activated 1,244 new Brink sites. The company increased its active Brink store count by 40 percent to 17,000, compared to last year.
“Brink continues to be the distinguished leader in cloud POS for enterprise QSR (quick-service restaurants) and fast casual restaurants,” Singh contended.
PAR added more than 1,500 new Punchh sites in the latest quarter and now has more than 58,800 active sites.
“Digital loyalty programs are critical to the future of restaurant marketing,” Singh said. “Applications like Punchh make it easier for brands to connect with their most loyal customers and increase customer lifetime value or account book.”
Punchh currently has more than 200 million “loyalty guests,” each unique to a brand. Some guests are duplicated across brands, but the firm has more than 150 million unique guest profiles, which represents about 58 percent of adults in the U.S., Singh said. PAR acquired Punchh for $500 million in cash and shares in the spring of 2021.
PAR’s product revenue in this year’s first quarter was $25.1 million, up 35 percent from $18.6 million in the year-prior quarter. The growth was driven primarily by hardware-refresh investments, CFO Bryan Menar told investors.
Service revenue in the first quarter totaled $33.8 million, up 87 percent from $18 million in the year-ago period, fueled mainly by the $11.2 million in Punchh sales. Total subscription services’ revenue jumped to $21.7 million in the latest quarter from $8.4 million in Q1 2021 as the company works to expand its total recurring revenue base of both software-related services and hardware-support contracts.
Contract revenue from PAR’s government business rose 20 percent from $17.9 million year ago to $21.4 million in the latest quarter. “The increase in contract revenue was driven by a $2.7 million increase in our ISR solutions product line,” Menar said. PAR maintains a significant contract backlog, totaling $195.7 million as of March 31, 2022, compared with $140.1 million a year ago.
PAR also experienced an increase in operating costs of $7.9 million, bringing its costs to $22.4 million for the first quarter from $14.5 million in the year-ago quarter. That increase was primarily driven by $6.6 million in total Punchh operation expenses, Menar said.
PAR’s research and development costs totaled $10.8 million in this year’s first quarter, up from $5.8 million in the same quarter in 2021, with Punchh driving $3.4 million of that increase, he noted.
PAR also used $21.2 million cash in operating activities, up from just $3.4 million in the year-prior period. The increase was due to a $5 million rise in accounts receivable related to the government segment, a $5 million increase in inventory to ensure prompt product shipment in spite of supply-chain issues, and the payout of the company’s annual cash bonus.
Headquartered in New Hartford, PAR Technology develops and markets products for hospitality operators including software, hardware, and services. PAR also provides computer-based system design and engineering services to the U.S. Department of Defense and federal-government agencies.
Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.