Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.
VIEWPOINT: Cyberattacks Take Aim at Business
While hacking, data theft, and corruption dominate the headlines, the threats to businesses posed by cyberattacks stretch far beyond the digital realm. Consumers are increasingly concerned about the security of their information that is held by companies they patronize and are negatively influenced if they believe a business is not adequately protecting data. A PricewaterhouseCoopers survey found […]
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
While hacking, data theft, and corruption dominate the headlines, the threats to businesses posed by cyberattacks stretch far beyond the digital realm. Consumers are increasingly concerned about the security of their information that is held by companies they patronize and are negatively influenced if they believe a business is not adequately protecting data. A PricewaterhouseCoopers survey found that 87 percent of consumers are willing to take their business elsewhere if or when a company has a data breach.
In the wake of highly publicized attacks, business expenditures for cybersecurity reached $123 billion in 2020 according to the research firm Gartner. At the same time, studies conducted by the insurance firm Hiscox found that more than 70 percent of businesses are still unprepared for a cyberattack. The rapid race by businesses of all sizes to leverage technology to improve efficiency and gain competitive advantage has brought with it an unprecedented host of complex threats that most are ill-prepared to protect themselves against.
For centuries, entrepreneurs have had to overcome physical threats such as fire, flood, and theft to avoid being the next shop with a “Going Out of Business” sign in the front window. These risks were largely visible, tangible, local, and not likely to change quickly over time. On the contrary, threats to digital assets are everything that physical risks are not. They are virtual, invisible, global, and rapidly evolving. Mitigation strategies that are effective against a particular computer attack right now might be rendered permanently obsolete in the next few seconds.
While the world’s consumers create a seemingly insatiable demand for connectivity and 24/7-anywhere access to information of all kinds, businesses are racing to stay relevant in an increasingly tech-dominated world. Unfortunately, security is the often-overlooked component of this race forward, falling victim to budget constraints, ignorance, and apathy.
As technology evolves, so do the threats to its security. The first hackers often focused on gaining access to systems just to prove they could. Damage to, or theft of data was rare. Much has changed in just a few short decades. Modern cyberattacks are coordinated, sophisticated, and well-funded operations often run by criminal enterprises or even nation states. The goals of exploiting security weaknesses are largely financial, but also increasingly include corporate or political espionage.
Of all the modern cybersecurity threats, ransomware has rightly dominated the headlines. In the simplest terms, this attack traditionally involved “kidnapping” the victim’s data in place by encrypting it with a password only known to the attacker. The data was technically still on the victim’s systems; however, it was completely inaccessible. The key to unlock the data would ostensibly be provided after the victim paid the demanded ransom. Attackers would indiscriminately attempt to infect millions of computers without regard to the importance of the systems, or the potential victim’s ability or desire to pay the demanded fee. Surviving a traditional ransomware attack was largely a mixed bag. Sometimes victims paid the ransom and regained access to their files, sometimes the ransom was paid, and the key was never provided and, in some cases, even the attackers lost track of how to decrypt the files. For years, mitigation steps for ransomware relied heavily on restoring lost data from backups and eliminating the security gaps that allowed the attack to occur in the first place.
In the past few years, ransomware attacks have evolved into much more sinister and sophisticated attacks. Businesses and government entities are now the preferred targets, with a preference for critical infrastructure and services. The “kidnapping in place” model has also been modified to include the theft of sensitive data and attempts to establish long-term, persistent access to the victim’s computer systems that can be used to conduct further malicious acts. Stolen data is increasingly being used to further extort the victim through threats to release it publicly if the ransom is not paid. This was recently highlighted when the Washington D.C Police Department was attacked by ransomware and the attackers subsequently posted police officers’ personnel records and street-gang intelligence information on the Internet when their demands were not met.
Contrary to the beliefs of some people, ransomware attacks can be prevented, mitigated, and you can recover from them. Like the attacks themselves, cyber protection and prevention mechanisms are rapidly evolving and necessarily must be complex and comprehensive. The need for sophisticated prevention, protection, and response mechanisms places modern cybersecurity outside the reach of traditional information technology departments and do-it-yourself operations.
Ransomware prevention, like all other cybersecurity, requires a multi-faceted approach from numerous disciplines. There is no single tool, software, or procedure that can do it all. The following list highlights a comprehensive methodology for ransomware prevention and preparedness:
• Be proactive. Recovery after an attack is more difficult and expensive than preventive measures
• Engage cybersecurity specialists
• Conduct periodic vulnerability assessments and penetration tests of all networks and systems
• Remediate all known and identified security gaps
• Create, test, and utilize comprehensive disaster recovery and business-continuity plans
• Ceate and test full, offline backups of all critical data
• Create, test, and utilize incident-response plans that address cybersecurity threats
• Establish retainer agreements for cyber-incident response specialists
• Budget appropriately. Security costs are necessary and recurring.
Cyberattacks and risks to data security represent a clear and present danger to the ability of companies of all sizes and sectors to grow and prosper. A single attack against an ill-prepared business can cause crippling recovery costs and damage customer confidence beyond repair. The takeaway from the many entities that have suffered and recovered from cyber incidents in the past is that it does not have to be a death sentence. In the end, those that are proactive, plan, and prepare will be the ones most likely to survive and thrive in this rapidly changing landscape.
Tony Martino is co-founder and chief operating officer of Anjolen Inc. Contact him at Tony@anjolen.com.
VIEWPOINT: DOL Issues New Cybersecurity Guidance for Plan Sponsors, Others
On April 14. 2021, the U.S. Department of Labor (DOL) issued much-needed guidance concerning best practices for plan sponsors, fiduciaries, record-keepers, participants and beneficiaries pertaining to cybersecurity for retirement plans. The DOL’s guidance focuses on three specific topics: hiring service providers, managing cybersecurity risks, and online-security tips for participants to avoid risk of fraud and loss. Although
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
On April 14. 2021, the U.S. Department of Labor (DOL) issued much-needed guidance concerning best practices for plan sponsors, fiduciaries, record-keepers, participants and beneficiaries pertaining to cybersecurity for retirement plans.
The DOL’s guidance focuses on three specific topics: hiring service providers, managing cybersecurity risks, and online-security tips for participants to avoid risk of fraud and loss. Although the guidance was couched as “best practices,” it is reasonable to interpret it as creating minimum cybersecurity standards and practices for retirement plans. The guidance specifies the duty of plan fiduciaries to protect plan data against cybersecurity breaches and attacks, and potentially signifies a precursor for the DOL to assess liability for damages stemming from plan data breaches in the future. Although the guidance did not address health and welfare plans, those plans may also wish to consider implementing these measures.
Here is a summation of some of the key points raised in the guidance, as well as some helpful insights to be considered in connection with the DOL’s recommendations.
I. Hiring service providers
Under ERISA, plan fiduciaries must act prudently when selecting and retaining plan-service providers. Since plan-service providers are often relied upon to preserve and secure plan records and participant data, it is essential that fiduciaries ensure that service providers implement strong measures to defend this information against potential cyber threats. When retaining service providers, the DOL recommends that plan sponsors make certain that vendors have sufficient security systems in place to guard against attacks and prevent potential breaches. The DOL offered the following suggested practices when contracting with service providers:
• Security standards: Review providers’ security standards, practices, and policies. Request audit results verifying the sufficiency of their security systems and compare these results to industry standards. Plan fiduciaries should look for vendors who follow a recognized information security standard that validates its compliance and utilize an independent auditor to verify information security, system/data availability, processing integrity, and data confidentiality.
• Effectiveness review: Verify the security standards employed by service providers and their validation process to ensure their security practices comply with these requirements and ensure that their audit results reflecting compliance are available for review.
• Reputation in the industry: Check service providers’ track record in the industry, including any public information related to prior security incidents, as well as any litigation and legal proceedings related to their services.
• Prior incidents: Consider vendors’ previous security breaches, reviewing all details regarding those incidents and their response to the attacks.
• Insurance coverage: Review the service providers’ cybersecurity-insurance policies and their scope of coverage to address losses incurred from security breaches or identity thefts. Confirm whether their insurance coverage will cover breaches caused by both their own workforce, as well as external attacks. Consider requiring vendors to maintain additional insurance coverage (i.e., professional liability, errors and omissions liability, cyber liability and privacy breach insurance, and/or fidelity bond or blanket crime coverage). Confirm policy limitations before counting on such coverage for loss protection.
• Ongoing compliance: Ensure that contracts require vendors to maintain their cybersecurity and information security standards originally agreed to by the parties throughout the term of the contract, and beyond (if applicable). Consider requiring notice in the event of a change in their systems which impacts their ability to meet these criteria, or deviations from their prescribed security standards.
• Limitation of liability: Address any contractual provisions which seek to limit responsibility or liability of the service provider for cybersecurity breaches.
• Reporting: Require annual third-party audits to determine compliance with cybersecurity policies and procedures and require access to the results of those reviews.
• Data usage: Specifically dictate vendors’ obligations to preserve the privacy of all confidential data, prevent any use or disclosure of confidential information without written permission, and incorporate a stringent standard of care to guard against the unauthorized use (or misuse), access, loss, disclosure, or modification of confidential information.
• Records retention and destruction: Specify vendors’ obligations to comply with all applicable federal, state, and local laws, rules, regulations, directives, and other governmental requirements pertaining to the privacy, confidentiality, or security of confidential information.
• Notice: Include terms requiring vendors to provide notice for any incident or breach, specifying the timeframe for such notice and mandating service providers’ cooperation to investigate and address the cause of the breach.
II. Cybersecurity best practices
The DOL has provided this list of best practices for plan record keepers and other service providers to follow:
• Save a formal, well-documented cybersecurity program;
• Conduct prudent annual risk assessments;
• Have a reliable annual third-party audit of security controls;
• Clearly define and assign information security roles and responsibilities;
• Have strong access control procedures;
• Ensure that any assets or data stored in a cloud or managed by a third-party service provider are subject to appropriate security reviews and independent security assessments;
• Conduct periodic cybersecurity-awareness training;
• Implement and manage a secure-system development life-cycle program;
• Have an effective business-resiliency program addressing business continuity, disaster recovery, and incident response;
• Encrypt sensitive data, both stored and in transit;
• Implement strong technical controls in accordance with best security practices; and
• Appropriately respond to any past cybersecurity incidents.
III. Online-security tips
The DOL also outlined a number of security tips, reflecting that participants and beneficiaries also play a large role in the security of their plan accounts. The DOL recommends that users utilize strong and unique passwords for their accounts, add multi-factor authentication to log in, and regularly monitor accounts to guard against the risk of fraud and loss. In addition, the DOL suggests that participants and beneficiaries update their contact information with plans and sign up for account activity notifications to ensure they are notified of any unauthorized account activity. Among the other tips offered, the DOL urges users to avoid public Wi-Fi networks, remain mindful of phishing attacks, and use up-to-date antivirus software.
Retirement-plan precautions
Retirement plans are literal treasure troves for cyber criminals — holding large amounts of fund and personal information concerning participants and beneficiaries. Recognizing this concern, the DOL’s new cybersecurity guidance may provide a glimpse into future enforcement actions and criteria to assess prudence by fiduciaries in the event of a cyberattack. Plans should consider these tips and insights when engaging new service providers to ensure vendors are taking appropriate precautions to safeguard plan data. They may also wish to revisit current contracts with their present vendors to address any areas where their contracts are silent, as well as consider whether additional measures are necessary to ensure the security and confidentiality of plan data.
Administrators may also wish to review and update their plans’ document and retention policies to reflect this new guidance and review their vendors’ policies to confirm if amendments are warranted — with a particular focus on how vendors handle plan data upon expiration or termination of their agreement.
Despite recognizing the important role played by participants and beneficiaries in securing their plan accounts, recommendations regarding cybersecurity education were notably absent from this guidance. Nonetheless, plans may wish to consider passing along the DOL’s online-security tips to account holders.
Lawrence J. Finnell is a senior counsel in the New York City office of the Syracuse–based law firm of Bond, Schoeneck & King PLLC. Contact him at lfinnell@bsk.com. This article is drawn from the firm’s Employee Benefits Law Information Memo.
VIEWPOINT: Preparing for Ransomware
A look at recent news headlines continues to show the impact that ransomware has on our everyday life. Whether it be the attack on Colonial Pipeline which set off a potential gas-supply shortage or the attack on JBS, a meat packer, the news keeps coming. Last year in the U.S. alone, more than 100 federal, state, and local
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
A look at recent news headlines continues to show the impact that ransomware has on our everyday life. Whether it be the attack on Colonial Pipeline which set off a potential gas-supply shortage or the attack on JBS, a meat packer, the news keeps coming. Last year in the U.S. alone, more than 100 federal, state, and local governments; 500 health-care centers; 1,600 educational organizations; and thousands of businesses were victims to ransomware. That’s according to “The State of Ransomware in the US: Report and Statistics 2020,” published by Emsisoft Malware Lab in January.
That impact is also felt by small and mid-sized businesses (SMBs) as it was found in 2020 that the average cost of a ransomware event for SMBs totaled $505,827 per incident (including downtime, lost business, rebuilding and upgrades, etc.). The cost is only increasing, especially when you consider lost revenue and reputational harm to your business. According to the Beazley Group, a cyber-liability insurance provider, small and medium businesses are most at risk of ransomware, with more than 62 percent of claims. Beazley also reports that ransomware attacks increased 130 percent in 2020.
In the past two years, the Cyber Defense Institute has assisted clients with ransomware incidents that ranged in cost from $600,000 to over $10 million right here in Central New York. Many ransomware attacks do not get reported as companies fear reputation loss and bad press. As a result, experts agree that the true number of attacks and cost of those attacks is grossly underestimated.
Ransomware is a type of computer malware that has a specific goal in mind — holding your data hostage until you pay a ransom. Early variants of ransomware would install on a single computer in your network and wreak havoc on your shared files. Today’s variants are using more sophisticated techniques in which they worm their way through your network, sometimes for months without detection, before detonating on as many systems as they can at once. This increases the likelihood you’ll pay the ransom because all your servers and workstations are infected all at once.
Recommendations
Awareness training. The most-common method of infection from ransomware is still malicious emails. Another common method is so called “drive by downloads” in which a malicious file is downloaded from an infected website. Because of this, end-user security awareness training is one of the key strategies you should be implementing to protect your business from ransomware. This end user-training should include continuous phishing training and at least one hour several times per year of direct computer-based training content. This phishing training should include a system that sends fake phishing emails to your users to give them real-world experience dealing with phishing emails. Weekly security reminders that detail the most-current threats and scams are also highly effective.
Two-factor authentication for applications and email is another easy win. Stolen credentials allow criminals to steal data and send malicious emails using legitimate email addresses to unsuspecting friends and colleagues.
Anti-virus/malware software. Another critical component to your anti-ransomware strategy needs to be anti-virus/malware software that can prevent advanced threats such as ransomware. Traditional antivirus is no longer enough and the need for advanced-threat protection is critical. Software that includes endpoint detection and response (EDR) features are commonly used in cases of ransomware to help clean it up and stop it from spreading. For this reason, you should consider a similar product to help protect your environment. It also goes without saying that it is critical that you maintain your subscriptions with your antivirus vendor. There is nothing worse than getting a malware infection because you forgot to renew your antivirus license or update your current product regularly.
Implement a SIEM — Security Information and Event Management System — to provide continuous monitoring of your network 24/7, 365 days a year, which can also be coupled with a dedicated Security Operations Center (SOC) to notify you of incidents. These systems provide real-time alerts of suspicious or malicious activity on your network, enabling a fast response and prevention.
System patches and updates are another key component to reducing the risk of ransomware. Making sure you run your Windows updates on every machine, all the time, keeps your systems protected from the latest vulnerabilities. Don’t forget to keep your firewalls, printers, and other network devices up to date as well. These commonly forgotten devices are also frequently attacked by malicious actors and can lead to ransomware or other harm to your network.
Cyber-liability insurance. When you buy an insurance policy, it should specifically cover ransomware or data-extortion costs. And do not skimp on coverage limits. We recommend a minimum of $1 million for any size of business.
Develop and practice an incident-response plan. A solid incident-response plan that is documented, known to all involved, and practiced at least once a year will save critical time when responding to an incident. Remember those fire drills in grade school?
Layer your defenses. This is also known as defense in depth. Develop multiple roadblocks and segment networks wherever possible.
Carefully consider the options before you pay the ransom. This is easy to say when you are in crisis mode, but the research by Sophos and others points to increased costs for those that do pay. Even after paying the ransom, the cost for upfront protection, user training, and a solid backup strategy is the least-expensive way to stay safe and recover if you do get hit.
Backups. Finally, and perhaps the most important protection against the harms of ransomware, is to have excellent backups of your systems. The difference between quickly recovering from ransomware while not paying the ransom is directly correlated to the quality of your backups. A restore from backup can many times be a quick way to give a ransomware extortionist the boot. However, you need to make sure your backup system includes more than one copy of your data. Typically for an SMB this includes a copy in your office and a copy in the cloud. We also recommend keeping backups for at least 90 days as malware sometimes remains dormant for several months before calling out to the ransomware host. There are several other backup tactics that can be implemented depending on your overall IT infrastructure.
Unfortunately, for most, ransomware is a matter of “when” and not “if.” However, you can reduce the impact it has on your business by taking steps now to better prepare for the inevitable. Ransomware does not have to be a potentially business-killing event if you properly prepare your business now. Doing nothing and ignoring the threat is no longer an option.
Jim Shea is president of Cyber Defense Institute, Inc. (www.cyberd.us), a Syracuse–based, regional cybersecurity consulting and training firm specializing in cybersecurity regulatory compliance, cyber risk management, and cybersecurity assessments. Contact Shea at jrshea@cyberd.us. Brandon Finton is the senior security engineer at Cyber Defense Institute. Contact him at bfinton@cyberd.us.
Syracuse City School District Educational Foundation elects new board members
SYRACUSE, N.Y. — The Syracuse City School District (SCSD) Educational Foundation recently announced that the following six people have been elected to serve three-year terms as directors on its board of directors: • Rich Conway, director of sales at Syracuse Office Environments • Kari Krause, state-licensed real-estate salesperson at Acropolis Realty Group • Kenyon Black, program director for
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
SYRACUSE, N.Y. — The Syracuse City School District (SCSD) Educational Foundation recently announced that the following six people have been elected to serve three-year terms as directors on its board of directors:
• Rich Conway, director of sales at Syracuse Office Environments
• Kari Krause, state-licensed real-estate salesperson at Acropolis Realty Group
• Kenyon Black, program director for Le Moyne College Upward Bound Program
• Diana Clark Perez, Spanish teacher at SCSD Institute of Technology at Central & adjunct Spanish instructor at Syracuse University
• Rickey Brown, principal at Diversify-NY LLC
• Tim O’Donnell, regional sales manager at CMD Outsourcing Solutions
Founded during the 2002-2003 school year, the SCSD Educational Foundation is a 501(c)(3) not-for-profit independent fundraising organization charged with providing supplemental resources for educational programs in the city schools. Foundation board members include representatives of local corporations, school-district administrators, government officials, and two district high-school students.
Lockheed Martin’s suburban Syracuse plant wins nearly $25 million modification to Navy contract
SALINA, N.Y. — The Lockheed Martin Corp. (NYSE: LMT) plant in the Syracuse metro area has been awarded a $24.6 million modification to a previously awarded contract from the United States Navy. The modification to the pact is to exercise an option for Navy equipment, components, engineering services, and other direct costs, the U.S. Department
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
SALINA, N.Y. — The Lockheed Martin Corp. (NYSE: LMT) plant in the Syracuse metro area has been awarded a $24.6 million modification to a previously awarded contract from the United States Navy.
The modification to the pact is to exercise an option for Navy equipment, components, engineering services, and other direct costs, the U.S. Department of Defense said in a June 22 contract announcement. Work will be performed in Salina (66 percent); Millersville, Maryland (33 percent); and Marion, Massachusetts (1 percent). It is expected to be completed by September 2023.
Fiscal 2020 Navy shipbuilding and conversion funds totaling $4.99 million (or 21.7 percent of the modification); fiscal 2021 shipbuilding and conversion funds of $1.62 million (7 percent); fiscal 2020 other procurement funds totaling $1.3 million (5.6 percent); and fiscal 2021 other procurement funds of $15.1 million (65.7 percent), will be obligated at time of award and will not expire at the end of the current fiscal year. The Naval Sea Systems Command at Washington Navy Yard in Washington, D.C. is the contracting authority, according to the announcement.
Berkshire Bank’s parent company to pay quarterly dividend on July 8
The board of directors of Berkshire Hills Bancorp, Inc. (NYSE: BHLB), parent of Berkshire Bank, recently approved a quarterly cash dividend of 12 cents a common share. The dividend will be payable on July 8, to shareholders of record at the close of business on June 29. At Berkshire Hills Bancorp’s current stock price, the
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
The board of directors of Berkshire Hills Bancorp, Inc. (NYSE: BHLB), parent of Berkshire Bank, recently approved a quarterly cash dividend of 12 cents a common share.
The dividend will be payable on July 8, to shareholders of record at the close of business on June 29.
At Berkshire Hills Bancorp’s current stock price, the dividend yields about 1.7 percent on an annual basis.
Boston–based Berkshire Hills Bancorp has $12.8 billion in total assets and 118 branches, primarily in New England and New York.
Berkshire Bank has more than $621 million in deposits in the Utica–Rome metro area through its 12 branches, good for a 12.55 percent share of all deposits in the market, according to FDIC data as of June 30, 2020. It ranks No. 5 in market share in the region. Berkshire Bank has nine branches in Oneida County and three offices in Herkimer County.
Syracuse’s Digital Hyve now operates as wholly owned subsidiary of Rochester firm
SYRACUSE, N.Y. — Digital Hyve, a digital-marketing agency with offices in Syracuse and Rochester, is now operating as a wholly owned subsidiary of a Rochester firm. Butler/Till, a women-owned, employee-owned, marketing agency, on June 24 announced that it has acquired the Digital Hyve, which operates its Syracuse office at 126 N. Salina St. The deal
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
SYRACUSE, N.Y. — Digital Hyve, a digital-marketing agency with offices in Syracuse and Rochester, is now operating as a wholly owned subsidiary of a Rochester firm.
Butler/Till, a women-owned, employee-owned, marketing agency, on June 24 announced that it has acquired the Digital Hyve, which operates its Syracuse office at 126 N. Salina St.
The deal closed in mid-June, Jeff Knauss, co-founder and CEO of the Digital Hyve, tells CNYBJ in an email. The companies didn’t release any financial terms of their deal.
Under the terms of the agreement, Digital Hyve will retain its brand and become a wholly owned subsidiary of Butler/Till. Kimberly Jones — who was appointed president & CEO of Butler/Till in 2020 — will serve as president & CEO of the combined agency.
Also, Digital Hyve employees will join Butler/Till’s employee stock-ownership plan (ESOP). In the deal, Digital Hyve’s 56 full-time employees have joined Butler/Till, Knauss says. Prior to the acquisition deal, Butler/Till had about 200 employees, according to Knauss.
“Digital Hyve is a natural fit with our culture. They, too, share a passion for their people and are committed to creating a caring, compassionate workplace. Like our employees, they embrace innovation, cutting edge technology and provide top-notch client service,” Jones said. “Butler/Till has been committed to continually making strategic investments to expand service offerings for our clients and strengthen a culture of agility and adaptiveness. The acquisition of Digital Hyve is an exciting opportunity for employees and clients of both organizations as we continue to usher in a new era of growth, innovation, and transformation.”
Both firms will continue to operate in Rochester, Syracuse, and New York City. Digital Hyve has operated offices in both Syracuse and Rochester, while Butler/Till also has an office in New York City.
The acquisition makes the combined organization “one of the largest independent marketing and media agencies in the country,” per the news release. It also “diversifies” Butler/Till’s capabilities, and “expands its reach” within the small and mid-size business market and into new sectors, including retail, automotive, food and beverage, government, education, travel, tourism, and hospitality.
The deal also “strengthens the agency’s commitment” to 100 percent employee ownership.
Knauss and Tanner
Under the terms of the agreement, Knauss and Digital Hyve COO Jake Tanner will serve as consultants through the end of 2021, a term that could be extended, if need be, Knauss tells CNYBJ.
Knauss notes that both he and Tanner plan to leave the company in 2022. Knauss says he’s an investor in multiple companies and will continue public speaking and consulting work until he decides on his next endeavor. Tanner has recently started another company called Unplugged Game Store in Chittenango, which competes in the collectible card and game space, according to Knauss.
SyracuseServes network seeks to help city veterans
SYRACUSE, N.Y. — SyracuseServes is a network that seeks to connect veterans and their families to local community providers to ensure care, resources and services are “easily and successfully navigable.” Syracuse University (SU) is working with the City of Syracuse on the initiative. The overall goal of SyracuseServes is to “maximize collaboration and enhance efficiency”
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
SYRACUSE, N.Y. — SyracuseServes is a network that seeks to connect veterans and their families to local community providers to ensure care, resources and services are “easily and successfully navigable.”
Syracuse University (SU) is working with the City of Syracuse on the initiative. The overall goal of SyracuseServes is to “maximize collaboration and enhance efficiency” for the regional network of providers, the school said.
The coordination center is headquartered in the Daniel and Gayle D’Aniello Building at the SU’s National Veterans Resource Center (NVRC), which is located at 101 Waverly Ave. on the Syracuse campus.
Supported by a $500,000 grant from the New York City–based Mother Cabrini Health Foundation, SyracuseServes will support the city’s veterans and military-connected population first through a “coordinated application to final service delivery.” Military families will have access to “efficient and timely” support, as well as access to a range of needed resources.
J. Michael Haynie, SU’s vice chancellor of strategic initiatives and innovation and founder of the IVMF, said he is proud to launch a program that will serve local Syracuse veterans and their families, including the many who study and work on the campus.
“This grant is one example of how we’re bringing the vision of the NVRC to life in a practical way, leveraging the facility and the IVMF’s expertise to serve the social and wellness needs of veterans and families right here in Central New York,” Haynie said.
The Syracuse network will use lessons from AmericaServes’ 17 other communities, including Rochester; Dallas; Seattle; Charlotte, North Carolina; Pittsburgh; New York City; and Washington, D.C. Some services include help with benefits from the U.S. Department of Veterans Affairs (VA); employment assistance; education; transportation; mental/behavioral health resources; and housing.
The IVMF — which Syracuse describes as the first interdisciplinary academic institute in higher education dedicated to advocacy, research, support for military veterans and their families — “identified the need” for coordinated care for military families, the school said. IVMF’s research indicates that navigating services is the “biggest challenge” in transition — rating higher than finding employment, adjusting to civilian culture, and overcoming financial challenges.
“Because of SU, the City of Syracuse is fortunate to be home to IVMF, one of the nation’s top centers of support for the post-service lives of the nation’s military veterans and their families,” Syracuse Mayor Ben Walsh said in a separate news release. “The IVMF’s AmericaServes program is a proven model for coordinating the resources available in local communities for veterans and their families. I am grateful to Chancellor Kent Syverud and Vice Chancellor Haynie for answering the community’s call to establish a SyracuseServes network here in the City of Syracuse.”
Seneca Foods net sales rise nearly 10% in latest fiscal year
MARION, N.Y. — Seneca Foods Corp. (NASDAQ: SENEA, SENEB) — a Wayne County–based provider of packaged fruits and vegetables, with facilities across the U.S., including Geneva — reported that net sales for the 12-month period ending March 31 rose 10 percent to $1.47 billion from $1.34 billion for the prior year. The company attributed the
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
MARION, N.Y. — Seneca Foods Corp. (NASDAQ: SENEA, SENEB) — a Wayne County–based provider of packaged fruits and vegetables, with facilities across the U.S., including Geneva — reported that net sales for the 12-month period ending March 31 rose 10 percent to $1.47 billion from $1.34 billion for the prior year.
The company attributed the overall increase in sales in the period (which it calls fiscal-year 2021) to increased sales volume of $74.2 million, as well as higher selling prices and a favorable sales mix of $57.6 million. Both factors were present in its canned-vegetables business.
Gross margin as a percentage of net sales increased from 10.6 percent in fiscal 2020 to 15.8 percent in fiscal 2021 due to the favorable impact of higher selling prices and an improved selling mix “outweighing the negative business effects of a smaller than planned pack and incremental expenditures incurred for precautionary and safety measures taken for COVID-19,” the company said in its earnings report issued on June 11.
“Fiscal 2021 was a year of contrasts. While increased pandemic demand for our products led to record financial performance it was overshadowed by the suffering and loss from the virus by many of our employees, their families and our communities.” Paul Palmby, CEO of Seneca Foods, said.
Seneca Foods says it holds the largest share of the retail private label, food service, and export canned-vegetable markets, distributing to more than 90 countries. Products are sold under the Libby’s, Aunt Nellie’s, Green Valley, CherryMan, READ, and Seneca labels, including Seneca snack chips.
CEO FOCUS: Downtown Syracuse Continues to Thrive Following a Year of Uncertainty
Downtown Syracuse is at the heart of the Central New York community and is the vibrant center of a region on the rise. While the past year created significant economic hardships or delayed growth for so many small businesses, it is truly exciting to see so many people returning to explore, eat, shop, and work downtown.
Become a Central New York Business Journal subscriber and get immediate access to all of our subscriber-only content and much more.
Click here to purchase a paywall bypass link for this article.
Downtown Syracuse is at the heart of the Central New York community and is the vibrant center of a region on the rise. While the past year created significant economic hardships or delayed growth for so many small businesses, it is truly exciting to see so many people returning to explore, eat, shop, and work downtown.
As people return, they are coming back to an urban center that continues to evolve and grow as new retail and restaurants open, and development projects and investments take shape. During the pandemic year, downtown welcomed 30 new retail businesses. In just the last two months, new restaurants Luna Loca, Guadalajara Mexican Restaurant, and Day Bird have opened. Earlier this spring, downtown’s first full-service grocery store, the Syracuse Cooperative Market, opened at the Salt City Market.
In all, nearly $80 million in investment activity was completed during the pandemic, with another $172 million in development currently underway or announced. In 2020, 281 new residential units were completed, providing room for downtown’s population to grow another 12.5 percent. Additionally, more than 112 units are under construction right now.
This economic activity is a welcome sign as is the return of workers to downtown offices, both critical components of a full economic recovery following the COVID-19 crisis. Yet, there is more we can all do to ensure downtown’s small businesses, and arts, entertainment, and cultural amenities thrive. This summer, I encourage you to be a tourist in your own community. Go out to eat and shop downtown, visit the weekly farmers market, or take your family to a museum. Buy tickets to be there when the curtains rise at the Landmark Theatre and the Redhouse.
If this past year has taught us anything it is that we are resilient, and together we can make an impact when we support one another. As we begin to see the light at the end of this crisis, let’s continue to invest in our community to make sure this recovery is accelerated and sustained.
To learn more about the progress downtown, download the 2021 Downtown Committee of Syracuse’s annual report (https://downtownsyracuse.com/sites/default/files/2020-2021%20Annual%20Report.pdf), or visit downtownsyracuse.com.
Robert M. Simpson is president and CEO of CenterState CEO, the primary economic-development organization for Central New York. This article is drawn and edited from the “CEO Focus” email newsletter that the organization sent to members on June 25.
Stay up-to-date on the companies, people and issues that impact businesses in Syracuse, Central New York and beyond.