Want to receive these posts in your inbox? Subscribe now!

Recent Posts

What is SIP and How do I Use It?

Michael Martin

What is SIP?

Read More

Anatomy of a Hack

Michael Martin

October is Cybersecurity month. This month we have been featuring a series of blogs for your education of on-line dangers to help you make safe choices to protect your identify and data.

Read More

6 Ways to Protect Yourself from Identify Theft

Michael Martin

Cybercrime is not just a current threat to businesses. Javelin Strategies reported that US residents lost $16.8 billion in 2017 to fraudsters – an 8% increase over the prior year. As identify thieves are becoming more cunning, it is imperative that consumers utilize precautions to protect their data and their money.

Read More

Disaster Planning FAQs

Michael Martin

There is often confusion between disaster planning and business continuity. We have pulled together 7 common questions to explain the differences and to share how your company can benefit from prudent planning before disaster strikes.

Read More

As-a-Service Model (aaS) – You too can Benefit

Michael Martin

As technology and delivery models evolve, the as-a-Service option has become more popular and common in today’s businesses. There are numerous reasons for this shift including cost containment and ease of procurement.

Read More

Which Type of VoIP Fits Your Company's Needs

Michael Martin

VoIP - Know Your Options to Determine What is Right for You VoIP is here to stay. Major carriers are decommissioning old copper-based networks in favor of better performing fiber and IP is prevailing over traditional voice transmission. 

Read More

On-premise Phone System? Save Money with SIP

Michael Martin

Many companies face either the challenge of having outgrown their traditional analog or digital phone system or wanting additional features, flexibility and cost-savings. In order to leverage existing equipment and technology, control costs and improve collaboration, many companies are considering Session Initiation Protocol (SIP), an application-layer protocol used for IP based phone systems.

Read More

Is VoIP Secure?

Michael Martin

Data breaches are in the news every day. When large businesses like Equifax, Target, and Uber are being infiltrated, it is hard to be confident that the technology that you use is secure and that your information is safe.

Read More

Is the Cloud Secure?

Michael Martin

Many people are skeptical that the cloud is secure due to lack of knowledge about the technology and measures to protect the data from within. In the United States, more than 90% of enterprises and 52% of small and medium sized businesses use the cloud specifically for storage. In reality, many professionals perceive the cloud to be quite secure as compared to legacy platforms which are on-premise back-up, storage and computing systems. This was confirmed in a survey of IT professionals of medium to enterprise level companies conducted by Clutch. 64% said that the cloud is more secure than legacy systems. In fact, CFO’s are also jumping onboard. According to Forbes Magazine, 74% of Tech Chief Financial Officers (CFOs) say cloud computing will have the most measurable impact on their business in 2017.

Read More

4 Essential VoIP Training Topics for Staff – Part One

Michael Martin

So, your company has finally made the move to a VoIP phone system.  Congratulations - gone are the days of bulky, high-maintenance phone closets and waiting for IT or the phone provider to make a programming change. Welcome to the new age of flexibility, efficiency, and feature-rich call functionality.

Read More

THIS BLOG claims no credit for any images posted on this site unless otherwise noted. Images on this blog are copyright to their respectful owners. If there is an image appearing on this blog that belongs to you and do not wish for it appear on this site, please E-mail with a link to said image and it will be promptly removed.

 

Subscribe to Email Updates

BLOG INDEX