Want to receive these posts in your inbox? Subscribe now!

VoIP Softphone 101

Amy Humphreys

A common offering now through VoIP solution providers is access to a softphone. But what is this? Is it a special piece of hardware? How does it work? Read on for some answers to these questions as well as common benefits of softphone adoption.

Read More

'Tis the season...Cybersecurity tips to stay safe while shopping and giving

Abbey Twining

If you are like many, this time of year brings a flurry of holiday and end-of-year preparations. For some, holiday shopping is on your list of “to do’s” for this coming weekend. For certain, there are deals to benefit from on Black Friday and Cyber Monday. But where there are shoppers, there are criminals trying to take advantage of your rush and lowered awareness.

Read More

VoIP Versus Landline

Pete Kraehmer

Today’s businesses generally utilize one of two technologies for their phone systems: traditional landlines or Voice over IP (VoIP). On average 700,000 customers choose to leave their landlines behind every month. Therefore, it is no surprise that businesses are also considering their options.

Read More

VoIP: SIP Trunking Vs. Hosted PBX

Amy Humphreys

When it comes to implementing Voice over IP (VoIP), two options compete: SIP trunking vs. hosted PBX. Often there is confusion between SIP trunking and hosted PBX.

Read More

What is IOT and How do you Improve Security?

Ben Humphreys

As technology evolves, it is important to stay current. Often, we find out that we are utilizing a technology without realizing it or fully understanding its overarching reach. Today’s topic is IOT – the “Internet of Things”.

Read More

Shelton Copeland – Enterprise Solutions Seller

Amy Humphreys

As part of our ongoing series highlighting members of the Comtel and Simplicity VoIP team, this month, we sat down Shelton Copeland, one of our trusted team members. He has been affiliated with Comtel Communications for almost eleven years. Shelton has played a key role in our success as he has supported numerous enterprise accounts. For this blog post, we wanted to shine the spotlight on him and hear his perspectives about this ever-evolving industry first hand. 

Read More

What is Ransomware & How to Avoid Becoming a Victim

Amy Humphreys

October is Cybersecurity month. This month we will be featuring a series of blogs for your education of the on-line dangers and how to make safe choices. One of the most frightening attacks today is RANSOMWARE.

Read More

What is Business Email Compromise?

Pete Kraehmer

October is Cybersecurity month. This month we have been featuring a series of blogs for your education of the on-line dangers and how to make safe choices.

Read More

2018 State of Cloud & Data Protection Report

Ben Humphreys

Summary of top 10 Findings

Read More

What is SIP and How do I Use It?

Michael Martin

What is SIP?

Read More

THIS BLOG claims no credit for any images posted on this site unless otherwise noted. Images on this blog are copyright to their respectful owners. If there is an image appearing on this blog that belongs to you and do not wish for it appear on this site, please E-mail with a link to said image and it will be promptly removed.

 

Subscribe to Email Updates

BLOG INDEX