As part of our ongoing series highlighting members of the Comtel and Simplicity VoIP team, this month, we sat down Shelton Copeland, one of our trusted team members. He has been affiliated with Comtel Communications for almost eleven years. Shelton has played a key role in our success as he has supported numerous enterprise accounts. For this blog post, we wanted to shine the spotlight on him and hear his perspectives about this ever-evolving industry first hand.
Shelton Copeland – Enterprise Solutions Seller
What is Ransomware & How to Avoid Becoming a Victim
October is Cybersecurity month. This month we will be featuring a series of blogs for your education of the on-line dangers and how to make safe choices.
One of the most frightening attacks today is RANSOMWARE.
Topics: internet security, ransomware
What is Business Email Compromise?
October is Cybersecurity month. This month we have been featuring a series of blogs for your education of the on-line dangers and how to make safe choices.
Topics: cyber security, security, business email
2018 State of Cloud & Data Protection Report
Topics: cloud benefits, cloud security, disaster recovery, thecloud, data, data center growth, data recovery solutions
What is SIP and How do I Use It?
Topics: internet security, sip trunking, data recovery
2018 Verizon Data Breach Investigations Report - Panel Discussion
The 2018 Verizon Data Breach Investigations Report (VDBIR), now in its eleventh year, is an industry benchmark for information on cybersecurity threats.
Topics: data, cybercrime, verizon
Anatomy of a Hack
October is Cybersecurity month. This month we have been featuring a series of blogs for your education of on-line dangers to help you make safe choices to protect your identify and data.
Topics: cyber security, data
What is Phishing & How to Avoid Becoming a Victim
October is Cybersecurity month. This month we will be featuring a series of blogs for your education of the on-line dangers and how to make safe choices.
BYOD - Infected by Malware?
Cybercriminals are increasing and on the lookout for entry points and activities to gain access to our data. Most think of their computer are the primary point of weakness. Unfortunately, your computer is not only device that is vulnerable. In reality, our smartphones and tablets are minicomputing platforms. These too must be monitored and periodically checked for malware.
Topics: data, cybercrime, phishing, malware