banner-section
CALL US 402.398.9580

How to keep your business secure while allowing staff to work remotely

Alyssa Sisco

With the right company culture and technology tools, it’s possible to work effectively and efficiently while outside of the office. Given access to email, chat, video conferencing, cloud collaboration tools, and more, there aren’t a lot of office jobs that can’t be done off-site. Studies show that flexible work options reduce turnover, improve morale and to top it all off, over two-thirds of employers report increased productivity among their telecommuters.

Taking all this into consideration, it's no wonder why the number of people spending at least some of their hours each week working remotely is continuing to rise. When a business decides that allowing their staff to work remotely could positively impact their business, there are some steps they need to take to ensure that they have the proper security measures in place. Here are a few items your business should implement to thwart a cyber attack:

Read More
Topics: Owners & Managers, Trends, Network Security

My phone system can do that?

Dean Buresh

I would estimate that most businesses utilize, at best, around 25% of the features that their phone system has to offer. Make calls, answer calls or let it go to voicemail. That pretty much sums it up, right? Most phone systems offer a variety of functions created simply to make the phone user's life easier. Here are a few features that your system may be capable of that you're not aware of:

Read More
Topics: Phone Systems

What should I look for when buying a new computer?

Ryan Aiken

In this world of ever-changing technology, staying up-to-date and standardizing your computers can be overwhelming. It doesn’t make things easier when it seems like vendors want to sell you the high-end computers, rather than set you up with something more practical (sounds like a car salesman, right?). Looking for a new computer is going to be a lot like looking for a new car.

When you’re shopping for a new car, you tend to know the size, trim, brand, etc.… With computers, it will be the same, except with computer parts instead. Check out this guide to learn the main components that make your computer run. You can use this to make a decision about what to look for in a personal or business computer.

Read More
Topics: Equipment Purchases, Owners & Managers

Meet the Team: Sue Sims

Alyssa Sisco

Meet Sue Sims! She is a Unified Communications (UC) Engineer. Sue programs most of the phone systems that come from us and puts together the user-guides/manuals that clients receive with their new phone systems. She also helps with the cut-over for larger jobs where we transition a whole business from an old system to a new one. Read on to learn more about one of our outstanding UC Engineers!

What do you like most about your job?

I like that I never get to a point where I know everything. I always get to learn something new every day and overcome different challenges. I started working with phone systems about 30 years ago and so much has changed since then. I started as a customer, myself, and then transitioned into installing phone systems.

Read More
Topics: Our Company

How to identify Social Engineering

Alyssa Sisco

Social engineering involves the manipulation or deception of people in order to obtain information or access they shouldn't have. Social engineers could be after a password, bank account information, access to your corporation's network or anything else that could benefit them. Their end goal could be to steal money, company secrets, to disrupt your business or to shut it down entirely.

Because social engineering preys on human behavior, it's one of the most dangerous threats to cybersecurity. Can you rely on each staff member at your company to successfully identify and protect against these attacks?

Read More
Topics: Staff Training, Security Threats, Network Security

Windows Server 2008 end of support

Alyssa Sisco

Support for Windows Server 2008 and 2008 R2 is ending on January 14, 2020.

This means that no more security updates will be developed or released after January 14, 2020. Running unsupported software on your server can leave your business vulnerable to any number of cybersecurity attacks and may keep your business from meeting compliance requirements.

Read More
Topics: Microsoft Products, Network Security

Voicemail hackers - a phone system security risk

Jason Hahn
Recently, we’ve noticed a large upswing in people hacking into voicemail systems. These hackers build mailboxes that allow the caller to dial international calls through the system. When they call and select the fraudulent mailbox they have built, the voicemail gives the hacker open access to the victim’s outside lines and they can make long distance and international calls at the cost of the victim. This can add up to thousands of dollars before it's even discovered. With so many security issues to worry about already, we don't want you to worry about one more. So let's take a look at what can be done to keep your voicemail system secure.
Read More
Topics: Security Threats, Phone Systems

The “CoreCare agent”

Joel Havenridge

During the onboarding process or while on a service call, you may have heard us use the term “CoreCare agent” but weren’t quite sure what that is or does.

As a contracted client, either CoreCare | Critical or CoreCare | Basic, there is a small application that runs on your computer, whether it’s a PC, laptop, Surface or server, that periodically sends information about the status and health of that computer to our RMM (remote monitoring and management) utility database (aka “the system”). Some of that information includes things like:

Read More

Meet the Team: Jim Carraher

Alyssa Sisco

Say hi to Jim Carraher! In the biz for 39 years, there isn't a lot Jim doesn't know about phone systems and their applications. With the title of Business Development Manager, (or self-dubbed "sales guy") Jim certainly isn't your typical salesman. He spends most of his time listening. After he's heard all your concerns, struggles or objectives, he suggests specific applications, integrations or pieces of technology that are capable of providing the solutions you're looking for. But, he's also the first person to come out and tell you that an application or integration is not right for your business and isn't worth investing in. To learn more about Jim, check out the interview!

Read More
Topics: Our Company

Office 365 Migration

Alyssa Sisco

Are you still working off an old in-house or hosted server for your email? If you haven’t already made the move to Office 365, it’s time you do. With the benefits far outweighing the costs, there’s no reason to keep your business in the past with outdated technology. Seriously – once you finally take the leap and make this change, your only regret will be not doing it sooner.

Read More
Topics: Microsoft Products, The Workplace