Considering Internet Telephony Services

Considering Internet Telephony Services

We have officially reached a point as business professions where your regular old telephone line just won’t cut it anymore. Internet telephony solutions like VoIP (Voice Over Internet Protocol) are the future of business communication.

But before you go ahead and cancel your old phone plan, there are a few things you need to keep in mind:

  1. Internet Bandwidth – Think of it like a highway; it gets congested with traffic fast if there aren’t enough lanes. Make sure you’ve got an Internet plan that can keep up before you make the switch
  2. Traffic Management – You need to have the right hardware in place to prioritize internal Internet traffic in order to have good call quality
  3. Internal Network – Make sure that your internal infrastructure is up to the task, and can handle a heavier workload

If you’re considering moving from your traditional telephone system to an internet telephony system, get in tourch with us so we can help guide you along with the transition

The Importance of Training Your Employees to Spot Spoofed Emails

The Importance of Training Your Employees to Spot Spoofed Emails

The number of security issues and malware risks that your company must contend with continues to grow every year, but one of the most potentially devastating threats that your business faces is surprisingly low-tech in nature.

Spoofed emails don’t rely on complex ransomware or sophisticated keystroke loggers. Instead, your company’s bank account and sensitive information are at risk simply by your employees attempting to perform their job duties. Training your team to spot spoofed emails is key to avoiding falling victim to common scams.

What types of spoofed e-mail scams are out there?

Examples of two common types of spoofed email scams played out in recent weeks. The first, an instance of the CEO fraud, involved an Internet criminal passing himself off as the head of a small Kansas construction company. The fraudster pretended to be the CEO of Cornejo & Sons and emailed the finance department of Sedgwick County to request $566,000 in payment.

Because the county actually owed the construction company money for services rendered, they submitted payment as directed–only to later find out that the payment request hadn’t come from Cornejo & Sons and the construction company never received any funds.

A similar scam aimed at a Wyoming hospital system sought to obtain employees’ W2 forms. In this case, the Internet fraudster posed as an internal executive at Campbell County Health and requested the W2 files for all staff from the hospital group’s finance department. The finance department complied, exposing the hospital’s 1,300 employees to potential tax return fraud.

Can you and your staff spot a spoofed e-mail?

No longer completely confident that your employees won’t fall victim to one of these commonly spoofed e-mail scams? Luckily, there are steps that you can take to train your staff to spot a spoofed e-mail. Conducting training sessions to alert your employees to the existence of such scams is an important first step. Putting in place internal practices to verify the veracity of any request before responding will also help your employees understand how to deal with any potential scam emails that your business receives.

However, some employees don’t understand the real threat that accompanies spoofed emails until they have actually been the recipient of a fake request. For this reason, some businesses choose to initiate a simulated attack to reveal to their employees firsthand how easy it is to become the victim of a spoofed email. Some services exist that make it easy to carry out a pretend to attack. Some of these services such as PhishMe allow you to target the attack to match the real threat each of your employees is likely to face, such as an email sent to marketing asking them to provide their SharePoint credentials. Experts assert that it is fundamental to follow any simulated attack with further training as your employees will be particularly receptive to in-depth lessons on avoiding spoofed emails after falling for your staged attack.

Did You Know?

 

March 31 Is  World Backup Day.
Is Your Business  Protecting Your Mission-Critical Data?

Find Out.

We Can Help. Hurry, This Promotion Expires Mar. 31 2017

Benefits of Managed IT Services

Benefits of Managed IT Services

Why Managed IT Services means more Profit for your business.

As you may already know, organizations rely on computers and other technology in order to maintain effective day-to-day business. Unfortunately, most small businesses cannot afford to have an on-site technician to take care of immediate issues that arise, answer support questions for employees, and perform general maintenance on the hardware and software that keeps operations running smoothly. When a problem arises, businesses typically reach out to a technical support company, local guru, or IT firm.

 

The Problem with Traditional IT Methods

The traditional IT practice is often coined the “break-fix” method. When something, such as a computer, network, or server, is broken, tech support arrives on-site to fix it. They track their time and materials during the repair process. Often, a close business relationship between the two parties is never established – the technician may not be familiar with all of the intricacies and scope of the business’ IT needs, resulting in misguided support and even more billable time to resolve it. All the while the business is suffering a loss in productivity as the staff members affected by the outage experience down time, and cannot perform their jobs as effectively without their working equipment.

 

This last issue is even a side-effect of the most proficient technician under the traditional IT model – the business pays the technician for fixing the issue while experiencing costly down time. Depending on the employee’s role in the company, this could lead to missed opportunities, lower productivity, and necessary over time in order to meet deadlines – all of which cost the business money.

Download a FREE NO STRINGS ATTACHED, E-Book on  how you can overcome these problems by switching to a Managed Services Provider.

No annoying forms to fill out. Absolutely free with no string attached

Keeping your passwords safe

Keeping your passwords safe

Do you know how to keep your passwords safe?

Passwords are like keys to your personal home online. You should do everything you can prevent people from gaining access to your password. You can also further secure your accounts by using additional authentication methods.

Passwords

Passwords can be inconvenient, but they’re important if you want to keep your information safe.

Protecting your personal information starts with STOP. THINK. CONNECT.: take security precautions, think about the consequences of your actions online and enjoy the Internet with peace of mind. Here are some simple ways to secure your accounts through better password practices.

  • Make your password a sentence: A strong password is a sentence that is at least 12 characters long. Focus on positive sentences or phrases that you like to think about and are easy to remember (for example, “I love country music.”). On many sites, you can even use spaces!
  • Unique account, unique password: Having separate passwords for every account helps to thwart cybercriminals. At a minimum, separate your work and personal accounts and make sure that your critical accounts have the strongest passwords.
  • Write it down and keep it safe: Everyone can forget a password. Keep a list that’s stored in a safe, secure place away from your computer. You can alternatively use a service like a password manager to keep track of your passwords.

Other Ways to Secure an Account
Typing a username and password into a website isn’t the only way to identify yourself on the web services you use.

  • Lock down your login: Fortify your online accounts by enabling the strongest authentication tools available, such as biometrics, security keys or a unique one-time code through an app on your mobile device. Your usernames and passwords are not enough to protect key accounts like email, banking and social media.

Over time, more websites will be adopting multi-factor authentication. In some cases, the services may be available but are not required.

Ask How we can help

Many email services offer two-step verification on an opt-in basis. Ask how we can help you with multi-factor authentication or additional ways to verify your identity.

Your most expensive asset

Your most expensive asset

Do You Know What Your Company’s
Most Expensive Asset Is?

It’s the same for every business. You have one particular asset that takes up more of your resources and budget that any other – your employees. Hiring a new team member means investing in someone you believe is the best choice for your business, and hoping they won’t let you down.

But something more and businesses are realizing is that when it comes to IT, hiring in-house isn’t always the right choice. In exchange for having someone onsite each day, your business has to cover the cost of:

  • Salary
  • Training
  • Certifications
  • Benefits
  • Vacation Coverage

The alternative to all of that is outsourcing your IT needs to a Managed Service Provider. For a fraction of the cost of one full-time employee, your business will have access to a team of knowledgeable and experienced professionals, each with their own skill set to help identify, troubleshoot, and fix issues fast.

Learn More

Interested in learning more about how your business can benefit from our outsourced technology experts?