Categories
CMMC

CMMC: What You Need To Know

The new Cybersecurity Maturity Model Certification (CMMC) framework was presented in January of 2020, which details tiers of cybersecurity best practices, which all 300,000 members of the Defense Industrial Base (DIB) will need to be certified in. As of the writing of this article, the AB is still finalizing the criteria to certify the auditors […]

Categories
Business Technology Security Awareness VoIP and Video Conferencing

Zoom is Not as Safe as You Thought

As more and more people begin working from home and utilizing new video conferencing software. Hackers are finding more and more ways to unsuspecting users into giving up user data.  The latest platform has been the ever popular Zoom video conferencing tool. What is Zoom? Zoom is a video conferencing tool, that allows users to connect […]

Categories
Changing Technology VoIP and Video Conferencing

Work from Home and Video Conferencing Tips

By now most of us that can do so have been asked to setup their home office and begin working from home to maintain productivity.  That means we will be relying on web conferencing services much more heavily and for many of us this will be for the first time.  To help we wanted to […]

Categories
Business Technology Changing Technology VoIP and Video Conferencing

Stay Cyberaware while Teleworking

Teleworking opportunities have become increasingly more favorable in today’s world, with an increased list of benefits for both employers and employees.  Reduction in overhead costs, reduced commute time, zero judgment from colleagues regarding your sweatpants Friday dress-code to name a few.  And especially today,  as we are in the middle of a public health crisis, teleworking […]

Categories
Business Technology Data Privacy Hacking Phishing

It’s Q4: Welcome to Cyber Hell

If Q4 isn’t stressful enough for organizations, cyber criminals will make sure it is. The near constant occurrence of cyberattacks ramps up even more in advance of Halloween and the holiday shopping spree. If you have done little to train your staff to identify cyber threats or convinced yourself that anti-virus/malware applications are sufficient deterrents, […]

Categories
Business Technology Phone Systems

Quick Guide: How to Choose the Best Office Phone System

  Read Our Guide: How to Choose the Best Office Phone System The quick guide discusses: Landline Systems VoIP on Premise Solutions Cloud Based VoIP Systems Find out the questions to ask and features to look for in your next phone system. Which one is right for you?

Categories
Hacking Phishing

Black Friday Shoppers Beware

Bogus retail sites, extreme discounts, busy hackers The National Retail Federation expects 115 million physical shoppers to be out on Black Friday, and cyber crooks want a part of the action. Last year, researchers discovered nearly 20,000 URLs using the words “Black Friday” and promising huge discounts with links to malicious web pages. Along with […]

Categories
Business Technology

Dogfooding: Why We Use Our Own IT Products and Services

“Dogfooding” or eating your own dog food: a term used to reference a scenario in which a company uses its own product to validate the quality and capabilities of the product.

Categories
Business Technology Changing Technology IT Support

Office Relocation Check List

Have Questions? Get the guide. Office moves can be difficult scenarios in which technology gets left behind or incorrectly configured. Are you prepared to safely transport all data? Is there a more efficient method of rerouting your network wiring? Check off some of your questions and concerns with our Office Relocation Checklist.

Categories
VoIP and Video Conferencing

Video Conferencing Etiquette

Mind Your Manners You can tell a lot about a work environment by its videoconference etiquette. How often have you been subjected to people trying to unobtrusively text, or worse, not even try to pretend they’re doing it? Then, there’s the woman joining in from home whose dog wants to join the meeting! Or the […]