With fewer people working in your office, are you still paying for expensive landlines? We’ve helped several clients move their phone number(s) to our Auto Attendant Virtual Receptionist service, allowing calls to seamlessly connect to mobile or home phones. We can also provide desk phones or software clients for remote use; either way, you have the potential to ...
Transform your business to the modern digital workplace Digital Transformation is the use of new, fast-changing digital technology to solve problems. It often utilizes cloud computing and reduces reliance on user-owned hardware while increasing reliance on subscription-based cloud services. The modern Digital Workplace provides a new way of working for employees and new techniques to ...
This Post republished with permission from our Partner, Ribbon Communications Original Post published by Ribbon, Thursday, December 6, 2018 by David Walsh, Founder, Kandy The real time communications (RTC) industry continues to evolve at warp speed and 2018 was no exception. As Communications Service Providers and enterprises continually try to maintain their dominance in an ...
Part 5: The IBM “Immune System” Approach: a Security Chastity Belt? It has been awhile — I apologize! I have been busy attaining accreditation from the world’s largest security vendor, IBM! At IBM they speak about an “immune system” approach as opposed to “layers” and it’s a remarkable difference. According to them, many companies have ...
Part 4: Define, Assess and Prioritize Your Security Architecture “And a step backward, after making a wrong turn, is a step in the right direction.” ― Kurt Vonnegut, Player Piano Before we commence our discussion on security architecture as part of our security evolution, I’d like to share a recent relevant experience. While scoping ...
Part 3: What to Expect in a Security Assessment Hi again fellow cyber-security concerned business people! In my last security post (Five Areas for Complete Coverage), I promised to begin our cyber security journey with a “security assessment”. First, make sure you go into that security assessment in the right frame of mind. Focus on ...
Part 2: Five Areas for Complete Internet Security Coverage Hello again cyber security-concerned business people… Last post I wrote about the somewhat confusing landscape of cyber security. Let’s continue on that theme with an eye to removing some of the confusion. “One step at a time” is the required approach — this isn’t exactly rocket ...
Part 1: The Landscape of Internet Security in 2018 It seems that each new day brings startling new statements, broadcast loudly from internet security vendors. Statements like “It’s not a matter of if but when”, or “60% of websites are infected”, or “40% of ransomware victims declare bankruptcy”, or “The average discovery of infections in ...
Cloud-based DNS Security is an essential security layer to protect your Business and your Clients from accidentally accessing and sharing malicious internet content. As a Business-focused ISP, Skyway West is uniquely positioned to help prevent our customers from accessing and spreading malware. Over the next two months, our DNS servers will be modified to ensure ...
You’re probably already using cloud software to run your business – whether it’s a cloud-based CRM like Salesforce, cloud-based storage and document management, even cloud-based accounting and other operations. The cloud has matured in the computing world and is now the rule rather than the exception. And now, smart businesses are expanding their cloud thinking ...