Is WebRTC a worthwhile addition for you?

The VoIP industry is becoming increasingly hard to define. More and more are voice communications being made over internet connections, and sometimes you may not even realize you’re doing it. WebRTC is a newcomer to the internet-based telephony field. Read on to decide whether it’s for you. What is WebRTC? At its most basic, WebRTC […]

Is fileless malware a threat to you?

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger. But even if you’re not, staying abreast of all the details is […]

Advice from a failed disaster recovery audit

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways. […]

The right social media platforms for SMBs

Social media marketing is tricky, to say the least. It’s difficult to allocate the resources that create the desired effect, especially when so many platforms are available. Facebook might be the biggest name in the industry, but that doesn’t mean it will suit your organization. Instead, business owners should familiarize themselves with all the available […]

Do VoIP-enabled offices even need handsets?

“Follow-me” features from VoIP vendors have revolutionized modern business telecommunications. Because internet-based phone solutions allow office workers to answer one phone number from multiple devices, companies can reduce costs and increase efficiency. But for all its certainties, VoIP may have you questioning one thing: Do you even need office phones any more? Question #1: How […]

What exactly is preventive cyber-security?

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cyber-security means, so let’s take […]

G Suite vs. Office 365

Google and Microsoft have both set impressive milestones in the tech industry. These industry giants continually roll out innovative solutions that simplify the lives of users around the world, especially with G Suite and Office 365. This raises a question: Which is a better option for your business? Cost and commitment G Suite offers two […]

IG Stories: redefining online marketing

Since it’s inception in 2010, Instagram has come a long way from just double-tapping. The photo-sharing application recently announced its plan to experiment with video ads via Instagram Stories. Give your small- or medium-sized business a competitive edge by understanding and utilizing Instagram Stories. Jim Squares, director of product marketing, said in an interview with […]

Moving unified communications to the cloud

Migrating your organization’s unified communications (UC) to the cloud seems like a no-brainer: it’s practical, it’s cheap, it’s the future. Big-name companies such as Cisco, IBM, Microsoft and Verizon now offer Unified communications as a Service (UCaaS), and it’s only a matter of time before it takes over the Voice over Internet Protocol (VoIP) space. […]

Browsers leak sensitive info to hackers

The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your details when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much on autofill. Without knowing it, […]