866.214.1122

End User Do’s and Dont’s: Social Media

Along with establishing an Internet security policy handbook or end-user policy there’s another important addition to that and then involves social media.  Really consider establishing a social media acceptable use policy.  There’s some things that you need to keep in mind.  If you’re marketing sales or corporate management folks use social media outlets, and today…

Read More

Cyber Security- End User Do’s and Don’ts

We want to get into what what we call an Internet acceptable use policy.  We want to talk about the things that you can do as a management team to educate your staff and to help enforce the policy that you need to maintain for your organization. Cyber security starts with the end-user.  Keep in…

Read More

An Introduction to MPLS and VPLS

Wide Area Networks – An introduction to MPLS and VPLS   MPLS MPLS or Multi Protocol Layer Switching uses ‘virtual paths’ to link locations together.   MPLS is unique in that it’s a Layer 2 service that can handle layer 3 applications at faster speeds.Like a P2P link, these paths provide speed and private connection…

Read More

An Introduction To Wide Area Networks (WAN)

  Simply put a Wide Area Network or WAN links separate office locations together.  If the WAN is set up properly, staff should be able to communicatewith a remote worker in virtually the same time as they can with one of their co-workers ‘down the hall’.  This is the first and primary goal behind WideArea…

Read More

WAN Services for Construction Companies

Construction firms like yours need to have access to their clients’ information and be able to communicate at all times. Access to communication tools like email, data transfers, phones, and wireless networks is imperative in order to do the best job. A secure, integrated networking provides superior protection against intrusive technology, such as malware and…

Read More

How to Move Smartphone Data to a New Device Safely and Securely

I just had the opportunity to upgrade my iPhone to the next level. I was comfortable choosing the 5c model. I have no ill will toward Androids, Samsung and the many other devices now competing successfully in the cellular marketplace. Competition is a very good thing for business and personal consumers alike. That said, as…

Read More

Is it Time for Park Districts to Replace Fire Alarm Circuits?

RAM Communications helps park districts audit and manage telecommunications contracts, invoices and service agreements. Recently, we were helping one of our clients manage a transition between phone companies. We had planned to move their core services to another provide, and that went smoothly—the problem came when we needed to figure out a solution for this…

Read More

How Can I Ensure Telecom Privacy on a Managed Network?

Download PDF version of this Article When you purchase a private network from a carrier you are purchasing security–after all, it’s built in, right? Not so fast. In order to make sure your managed network is safe, you’ll need to know these important things to ensure privacy on your network. Someone Has to Manage Your Managed Networks…

Read More

How do the Major Broadband Services Stack Up?

Depending on the type of business you are running, you’ll need to consider your broadband options and the amount of available bandwidth for your telecom network. There are several options, but one might make more sense for your business based on your existing telecommunications network infrastructure and data needs. The purpose of understanding how different…

Read More

MOVING TO A NEW OFFICE?

Follow these tips before you sign on the bottom line! 1. Where is the phone ‘stuff’? Where does the infrastructure reside in your new building?  More importantly, can you find it? 2. Make sure you do a careful and complete walk thru of the new office space. Make sure you not only know where the…

Read More