In the video, we give you the best practices behind telecom billing management. Rule 1 Get Familiar with your invoice! Locate and understand your account summary section. Rule 2 Understand and confirm your monthly charges! Do you know what your services are and what they should cost? Compare your invoice with your service agreement! If…

Read More

Endpoint Detection and Response (EDR) is a cybersecurity technology that continuously monitors all incoming and outbound internet traffic on a network. When installed and tuned properly, an EDR system can scan traffic and recognize potential threats to a network (ie. malware, phishing attacks, etc.) Additionally, the EDR can alert and shut down potentially dangerous attacks before…

Read More

Good voice performance requires a stable, dedicated connection. What does stable mean? The connection cannot drop packets, lose signal or experience long delays in packet delivery. Additionally, there needs to be a minimum bandwidth dedicated to voice service. In VoIP, each call needs about 80k of dedicated bandwidth for acceptable performance. Here’s what happens to…

Read More

A Cloud Access Security Broker is a software appliance that sits between a cloud service user and a cloud (or hosted service) application. The purpose of the appliance is to provide security monitoring of all activity between the user and the online applications. Why do you need it? Does your organization use cloud-based services? Do…

Read More

During the past few years, we’ve continually provided our insights on SDWAN services. Nothing speaks louder than experience. Now that we’ve had time to work with various carriers and clients on these products we have some collective wisdom we would like to share with you. 1. Avoid the Bottleneck!Some SDWAN providers restrict the bandwidth flow…

Read More

You may never give it a second thought and that’s why we’ve written this piece. Installing fiber and other utilities at an office or industrial complex requires significant labor and money. If you’re renovating a property or building from scratch here’s one item you should never forget. Have your construction contractor install a service pipe for your telecom…

Read More

If your business is planning a new construction or a build-out of an existing office space, we would like to make sure you’re aware of what you need to do to ensure your telecommunications are installed properly. These tips will help you save, time, money and avoid unnecessary headaches along the way. Rule 1: there’s…

Read More

In this video we show you how your organization can design and install a back-up Internet solution for a very reasonable budget – and in a reasonable amount of time. If you own or operate a small organization (5-20 users) and your staff depends on Internet for mission critical applications, you should consider installing a…

Read More

On several occasions I’ve been asked by prospective clients ‘why should I pay a monthly fee for SD-WAN management?” My answer is “what is the SD-WAN management providing that you cannot easily provide yourself?” So, let’s take a look at what a typical service is providing and why outsourcing SD WAN can be very beneficial…

Read More

Along with establishing an Internet security policy handbook or end-user policy there’s another important addition to that and then involves social media.  Really consider establishing a social media acceptable use policy.  There’s some things that you need to keep in mind.  If you’re marketing sales or corporate management folks use social media outlets, and today…

Read More