What is IOT and How do you Improve Security?

Comment

What is IOT and How do you Improve Security?

As technology evolves, it is important to stay current. Often, we find out that we are utilizing a technology without realizing it or fully understanding its overarching reach. Today’s topic is IOT – the “Internet of Things”.

Comment

Shelton Copeland – Enterprise Solutions Seller

Comment

Shelton Copeland – Enterprise Solutions Seller

As part of our ongoing series highlighting members of the Comtel and Simplicity VoIP team, this month, we sat down Shelton Copeland, one of our trusted team members. He has been affiliated with Comtel Communications for almost eleven years. Shelton has played a key role in our success as he has supported numerous enterprise accounts. For this blog post, we wanted to shine the spotlight on him and hear his perspectives about this ever-evolving industry first hand.

Comment

2018 State of Cloud & Data Protection Report

Comment

2018 State of Cloud & Data Protection Report

800 IT professionals from various sized companies were surveyed to create Unitrend’s 2018 State of Cloud & Data Protection Report. The two areas of IT focus were: the current state of data protection and disaster recovery, and the attitudes towards and usage of the cloud.

Comment

What is SIP and How do I Use It?

Comment

What is SIP and How do I Use It?

SIP (Session Initiation Protocol) is a “signaling” system for connecting, monitoring and disconnecting voice and multi-media communications sessions across the internet. Basically, SIP provides signaling, like car traffic lights, in order that SIP devices can call other SIP devices over a broadband internet connection.

Comment

BYOD - Infected by Malware?

Comment

BYOD - Infected by Malware?

Cybercriminals are increasing and on the lookout for entry points and activities to gain access to our data. Most think of their computer are the primary point of weakness. Unfortunately, your computer is not only device that is vulnerable. In reality, our smartphones and tablets are minicomputing platforms.

Comment

Business Phone Options – What’s best for You?

Comment

Business Phone Options – What’s best for You?

Telephones have been around for one hundred fifty+ years. As technology continues to advance at a rapid pace and we pursue on-the-go lifestyles where we adopt anytime- anywhere business mindset, one could wonder what type of business phones best serve their needs.

Comment

6 Ways to Protect Yourself from Identify Theft

Comment

6 Ways to Protect Yourself from Identify Theft

Cybercrime is not just a current threat to businesses. Javelin Strategies reported that US residents lost $16.8 billion in 2017 to fraudsters – an 8% increase over the prior year. As identify thieves are becoming more cunning, it is imperative that consumers utilize precautions to protect their data and their money.

Comment

Comment

Disaster Planning FAQs

There is often confusion between disaster planning and business continuity. We have pulled together 7 common questions to explain the differences and to share how your company can benefit from prudent planning before disaster strikes.

Comment