This week’s blogs revolve around the scary truth of Voice Hacking. It’s not just a spooky story folks. We’ll tell you all you need to know about this real nightmare.
This week’s blogs revolve around the scary truth of Voice Hacking. It’s not just a spooky story folks. We’ll tell you all you need to know about this real nightmare and how to protect yourself.
As you gear up for the 2014 IT budget season, you know there are many areas competing for IT time and attention. According to a recent article from CIO.com, you’re also trying to secure the best...
Are you using your telecom provider’s online portal? Do you know what your login and password is? Do you even know if your provider has a portal, or what it does? If you answered no to any of these...
Network migrations are never perfect. Changing telecommunications network providers can be time consuming, painful, and costly to any business if it is not done correctly, under the watchful eye of...
Most of us are pretty savvy about spotting virus and phishing attempts (if not, keep an eye out for the upcoming blog “Spotting Mobile Virus and Phishing Attempts”). What we don’t seem to know are...
We LOVE our mobile devices. Especially our magical smartphones that allow us to conceal the fact that we always used to get lost have instant access to any information, keep connected with family,...
Did you know that 12% - 20% of corporate telecom charges are in error and unfortunately for businesses, 85% of these charges are in the carrier’s favor? (Gartner Group) This is the time to take...
Are you in charge of recommending or deciding what technology your company provides for staff? How will you decide between smartphones, tablets or laptops? What criteria will you use? This decision...