The IDeACOM Blog
Follow us on the road to simplifying technology...What is Phishing? Identifying and Protecting Your Business from Phishing Attacks
For most businesses, email is a convenient and effective communication tool inside and outside of their organization. Unfortunately, it is also the primary avenue used by scammers for phishing attacks. Cybercriminals use emails to distribute malware, phishing, and...
Where Has the Time Gone?
A blast from the past! Yea, that’s a collection of old cell phones including my first “smartphone” – the Palm Treo 650 (circa 2004). You'll also notice some old Executone admin & user guides, along with a couple editions of Newton’s Telecom Dictionary from the...
The Importance of Emergency Notification Systems
While we never expect to find ourselves in an emergency situation, a crisis can strike anytime, anywhere. During an emergency or dangerous event, the most pivotal step an organization can make is to quickly inform and alert people in harm’s way. Whether it’s a...
We Value Your Feedback!
We are focused keeping you informed about VoIP technology! Specifically, how it can help your company collaborate more efficiently and communicate more cost-effectively with staff and clients. Last month we invited you to tap into our expertise by requesting a VoIP...
Solving the Issue of Packet Loss
If your business is relying on a hosted PBX service to handle its phone and Unified Communications systems, it is imperative to have a solid support network. Since Voice Over IP (VoIP) relies on your internet connection to make calls, the quality of your calls can be...
You Need VoIP Now More Than Ever…
Are you dissatisfied with the functionality or performance of your phone system? The reality is that most people are. But they don’t do anything about it and just deal with it because of other pressing issues in their business. And that’s unfortunate! But...
The New Distributed Workforce
With remote teams of employees becoming much more commonplace, employers are tasked with effectively managing their distributed workforce. Many technologies exist to enable and control resources available to remote employees. Voice-over-Internet-Protocol, or VoIP,...
Leveraging VoIP… to your advantage
Voice over IP (VoIP) continues to enhance the way we all communicate. Ten (or more) years ago, it was all about adding a “VoIP component” to your digital phone system to integrate remote phones, allow for coordinated dialing between multiple locations, and maybe even...
That’s Not Your Neighbor Calling: Caller ID Spoofing and How to Protect Yourself
If you have a landline or a cell phone, you have most likely experienced an increase in the number of local phone calls you’re receiving, but when you answer the phone, it’s an automated telemarketing campaign or an obvious, or not so obvious, scam call. You are not...
It’s Time to Harness the Power of MXIE
Would a significant improvement in how your Company communicates (both internally and with your clients) be of interest? I hope so because we’re going to explore the benefits of harnessing the power of MXIE in this post together. For anyone who is unfamiliar, MXIE is...
SD-WAN: Why You Should Consider Making the Switch
Software-Defined Wide Area Network (SD-WAN) has recently become a hot topic in the IT world. SD-WAN offers numerous benefits for organizations of all sizes but is especially helpful to businesses with multiple branch locations. Many companies are virtualizing their...
Leadership and Self-Deception
I feel compelled to share a book that I recently received from one of my vendor-partners – thank you Zultys! It’s titled “Leadership and Self-Deception”, and I highly recommend it! It’s a story about a how a company propelled itself well beyond its competitors by...
How to Select the Right Voice and Data Vendor
Regardless of your type of business, your ability to communicate with employees, customers, clients, vendors and others is critical to your success. This makes choosing the right voice and data vendor one of your most important business decisions. There are countless...
Handling the Threat of Ransomware
"Ransomware" is the term used when hackers make the data on your network inaccessible to you until you pay a large ransom. The tools used for ransomware are no different than those used for traditional hacking but, instead of stealing data, criminals want to steal...
Something for Everyone…
I recently returned from the 2018 annual IDeACOM conference. This was a great meeting that provided a lot of value for all in attendance, including 46 vendor-partners who demonstrated their products and services. And I'm happy to say that I had an opportunity to talk...
But Wait!, There’s More…
An often-overlooked component of a company’s marketing initiative could be as simple as how you’re treating your callers when they’re ‘on hold’. I’m not talking about subjecting them to a “But Wait!, there’s more…” in your face infomercial. Sometimes it can be...
The Dark Side of Mobility: Protecting yourself against mobile phone hacking
As the features and conveniences of mobile phones have grown, so have the risks of using them. The more you and your employees use your mobile phones to check email, make purchases, access bank accounts, download music, etc., the more tempting your phone becomes to...
Unite Packs a Powerful Punch
We are pleased to announce the introduction of Unite, a fully-integrated business phone system and collaboration platform from Intermedia. Unite combines your phone system with today’s latest collaboration tools. This powerful combination includes screen sharing,...