The role passwords play in a world of cybercrime

In previous articles we have described that there is a multi tiered approach to adopting cybersecurity. This is an ongoing process and needs to be constantly reviewed and improved upon. One very important aspect and should take priority, is safeguarding the use of passwords. For businesses, one weak password can be the cause of a major cybersecurity incident. For this …

Connectivity – Every successful business has a trusted Internet Partner

Today, businesses are expected to respond quickly to customer requests and want reliable, high performance connectivity solutions that can help them enhance their customer service. They also need to be ‘agile’ and see using cloud applications as a way to increase flexibility. Choose a trusted partner with a data network you can rely on to deliver great customer service and …

The business case for SIP

Cloud-based call control allows you to automatically direct calls to a destination you define such as a colleague, mobile, hunt group or call queue. Combined with all the features and benefits of SIP Trunks, including call bundles and the only fraud management tool that protects you and your customers by enabling them to set spend limits, SIP Trunk Call Manager …

What is Shadow IT and how can businesses combat it?

Shadow IT refers to information technology (IT) projects that are managed outside of, and without the knowledge of, the IT department. As companies reach to the “cloud” their enthusiasm for hasty adoption can suddenly be tempered by security, compliance, and governance concerns. Once this is reviewed and a plan of action made then adoption makes perfect sense. However it’s the shadow/ …