

When Virtualization Should Be Part of Your Communications Strategy
As the needs of today’s business become increasingly complex, so do the jobs of network and systems administrators. When designing their organization’s IT architecture, IT staff must consider the need for security, redundancy and uptime, not to mention the impact of business process applications such as ERP and CRM on servers and phone systems. It used to be the CIO and the IT team built their solutions around onsite IT infrastructures housed in secure data centres. However,

SIP Trunking and VoIP: What Is It?
SIP trunking is a Voice over Internet Protocol based on the Session Initiation Protocol by which Internet telephony service providers deliver telephone services to customers equipped with SIP trunk-compatible phone systems. Unlike traditional telephony, where bundles of physical wires are delivered from the service provider to a business, a SIP trunk allows a company to replace traditional fixed telephone lines with connectivity to the public switched telephone network via a

Beware of Ransomware!
We have experienced some clients recently who have been held hostage with ransomware software, specifically TeslaCrypt. Apparently it can find its way in via Adobe Flash. Ransomware works by entering a user’s computer and modifying files. The process involves renaming the files with alternate names and extensions, encrypting the files, and then locking up an encryption key, so the user cannot retain any use of the files. The encryption key is deposited somewhere in the operat