VoIP call forwarding: Do you need handsets?

2017February20_VoIP_BThe list of benefits that accompany a VoIP migration is long and conclusively proves that internet-based telephony is better than its analog predecessor. What is slightly less decisive however, is whether the liberating mobility of VoIP requires you to set up desktop phones at all. Read on for a few tips on making the right decision at your organization.

Read more...



3 Common mistakes in virtualized networks

2017February21_Virtualization_BData storage may be one of the easiest facets of virtualization to explain, but that doesn’t make it immune to problems arising from confusion. There are a few things that can cause virtualized data storage to underperform, and most of them can be easily fixed by technicians who know their stuff. Read on to find out whether you might have fallen for one of these mistakes.

Read more...



How can you go from reactive to preventive IT?

2017February15_Security_BShopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content. But one thing does need clarification: What exactly are “proactive cyber-security” measures?

Read more...



WordPress websites under attack

2017February27_WebandCloud_BIt’s no surprise that millions of websites are on WordPress — it’s easy to manage, operates on an open source framework, and covers most webmasters’ Content Management Solutions (CMS) needs. What’s also no surprise? That it’s prone to attacks. Recently, some 20 attackers defaced thousands of WordPress websites. If you think 20 attackers is frightening, wait ‘til you read more.

Read more...


March 2017 fun facts