Call Today:
The Contact Center Advantage
June 7, 2017

These key features separate businesses from the rest of the pack. Call Recording The transformation of technology has brought us to a point where call recording is standard practice. Historically, call recording and its associated storage was complex and expensive. That’s changed today, where call recording software is typically integrated into contact center applications. The […]

Migrating from a Toshiba System
June 6, 2017

Get the inside scoop on system selection to maximize return on investment. Toshiba unexpectedly announced the closing of its Telecommunications division on March 21st. This means parts replacements are dependent upon existing inventory and software updates have come to an end. For businesses that have invested in a Toshiba system, equipment will become outdated and […]

The WannaCry Virus & Managed IT Services
May 19, 2017

What we can do for you: Our services for cyber attack protection. As you may have learned over the last couple of days from national news coverage, a cyber attack using the ransomware known as “WannaCry” (or WannaCrypt) has impacted organizations and businesses of all sizes. According to the latest reports, the attack was discovered […]

WannaCry Virus Cripples Computers Across The Globe
May 18, 2017

For expert advice, talk to the experts. The WannaCry virus, also known as WanaCrypt0r and WCry, struck over 150 countries around the world in an unprecedented attack. WannaCry is a ransom computer worm that spreads across local networks and the Internet. It targets computers running Microsoft Windows that have not been updated with recent security […]

Actions Required to Protect Microsoft Machines from WannaCry Ransomware Attacks
May 17, 2017

Which patches should you look for and where can you find them? If your systems are up-to date with the March 2017 Security patch, your machines should be protected. Additionally, because of Microsoft’s cumulative patch rollup model, if the April 2017 or May 2017 Security patches are installed, your machines should be protected as well. […]