Category Archives: Uncategorized

Who Creates Risk in Your Organization?

The New York Post broke incredible news this week: the AOL email account of the Director of the CIA was hacked. By a teen. Who “social engineered” Verizon to get the password. Now, every element of that story in and of itself is already incredible. But what made our jaws truly drop was the revelation that the teen discovered sensitive CIA data in the Director’s personal email. It turns out the Director had been emailing work documents to his personal account. If it’s any consolation, the Director is not alone. We surveyed 2,000+ office workers about their data security habits. We learned, for example, that 22% of Baby Boomers like Director Brennan have emailed company information to their personal email address. What’s worse, though, is that 30%...

Phishing Evolves: Best Practices to Avoid Being Phished

A few weeks into my tenure at Ascend Technologies, I received an email from Fidelity alerting me that my 401(k) account needed action.  It stated that I needed to activate my account within 2 weeks or I would lose matching for the year.  Being new to the company, I didn’t want to miss out on this opportunity.  I remember thinking that it seemed a little strange considering no other company had imposed such a rule, but I thought, “Hey, maybe this company does things differently.”  So I clicked and activated my account. The next day I received an email from our security and privacy team telling me I had been phished.  I was shocked. Nothing seemed fake or out of place. What now? Sadly, nothing about this story is unique.  Every day, people click on links and...

Ransomeware Threats on the Rise in 2015

What does the cloud, “Breaking Bad”, Australia, and bitcoins all have in common? If you are up-to-date on current cyberattack trends around the world, you may have heard about the “Breaking Bad” themed ransomware attack currently spreading like wildfire through Australian computer systems. Ransomware is a type of extortion software that infects a computer system to lock down and scramble important data through encryption. It can lock you out of your computer or mobile device, prevent you from opening your files, or stop you from running certain applications like your browser. In most cases, if you pay the ransom, everything is fine, but sometimes this malware can destroy your data or permanently damage your computer. Recently a law firm made headlines after they became victim to a ransomware attack.  Paul Goodson’s law firm in...

A Great VoIP Experience Starts with Great QoS

When you pick up your phone you expect to hear that familiar dial tone sound and expect to be able to clearly hear the person on the other side, right? When that doesn’t happen, it’s a Quality of Service (QoS) issue, and we know how frustrating these types of problems can be. In the old days of Ma Bell, copper wires, switchboards and human operators, you contacted your local phone company when QoS issues arose. Today, in the world of the Internet and Voice over IP (VoIP), it can be hard to figure out who to contact to fix the issue. The problem could be any number of things, including:
  • Your office wiring
  • The local network (router/switch to which all of your computers and phones are connected);
  • Someone in your office streaming a movie or other large media file;
  • Too...

Get the best of both worlds: SecuriSync & File Servers

Traditional file servers became popular in the business world because they facilitate access to files inside a company’s network. But businesses have evolved, and employees need mobile access to files from the device of their choice. File servers cannot meet the requirements of today’s workforce. They’re expensive and lack the essential features that modern businesses need like mobility, security and collaboration. And that’s just the tip of the iceberg. When you compare file servers to modern file sync and share tools, you realize that they’re missing many essential features. And these gaps are driving millions of users to adopt freemium, insecure products like Dropbox. There’s a better option for your business: add cloud-based file sync and share to your traditional file server. With SecuriSync you can actively sync your traditional file server with the file sync...

What you need to know about the VENOM security flaw

Another month, another mega-vulnerability. If you haven’t already heard about the VENOM vulnerability, you will. It’s being compared to Heartbleed and could have widespread security implications for cloud service providers. It’s certainly the largest vulnerability discovered so far this year. Most cloud providers use virtualization technology to “share” a single server’s hardware among many operating systems that host customer data. The VENOM (Virtualized Environment Neglected Operations Manipulation) vulnerability could allow a hacker to break out of a single virtual machine and take control of the underlying hypervisor, which controls all of the virtual machines. This is bad. Any data passed through a network compromised by the VENOM vulnerability is at risk, including logins, passwords, bank accounts and other highly sensitive information. The vulnerability accomplishes this through a bug in the virtual Floppy Disk Controller used by XEN,...

Use our savings calculator to see how much you can save moving to Hosted PBX

Recently, we set out to prove our claim that businesses can “save 50% or more moving to Hosted PBX.” And prove it we did! Our cost savings study looked at 19 businesses who were considering replacing their phone system and compared monthly phone service costs from their current provider against Hosted PBX. It then added how much they paid upfront for their phone systems. Findings from this cost savings study show that, on average, companies save over 50% on monthly phone service costs by moving to Hosted PBX. That number is even higher if you factor in hardware costs. When you reduce your business phone services bill, the savings over time can quickly add up. Here’s what we discovered:
  • Per-line service fees. On average, the businesses were paying monthly per-line service fees of $44.64, compared with Hosted PBX’s...

5 Reasons Why Costly File Servers Are a Relic of the Past

Costs aren't the only downside to File Servers. If you’re running a File Server, then you may be at risk. Here are five reasons why File Servers are costly and slow down your business:
  1. File Servers are high-cost and low-agility.File Servers are machines, and machines need maintenance and upgrades. This adds up to significant expense. And what happens when your company expands? That’s more money and more resources lost in building out more server space.
  1. You get no uptime guarantees.How much would it cost your business to be down for a day? How about for even 1 hour? According to VentureBeat, about 73% of businesses like yours have had some type of interruption in the past 5 years. Downtime means lost data and missed opportunities.
  1. File Servers aren't made for a mobile...

Cut Costs and Increase Stability When Replacing File Servers with SecuriSync

File Servers aren’t only costly, they also are hard to use, with limited mobility and collaboration support. There’s a better option than File Servers for your business: SecuriSync, cloud-based file sync and share. Compared to File Servers, SecuriSync offloads hardware and electricity costs, slashes IT complexity and, most importantly, enables modern collaboration and mobility. Learn more about how easy SecuriSync is with our videos below. (more…)
...

Our Hosted PBX Cost Savings Study is here!

We love a good challenge. So when we were challenged to prove our “50% savings on Hosted PBX” claim, we couldn’t wait to dive into the numbers. And a deep dive it was. Our study looked at the phone bills of 19 small and medium sized businesses, and how much they paid upfront when their phone systems were installed. The results didn’t surprise us. Will they surprise you? Download the Hosted PBX Cost Analysis Now!  ...