Friday, April 27, 2018



Our technical expertise, vendor partnerships and operations team give our customers best in class support.

A single partnership to handle order processing and post-sales support to achieve the best user experience. We’re the powerhouse behind you to source, install and provision best of breed technologies that help you grow.

Our partnerships allow for the largest and best pre and post sales operations available to you at no additional cost. We take care of everything while you focus on growth.


Enjoy new services, reallocate resources to underserved needs, build on efficiencies and save money.

• Discuss business strategy, operational dependencies, success indicators and desired outcomes

• O• Engage Solution Engineers to determine best-suited services and assist with project scoping and solution design

• Assess carrier options and pricing with dedicated telco and cable teams

• Negotiate pricing and/or requests specialized pricing

• Contract creation and order submission

• Order tracking and follow ups

• Project management (software and dedicated resource)

• Oversee milestones

• Handle order escalations

• Manage provisioning

• Risk mitigation

• Ensure install is timely, accurate and fulfills on promises

• Post install supportutline business needs and concerns (capex, productivity, overhead, resources, etc.)


Tuesday, February 27, 2018



50% of SMBs have been breached over the past 12 months and, on average, companies have spent $879,582.”

• How many full-time employees are at your business?

• Are your employees, including executives, trained on cyber security?

• How many remote users do you have and what are the security measures in place for them?

• What specific security measures are in place before employees can access your IT infrastructure?

• What pieces of technology or what services do most of the heavy lifting for your company when it comes to security?

> Who manages that? Why?

• What types of threats is your network currently facing?

• When was the last time you were audited?

> What was the result of your last audit (if applicable)?

• When was the last time you completed a security assessment?

• Do you have an incident response plan?

> If yes: Tell me how you created that to be specific to your end users, your industry, and your customers. If no: Why not?

• Do you have any specific concerns, such as changing IT security and compliance regulations? If so, which ones?

• What regulatory requirements or compliance standards is your organization subject to?
> Does your network meet those standards, if not, tell me more about where it is lacking?

• Have you experienced any public or known business challenges, such as a data security breach or major outage?

• Do you have a disaster recovery (DR) or business continuity (BC) strategy in place?

• What is the state of your company’s current cybersecurity strategy and plan?

• What is the process for selecting the security solution or tool to address your cybersecurity challenges?

• With data breaches consistently on the rise, do you feel comfortable that any confidential data that resides on your infrastructure is completely secure?

• What should I know about your company’s environment when it comes to security that we have not already discussed?


Wednesday, January 24, 2018


Speaking at the IBM Security Summit in New York City last year, IBM's chairman, CEO and President Ginni Rometty said, “We believe that data is the phenomenon of our time. It is the world’s new natural resource. It is the new basis of competitive advantage, and it is transforming every profession and industry. If all of this is true – even inevitable – then cyber crime, by definition, is the greatest threat to every profession, every industry, every company in the world.”

According to Gartner, worldwide, organizations spent $81.6 Billion in 2016 on information security, an increase of 7.9 percent from 2015
Worldwide spending on cybersecurity is predicted to top $1 trillion for the five-year period from 2017 to 2021, - Cybersecurity Market Report, Cybersecurity Ventures.
“Nearly three in five Californians were victims of a data breach in 2015 alone.” - California Data Breach Report 2012-2015
“30% of phishing emails are opened. And about 12% of targets go on to click the link or attachment.” – 2016 Data Breach Investigations Report from Verizon
“80% of analyzed breaches had a financial motive.” 2016 Data Breach Investigations Report from Verizon

Friday, December 1, 2017

Verizon will launch 5G home internet access in 2018

Unfortunately, only in a few areas


"Verizon's 5G wireless will soon become a practical reality... if not quite the way you might expect. Big Red has announced that it's launching residential 5G broadband (that is, fixed-in-place wireless) in three to five markets starting in the second half of 2018. Most details aren't nailed down at this point, but the rollout will begin in Sacramento, California.

It's no shock as to why Verizon is showing its cards so early. The carrier is in fierce competition with fellow incumbent AT&T, which has also been trialing 5G and hopes to deploy it nationwide by the end of 2018. Verizon wants you to know it's keeping pace and will have a real, publicly available 5G service ready to go within a matter of months.

No, this isn't the cellphone access you might be looking for, it's still an important milestone. It's not just that 5G is extremely fast, promising hundreds of megabits per second -- it's that its latency is low enough to improve very time-sensitive tasks like action gaming and multi-user VR. How well it works in real-world commercial service is yet to be determined, but home 5G may be the first fixed wireless that's about as responsive as a good landline connection."

Tuesday, October 31, 2017


Alert: New Ransomware "Bad Rabbit"


Good morning,

The U.S government has issued a warning about a new ransomware attack which is spreading through Europe and into other countries around the world.

The new cyber-attack known as 'Bad Rabbit' is believed to disguise itself as a Windows Flash update in order to convince innocent people (like you) to download the virus.

Once installed it quickly hijacks your computer encrypting your personal files and data demanding a ransom payment to decrypt.

Monday, October 23, 2017

On Premise Vs Cloud-Based Voice

The definition and difference:

A premises-based PBX solution (also known as an IP PBX) is
dependent on a voice server kept on-site in the
equipment/server closet. Physical phones are located
throughout the office. Calls can route through a traditional
phone company as well as over the internet using SIP trunking.
Hosted PBX is a cloud voice solution where the provider
manages/maintains the voice server in a cloud data center.
The only equipment in the office are physical phones. Calls
route over the internet using SIP trunking.

On-Premise PBX
• Cost – higher upfront costs and set-up fee. Above certain
threshold it might be cheaper to own equipment than pay a
monthly fee, but servicing and maintenance can get expensive.
When using only basic call features with >25 phones per
store, total cost of ownership is less over 5-year period

• Scalability – purchase phones to expand (in addition to any
licensing required). PBX needs to be able to accommodate
growth and possibility of complexity with added features
• Failover – if issue with PBX in store, calling is affected and
potentially down until PBX can be repaired via service

• Features – find Me / Follow Me feature requires adding a
mobility server to each PBX – can become expensive
• Presence, tablet/mobile apps for wireless calling can be
added– usually works together with Find Me / Follow Me for
seamless use across devices

• Maintenance – managed services contract (with phone
vendor) required for software patching and maintenance to
ensure security and uptime.

• Changes to system settings require PBX in store to be
adjusted on-site by phone vendor or internal IT team

• Can leverage traditional phone company service (PRI) for
inbound/outbound calling, or SIP trunks over the internet
> PRI is not affected by quality or busyness of internet

• Handsets do not contain a lot of features/functionality –
providers push users to use the desktop application.

Hosted PBX
• Cost – usually low upfront costs, monthly fee per user.
Typically low total cost of ownership as hosted provider
takes care of server configuration, maintenance and
software patching.

• Scalability – purchased or leased IP phones added to
service plan, picking and canceling numbers and moving
phone system is easy and quick.

• Failover – calls can be rerouted to cell phones if issue with
SIP trunk quality, power at store or catastrophic event.
Safeguards at off-site facility includes back up power
sources, geographic redundancy of data centers,
active-active failover of servers, etc.

• Features – can integrate into CRM for advanced customer

• Can integrate contact center-life features for advanced call
routing or call analytics for advanced reporting.

• Dedicated internet bandwidth required to maintain high call
quality of SIP trunks.

• Tablet/mobile app allows users to make/receive phone calls
from app over wifi/cellular connections.

• Presence allows users to see who is available and on the
phone within store.

• Find Me / Follow Me feature included – will ring desk
phone, tablet, cell phone all at once or in order.

• Maintenance – no managed services contract required –
provider performs software patching, maintenance, upgrades
of PBX in the cloud.

• Changes to system settings performed through online portal
for remote management.

• Handsets do not contain a lot of features/functionality –
providers push users to use desktop/mobile app