Tag Archives: phone

What is VoIP Technology?

01 Sep 17
lverbik
, , , , , , , , , , , ,
No Comments

Is it time for your business to abandon that ancient land line phone and discover the flexibility and convenience of VoIP technology? If so, you’re in luck because we’re working on a series of blog posts on this topic.  Let’s jump right in and learn the basics…

When you install VoIP technology into your home or business, you’ll have the ability to talk to others using Voice Over Internet Protocol (VoIP.)  All that means is that you’ll be able to use the phone that’s connected to the internet to make calls.

Instead of phone lines that traditionally run over the electrical or phone lines in your home already, VoIP uses your internet connection instead.

In most cases, you won’t be able to tell the difference in using VoIP over other phone technology.  It gives you the same basic results.  It sounds easy, right?  It really is that simple.

To do this, several key things will be necessary.

  1. You will need to connect your standard telephone to an adapter unit that is VoIP qualified or get a new internet ready phone unit. You may also use a microphone equipped computer to make your calls instead of a phone.
  2. When you pick up the phone to dial your friend across the ocean, the VoIP adapter realizes what you are doing and turns the voice signals you are sending into your phone into digital based signals. These are then sent across the ocean through the Internet, instead of traveling through any phone line.
  3. Your friend receives your call in the same way. He or she will pick up the phone when you call and then VoIP goes to work again.  This time it translates the digital like signals back into a standard voice transmission.  When your friend uses their phone, they hear your voice, nothing more.

As you can see, it really doesn’t make much of a difference in the experience that you have using the telephone.  You’ll be doing the same thing that you are already doing.

Here’s how it works:

Phone Call –To- Adapter- Internet – Adapter –To- Phone

Although it may seem like this process takes time, it really does not.  It will take little to no time to convert your voice into a digital signal to go over the internet service that you have and back into your voice so your friend will hear you.  In fact, the process happens so fast you may not even realize what is happening at all!

Computer Communication

Another option that you may have comes in the form of using the computer in your home or business to make your calls.

In order to do this, you will need to have a computer that has a microphone built in.  This microphone will serve as your communication tool.

When you make a call, you will simply use the software that is installed on your computer to call your friend.  When they answer, you can talk to them without any type of handset.  Instead, you’ll use the microphone to talk into.

The process is still the same.  The computer will take your voice and translate it into a digital signal which is then sent over the internet to your friend’s computer.  They can either use the phone or their own computer to talk to you.  The voice once again changes from a digital signal into an actual voice and you hear your friend, just as you would if you had dialed their phone number into your phone.

You can also do this by using a computer that is equipped with a headset that allows you to speak into it for more privacy.

As you can see, VoIP technology is quite easy to use and can help your business stay connected to your clients, suppliers and associates around the world. Techno Advantage can help you get the right equipment, ensure that your connection is optimized and maybe even save money!

If you are considering VoIP technology for your business, contact our Techno Pros here at Techno Advantage. 

Lost Employee Smartphone? Do This NOW!

15 Feb 17
lverbik
, , , , , , , , , , , , , , , ,
No Comments

“Hey boss, I lost my smartphone.”

How well have you prepared for this moment? It will happen sooner or later. If your company has a plan in place, no big deal. If not, you may suddenly get that sinking feeling in your gut …

And well you might. You now have three big worries:

Compliance Issues – If your employee had access to information covered by any number of regulations, your company could be subject to stiff penalties. One employer we know of wound up with a $900,000 fine.

Data Security – Sensitive company data in the wrong hands could spell disaster. Access to your network, secure sites, proprietary files, work-related e-mails and corporate secrets may now be out of your control. You must move quickly to prevent serious financial harm.

Employee Privacy and Property Concerns – If a valued employee had family photos and movies on the device, and you remotely delete all data on the phone, you may now have a disgruntled, or even uncooperative, employee. Especially if company policy regarding BYOD (bring your own device) and data loss were not clearly stated and agreed to up-front.

So how do you prevent a relatively minor incident from blowing up into a big problem? Here are seven smart measures you can take right now to prepare for the day an employee smartphone is lost or stolen:

  1. Install a mobile device management (MDM) system on any employee device to be used at work. This software can create a virtual wall separating work data from personal. It facilitates any security measures you wish to impose. And to protect employee privacy, it can limit company access to work data only.
  1. Determine which devices will be allowed and which types of company data people may access from them.
  1. Require that employees agree with an Acceptable Use Policy before they connect to your network. Make sure these include notice as to conditions in which company data may be “wiped” – i.e., destroyed. Also include specific policies regarding device inspection and removal of company records.
  1. Put strong data protection practices in place. Require use of hard-to-crack passwords and auto-locking after periods of inactivity. Establish protocols for reporting lost or stolen devices. Mandate antivirus and other protective software as well as regular backups.
  1. Designate someone at your company to authorize access to software and critical data. This person can also be your main point of contact for questions about BYOD policy and practices. It might also work well to distribute a resource page or FAQ document to your employees.
  1. Establish a standard protocol for what to do when a device is lost or stolen. Both Android and iOS phones have features that allow device owners to locate, lock and/or “wipe” all data on their phones. Make sure your policy requires that these features are set up in advance. Then, when a device is lost or stolen, your employee can be instructed to take appropriate action according to your protocol in order to protect company data.
  1. And finally, your best protection is to implement a well-crafted BYOD policy in advance. Develop it in partnership with risk management and operations personnel, as well as legal counsel and IT professionals, to come up with an effective and comprehensive plan.

Do not delay on this – it is a serious vulnerability that can and must be addressed in order to assure the safety of your company’s data and systems.

 

Lost Employee Smartphone? Do This NOW!

07 Sep 16
lverbik
, , , , , , , , , , , , , , ,
No Comments
“Hey boss, I lost my smartphone.”
How well have you prepared for this moment? It will happen sooner or later. If your company has a plan in place, no big deal. If not, you may suddenly get that sinking feeling in your gut …
And well you might. You now have three big worries:
Compliance Issues – If your employee had access to information covered by any number of regulations, your company could be subject to stiff penalties. One employer we know of wound up with a $900,000 fine.
Data Security – Sensitive company data in the wrong hands could spell disaster. Access to your network, secure sites, proprietary files, work-related e-mails and corporate secrets may now be out of your control. You must move quickly to prevent serious financial harm.
Employee Privacy and Property Concerns – If a valued employee had family photos and movies on the device, and you remotely delete all data on the phone, you may now have a disgruntled, or even uncooperative, employee. Especially if company policy regarding BYOD (bring your own device) and data loss were not clearly stated and agreed to up-front.
So how do you prevent a relatively minor incident from blowing up into a big problem? Here are seven smart measures you can take right now to prepare for the day an employee smartphone is lost or stolen:
1. Install a mobile device management (MDM) system on any employee device to be used at work. This software can create a virtual wall separating work data from personal. It facilitates any security measures you wish to impose. And to protect employee privacy, it can limit company access to work data only.
2. Determine which devices will be allowed and which types of company data people may access from them.
3. Require that employees agree with an Acceptable Use Policy before they connect to your network. Make sure these include notice as to conditions in which company data may be “wiped” – i.e., destroyed. Also include specific policies regarding device inspection and removal of company records.
4. Put strong data protection practices in place. Require use of hard-to-crack passwords and auto-locking after periods of inactivity. Establish protocols for reporting lost or stolen devices. Mandate antivirus and other protective software as well as regular backups.
5. Designate someone at your company to authorize access to software and critical data. This person can also be your main point of contact for questions about BYOD policy and practices. It might also work well to distribute a resource page or FAQ document to your employees.
6. Establish a standard protocol for what to do when a device is lost or stolen. Both Android and iOS phones have features that allow device owners to locate, lock and/or “wipe” all data on their phones. Make sure your policy requires that these features are set up in advance. Then, when a device is lost or stolen, your employee can be instructed to take appropriate action according to your protocol in order to protect company data.
7. And finally, your best protection is to implement a well-crafted BYOD policy in advance. Develop it in partnership with risk management and operations personnel, as well as legal counsel and IT professionals, to come up with an effective and comprehensive plan.
Don’t risk waiting until an incident occurs!
This is a serious vulnerability that can and must be addressed in order to assure the safety of your company’s data and systems.
Contact a Techno Pro today to see how we can help.

Do you Have a Good, Trustworthy IT Guy?

13 Jan 16
lverbik
, , , , , , , , , , , , , ,
No Comments

Whoever it may be—guy, girl, company—whoever holds the keys to your IT kingdom had better be someone you can trust, and someone who is doing a good job. You just can’t afford to get this wrong.

Your IT guy is the one with the most access to your valuable network—the heart of your business—and thus the most power to wield for good or evil.

Think about it—if this person were to disappear, would you know where all your passwords, software license, disks, etc., are stored? Do you have complete network documentation should you require another person to step in? Scary. Don’t leave yourself vulnerable.

Here are some questions to ask yourself about your IT provider. You should have all YESes. If you answer NO to any of these, you might want to think about finding someone who can do a better job for you.

  • Are they available for live phone consultation? Do they respond in an hour or less when you’ve got emergency tech support issues?
  • Are they keeping your network remotely monitored nonstop, and up to date on security settings, patches and viruses?
  • Are they vigilant about offsite and onsite backup monitoring, or do they not care if you are still using unreliable tape backups?
  • Do they periodically conduct test restores of your backups to make sure they’ll work in the event of a real disaster?
  • Have they give you full documentation of your network, including network passwords, software licenses, and hardware info, or are they the sole keeper of the secrets?
  • Are they always looking for ways to improve your operations, offering suggestions and new ideas? Or are they only there when you have a problem?
  • Are the timely and proactive it responding to your inquiries, providing status reports and progress without you having to hunt them down?
  • Do they explain things in regular people language and not tech talk? Or do they sort of enjoy keeping you in the dark about what they do?
  • Do they bill you at a fixed rate or is it open ended to cover their time and materials?

If you can say NO to any of the above, we’d like to give you a free IT assessment to set your mind at ease. It’s your right and freedom to get the best IT service possible, with someone you trust. We’ll check the “health” of your current operations and look for any places where improvements can be made to help you avoid data loss or other costly errors. Contact Techno Advantage today, and rest easy.

New VoIP Phone Solutions for Your Business

06 May 15
lverbik
, , , , , , , , , , , , , ,
No Comments

The team at Techno Advantage is excited to announce a new VOIP (Voice over Internet Protocol) phone solution by Grandstream.

Our fearless leader Jay, recently attended an extensive training program hosted by Grandstream and became a certified partner.    We’re thrilled to bring this flexible new system and potential savings to our clients.

Here are three reasons why you’re going to love our new VoIP phone solution:

  • Cost effective – Clients may experience a substantial cost savings in the hundreds of dollars per month over traditional phone service with fewer features.
  • Feature rich – Finally, enterprise level corporate phone solutions are now available to the small business market. Some of our favorite features include: direct dial numbers, auto attendant, personalized screens, ring groups (with forwarding to mobile phones), intercom and paging.
  • All inclusive – Some VoIP systems have a fee per feature structure…but not Grandstream. Re-licensing fees…?  Nope, not with Grandstream.  All inclusive means that there is no separate monthly fee.  Once you’ve paid for the equipment you need, you’re done.

No monthly fee to Grandstream.  The only ongoing fee you would have is your already established data connection.

There are two primary means of connecting a VoIP system – a SIP trunk or a landline.  What is a SIP trunk you ask…well, it is an acronym for Session Initiation Protocol (SIP).  It is a communications protocol for signaling and controlling multimedia communication sessions (AKA internet phone lines).  One of the benefits of this option is that it consolidates your onsite communication expenses into a single utility – your Internet Service Provider (ISP).

The other route would be for one of the major phone carriers to install landline phone lines and the VoIP system runs though those.  With the phone carrier option, you would pay a monthly service to them, but the VoIP technology and its features are purchased one time only.

Does your business need to use fax?  Grandstream has the protocol for internet faxing.

Need to be able to call from your cell phone and have the call appear to be from your office? It’s possible!

We can even use a combination of landlines and internet lines to meet the growing needs of your business.

Contact us on our Grandstream phones today for more information.  317-857-0150