What you need to know about the VENOM security flaw

Another month, another mega-vulnerability. If you haven’t already heard about the VENOM vulnerability, you will. It’s being compared to Heartbleed and could have widespread security implications for cloud service providers. It’s certainly the largest vulnerability discovered so far this year. Most cloud providers use virtualization technology to “share” a single server’s hardware among many operating systems that host customer data. …

What do SMBs really know about Hosted Phone Systems?

When 74 percent of small and medium-sized businesses rank voice communications as “extremely important to business operations” — you’d imagine that the adoption of cloud-based phone systems would be relatively high. But in the case of hosted PBX, IP telephony and unified communications, the reality doesn’t match the perception of usage. A recent survey conducted by Allworx Corp. and Hanover Research found that …

Use our savings calculator to see how much you can save moving to Hosted PBX

Recently, we set out to prove our claim that businesses can “save 50% or more moving to Hosted PBX.” And prove it we did! Our cost savings study looked at 19 businesses who were considering replacing their phone system and compared monthly phone service costs from their current provider against Hosted PBX. It then added how much they paid upfront …

5 Reasons Why Costly File Servers Are a Relic of the Past

Costs aren’t the only downside to File Servers. If you’re running a File Server, then you may be at risk. Here are five reasons why File Servers are costly and slow down your business: File Servers are high-cost and low-agility.File Servers are machines, and machines need maintenance and upgrades. This adds up to significant expense. And what happens when your …

Strong Password

In the movies, the bad guys pound furiously on a keyboard while techno music blasts and Matrix-style code flashes across their screens. In reality, the bad guys just launch dictionary tools on high-powered computers that make automatic attempts to guess your password. These tools take common words (“happy”, for example) and add simple variations (“1happy” or “happy1” or “1happy1”) to …