Do your customers ever get a busy tone when calling your office? Will you be unable to communicate with customers when the hardware fails in your office? Will it take more than a day to recover? Do your phone handsets look like they were manufactured in 1984? Are you paying more than $35 per user per month?
If you answered yes to any of the above questions, you need to read on…
Today, cloud based phone systems have solved the problem of aging-expensive-proprietary phone systems for thousands of companies like yours. Here are a few:
continue reading
Your company is at greater risk for a cyber attack than you may think! Though online security awareness is on the rise among businesses, many companies are still unaware of the best ways to avoid and prepare for cyber attacks.
Though there is no easy solution to preventing cyber attacks, education is the key. Ensure that your employees are able to recognize scam emails and know not to download suspicious attachments. Being able to effectively gauge the legitimacy of an online communication and having a plan in place in the event of a breach are great steps to help keep your company’s information safe.
continue reading
Why do you need a dashboard to run your business? A simple example: Trying out a new ice cream shop.
When you hop in the car and head off to a new ice cream shop, some place you really want to go, but you haven’t been before…You enter ice cream shop’s address in your GPS, turn the key, take your car out of park and start your mission, right?
Can you imagine driving without a dashboard? No indication of your car’s speed? Not knowing how much gas you have left? Would you feel comfortable to ask your passenger to guess if you were in drive, neutral, reverse, or park based on how the car was moving?
Driving this way would be ludicrous, yet many business owners are trying to run a business this way!
continue reading
Recently, an Internet hacker who already took down several government websites shifted their focus onto Tennessee. The hacker, who is using the online name Vikingdom2015, used Twitter as a medium to brag about their activities. Vikingdom2015 made an attack last week on TN.gov, but fortunately the state had the appropriate security measures in place to prevent their website from being taken down.
Dynamic Edge was featured in a news story about this particular case. In the video below, DynEdger Eric Near lends his expertise on Internet security.
continue reading
We have received reports that there has been an increase in CryptoWall infections as of late.
CryptoWall is a ransomware program created by cyber criminals that infects a user’s computer and encrypts their files without their consent. The program then asks the user to pay a fee in order to have their files restored, but provides no guarantee that paying the fee will actually unencrypt their files.
To prevent CryptoWall, avoid opening any attachments on any emails you receive that seem suspicious, since it is easily spread through spam message attachments. Also do not click on any questionable online advertisements you may see, as we have recently learned that online ads can contain CrypoWall.
continue reading
Have you ever sent out an email that was too big and got a message back reading: “undeliverable message,” or worse the message just didn’t go through? Do you need to be able to update a file, and have a number of other people access those updates instantly? Would you like to just be able to share a file with someone from a different company? Read on, I have the solution for you.
When email was designed back in 1971, it was set up to send short little snippets of text around. It is sometimes wondered if this primitive form of text messaging should be considered email. Think of how a telegraph works and you pretty much sum up the method that email uses to send stuff around the internet. Fast forward to 2015, and we are looking to do something else: send 13MB PDFs files or 5MB Excel files around. The issue? Email just wasn’t designed for big attachments.
Then there’s the next issue with email, version control. Here’s the story:
continue reading