Security is always a concern when sensitive data is involved, and that concern is heightened when it comes to cloud services that sit outside the corporate firewall. Although the terms have become interchangeable, there is a difference between privacy and security. Security is the state of being free from danger, whereas privacy is the state […]
Have you seen the Touch ID fingerprint sensor on the newly released iPhone 5S? This is the fingerprint scanning technology built into the Home button, which allows you to unlock you iPhone 5S, as well as make purchases through the App Store, without having to constantly re-enter your password. In the technology world, the great […]
Despite some recent concerns that working from home may encourage goofing off, surveys actually show significant productivity increases with home working. This month’s edition of the ShoreTel Newsletter offers four tips on avoiding distractions in your home environment and maximizing your efforts. One way to stay connected at home is to use ShoreTel Dock to […]
SIP trunking has long been on the technology watch list, but as SIP trunking services have matured, the time is now to jump in with both feet. Many of your peers have already made the leap. SIP trunking service revenue jumped 128% in 2011 from the previous year, according to the market research firm Infonetics. […]
We live in a very different world than say just 10 years ago. Our business systems including our phone/UC systems are more open and standards based and more interconnected than ever before. This provides tremendous benefits but also requires us to be aware of the associated security risks. Securing a UC system should not be […]
Unified communications (UC) promises a world where workers can use any device they choose to fulfill most any communications need. Organizations moving toward UC must take steps now to prepare the corporate data network for the advantages of unified communications.
There is no denying the current trend in bringing your own devices (BYOD) into the workplace – driven mainly by the rapid proliferation of smartphones and tablets that make it easy to blend our personal and professional lives. Workers have embraced BYOD, and the newest generation now entering the workforce is pushing the boundaries. They […]
The holiday season is upon us, and there’s a good chance that many shiny new smartphones and tablets will be tied up with a bow in the coming weeks. And then those shiny new mobile devices will come into work, and join the other smartphones and tablets that other people have already brought to the […]
This is the second in my series on SIP trunking – designed to explain how companies can take advantage of the benefits this communications protocol provides. In my first blog post, I shared the basics. In this one, I’ll explore the value a service provider can bring to your business communications strategy.
The voicemail hacking scandal at News of the World has led many people to wonder about the security of their own voicemails and phone calls. Voicemail hacking is possible with some technical skills and caller ID spoofing – especially if the user doesn’t take the most basic step of using a password to protect their […]