Keep your IT network secure with a proactive approach!

With increasing cyber security threats, it is vital for organisations to have wider visibility over their networks. Cybercriminals today are targeting Active Directories (AD), performing reconnaissance to discover users, servers and computers in an enterprise network....

Advantages of a SLA driven disaster recovery strategy

We all know that there are a few key considerations to an effective disaster recovery (DR) strategy. We make sure that; the backup completes successfully, verify that it is recoverable, send a copy offsite and have a plan for what to do when disaster strikes to get...

VoIP Channel Update

In this update: 3CX version 16 3CX Quick Reference Guide 3CX road map - Update 1 preview 3CX technical training Grandstream - new DECT technology Got 3CX customers on 16-SC Standard free 1-year trials, expiring soon? WiFi Voice - ready for the real world? How to...

How to practice better VoIP security

We all know that any internet facing application needs to have security as a core focus. Thankfully Zero Trust Architectures are becoming more common as network and sysadmins adopt better security practices in light of news around 0 day exploits, botnets and general...

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Archives