You have three options for transferring calls on the Yealink W52P\H and W56P\H: Attended Transfer: Transfer a call with prior consulting to explain what the call is about. Blind Transfer: Transfer a call directly to another extension without speaking to them....
Blog
Business Cyber Security Updates
There are only two types of companies, those that have been hacked and those that will be. This is what the FBI’s Director said 10 years ago! So which one are you? Here are some short business cyber security updates to help you. One of the best ways to protect your...
Five tips to help your business avoid phishing attacks
What is a phishing attack? Typically, this involves scammers sending out thousands of fake emails in the hope that someone will take the bait.
Five simple steps for using passwords to protect your data
You want to be able to access your data on all your devices. However, you don’t want others to access it. That’s why password-protecting your laptops, computers, tablets, printers, routers and smartphones is essential.
Keeping your smartphones, tablets & other devices safe
5 quick tips that can help keep your business mobile devices (and the information stored on them) secure.
How to protect your business against malware
Malware protection for your business
In accordance with the National Cyber Security Centre, here are 5 ways you can protect your organisation from malware.
Five things to consider when backing up your company data
Businesses handle an array of data on a daily basis, from the everyday quotes and orders to the more sensitive customer and payment details.
Backing up this data is critical
Guide to SIP Trunks for Business
Here is your guide to SIP trunks for business. Session Initiation Protocol (or SIP) trunks are an ideal go-between for bridging the gap between traditional phone systems and internet-based (VoIP) ones. You might be used to traditional ISDN phone lines, so why change?...
What is Smishing?
Most of us have been targeted by fraudsters using a technique called Smishing. You may not have even been aware of it. But what is Smishing? Smishing is when fraudsters use SMS phone messaging to impersonate a trusted organisation in an attempt to steal your personal...
Email and Cyber Attacks
Businesses across the planet rely on email to communicate, collaborate, and be productive. But that heavy reliance upon a single tool puts the email of businesses like yours squarely in the crosshairs of cybercriminals intent on doing harm. Your business must...
Managed Cyber Security
The 2022 World Economic Forum Global Cybersecurity Outlook1 demonstrates that the top three cybersecurity risks for businesses are ransomware, social engineering, and malicious insider activity. That is why you should review your managed cyber security provider on a...
Working from home shouldn’t mean compromising on security
Remote working is now an integral part of business practices. However, as well as managing the ins and outs of running a business, owners also have the added pressure of keeping employee devices safe and secure. Working from home cyber security is now something you...
What is email secure gateway?
Secure Email Gateways (SEGs) Secure Email Gateways (SEGs) are a way of protecting your business from malicious emails and subsequent cyber fraud. They work by sitting inline on an email pathway, reaching from the sender via the public internet used, to your business...
Business email security
From time to time, we reach out to current clients to let them know about emerging cybersecurity dangers and to inform them of the solutions available to combat those threats. Here we look at business email security. According to a survey commissioned by Egress, 83%...
How to reduce your business telecoms bill
Many business owners are asking themselves right now how they can reduce business costs, their business telecoms bill being just one of those considerations. Here are some tips to consider when looking to reduce your business telecom bill and IT costs. How much do you...