As a small- to medium-sized business (SMB), your phone system is likely at the core of your client communication platform. With a phone system optimized for your team’s needs, you can facilitate collaboration and streamline communication while prioritizing customer engagement. In this post, we’ll examine some of the questions you need to ask if you want a business phone system that’s not only prepared to grow with you, but also to drive that growth.

Does the System Offer Intuitive Management?

As a small or medium business, you may not yet have the resources for a robust in-house IT team. That means you need a phone system that’s intuitive and straightforward to manage. Before deciding on the right business phone system, make sure to clarify any back-end management requirements, maintenance, and upkeep. As your business grows and your needs change, you’ll likely need to add lines, switch extensions, and change passwords. If a phone system simplifies these day-to-day tasks, then you’re on the right track.

How Simple Is Setup?

Chances are, you can’t afford days or weeks of downtime to get your new phone system set up and running. Your team doesn’t have the time to troubleshoot setup and configuration issues. That means rapid installation and deployment are a critical component of any SMB phone system. At the same time, you need a level of customization to optimize phone performance for your operations. Finding the right balance between simple deployment and customization is critical to finding the ideal business phone system.

Is the Price Right?

Budget is most likely the No. 1 factor guiding your business phone options. Finding the right business phone system is about achieving the optimal balance of cost and results. While you don’t want to end up overpaying for your phone system, you also don’t want to forget to account for reliability and maintenance when budgeting for a phone upgrade. Oftentimes, paying a little more today can pay off in the long run with minimal downtime and quicker fixes when issues inevitably arise.

How Scalable Is the System?

If yours is a growth-oriented SMB, you need a phone system that’s prepared to align with your growth goals. Before deciding on a phone system, make sure you account for being able to evolve with your changing needs. From adding users to accommodate a growing user base to increasing system capacity at a moment’s notice, research your options until you find one with the features to facilitate future growth, so you don’t end up with a phone system that slows you down.

Springfield, MO IT Support

As Springfield’s leading telecommunications consultants, the experts at PCnet are here to help you leverage a business phone system for your needs. We’ll work with you to understand your team’s workflows and clarify growth goals, so you end up with a comprehensive telecom solution built around your needs.

You know the old saying, “I heard it on the internet, so it must be true!” Indeed, the internet is a great resource for expanding education and remaining up-to-date on current events. The trouble is, well, it’s the internet, and it’s really easy for otherwise smart people to be duped. Whether it’s a news article, a quote, or an expertly crafted phishing email, the internet has been instrumental in raising a generation of hardened skeptics.

Internet Quote

This is what makes blockchains so attractive to entrepreneurs. Why? Because they are nearly impossible to fake.

So, back up. What is a blockchain? Blockchain is the technology that made it possible for Bitcoins to become a thing. And the way it works is kind of genius. Blockchains combines both established cryptology and years of computer science to do something remarkable—get people on the internet to agree on something. The something, in this case, is an accounting ledger. And they agree upon the accuracy of a ledger because the ledger itself is available on a public network, and previous blocks of the chain are not editable. The information also can’t be copied—only distributed—making it ridiculously difficult to forge.

It’s true, the initial use of blockchain was digital currency like Bitcoin, but the tech community is not known for finding just one use something. Indeed, blockchain could well be the bones of a new kind of internet. The same technology that made Bitcoin a trending news item is easily applicable to business.

Parks & Rec - Andy on Bitcoins

Think about the documents that are on your shared server. Say Bob in accounting needs to make a change to last month’s P&L report for his supervisor. We’ll call her Sally. So Sally opens up the P&L report and gets the following message: “Locked for Editing”. This is how document sharing is conducted across the board right now.

Now apply the blockchain method. There’s that P&L report, and like your existing server, this document is available on any computer that shares the same network. The applied blockchain technology would remove the “Locked for Editing”, because with a blockchain, there is no master document. Since the data is shared, every piece distributed across that network has the same value, and anyone can watch in real-time as updates are made.

Though this might not sound secure, the fact that at any given time, anyone can be looking at a blockchain makes them virtually impossible to hack. A blockchain has no central owner—everyone who is a part of the network has an equal share of ownership. It also doesn’t use the username/password system that has proven to be so easily exploitable by internet hackers. Rather, it uses encryption technology to remain secure, the foundation of which are “keys”. A public key is your address on the blockchain; it is a randomly generated string of numbers. When people make Bitcoin exchanges, the coins are recorded as belonging to the address holder of the public key. A private key functions as a password, which allows the owner to view their digital assets.

The possibilities with blockchain technology are limitless. We are still in the beginning phases of seeing how this tech can be implemented across industries. So don’t be surprised if you hear the word “blockchain” with increasing frequency. And if you have any questions about how they work, well, we’ve just hit the tip of the iceberg. Feel free to contact us and we’ll be happy to discuss blockchains and how they might be useful in your business.

 

Internet scams have been around since, well, the internet. Some are blatantly obvious—we all know not to buy anything a self-professed Nigerian prince is selling—while others are so subtle they can fool a seasoned internet skeptic.

The most common kind of email scam is “phishing”, the term coming from the idea that scammers are “phishing” for information they can use to believably assume your digital identity and through that, your financial information. This term goes all the way back to 1996 when scammers hacked into America Online accounts after they conned passwords out of trusting AOL users. In fact, phishing is like the grandfather of security threats—viruses, trojans, and ransomware can all stem from the phishing scam.

Phishing scams can be amateur or incredibly sophisticated, and have born their own set of rules that are as ingrained in some people as our parents’ warnings to never take candy from strangers. These rules include never give out your password and never click a link in an email from a user you don’t know. The trouble is, some scammers can so perfectly duplicate legitimate online platforms it can be easy to believe the email you just received actually did come from PayPal and your account actually does need immediate attention.

So what are the hallmarks of email scams?

  1. 1. Did the email go to the right email address? Most of us have not one email, but several. If a PayPal email went to an email address not linked to your PayPal account, it’s likely a scam.

2. Bad grammar and spelling are key giveaways that you’re dealing with a scammer rather than a legitimate company.

3. The email leaves out your name. In an age where everything is personalized, your name should be attached emails you receive from legitimate vendors.

4. You didn’t actually sign up or do business with the website in question. Now, this might lend some people to believe that someone has stolen their information and used it on this website, generating a false report. The trouble is when you click a link in the email, it won’t take you to the true destination (Amazon, PayPal, eBay, your bank, etc.), rather a dummy website that exists specifically to capture your information or spread viruses and malaware to your computer.

Not all phishing scams will be so blatantly sloppy that it’s immediately clear they’re scams, and it can be easy to overlook bad spelling and grammar or not notice your name is missing if you’re in a panic over the security of your account. So here are some ways to avoid being phished.

1. Suspect everything. Even you receive an email that looks legitimate from a company you regularly do business with, tread carefully. Instead of clicking the link provided in the email, pull up another browser tab and type in the web address. This will bypass any potential duplicates and take you directly to the company itself. There, you can login and check your account as you would normally, and change your password if you’re concerned about security.

2. Use free virus protection software and browser add-ons like McAfee SiteAdvisor to be alerted when you might be visiting a site suspected of malicious activity.

3. Use commonsense. It’s pretty much impossible to win contests you didn’t enter or receive security alerts from accounts you don’t have.

4. Trust IT partners like PCnet to provide virus and spam filtering for email.

Have a question about online security? Contact your friends at PCnet. We’ll work with you to create a plan that makes sense for your business so you and your employees can use the ‘net safely.

It seems we can’t go five minutes without some major brand announcing they’ve had a data breach and all of your information is floating around an ominous (but real) entity known as the dark web. Even if your information isn’t acquired as a result of a massive data breach, you can certainly think of at least one time when a friend, family member, or professional colleague sent out a mass SOS to alert their contacts that their email had been hacked.

The bad news is, everyone who is connected to the internet is at-risk. There are some safeguards that can be put in place, such as two-step verification (if your email provider offers this), secret image or word confirmations, identity-specific questions, and so forth that can and do offer protection from identity thieves. If you do nothing else, be sure to assign your accounts with a complex password. In 2018, we should be well beyond leaving off numerals or special characters, and for the love of Pete, your password should never, ever be “password”. Please.

So where do you start? Remember, not only does your password have to be secure, but you need to be able to recall.

First—one of the best ways (as an employer) to prevent data breaches is not necessarily to require frequent password changes, as associates will often recycle a variation of a previously used password, rendering the practice more or less meaningless. And it’s no wonder why employees would do this—with the level of complexity that most passwords demand, this is kind of like asking each employee to instantly memorize a new phone number every 30 to 90 days. The better way to prevent breaches is to monitor the activity on the account. Did Susie Q really try to login into her company email at three in the morning? Ask her. If yes, you’re good. If no, it might be time for a password change.

Second—be technical over complex. According to the NCSC (National Cyber Security Centre), the long, complicated passwords frankensteined together with multiple character types are somewhat counterintuitive because people, when it comes down to it, are predictable. Such as replacing the letter O with a zero. These strategies are predictable and place a lot of burden on the user with minimal benefit to the overall security. Worse, the people you’re trying to keep out are well aware of your security workarounds. They will then use a combination of frequently used words and character substitutions to undo your gloriously long password.

So what can employers do?

Lock it up. If a user fails to enter the correct password after a certain number of attempts (no more than ten), then lock the account.

Take away certain words—particularly if they’re frequently used. Forbes has a list of frequently used passwords as of December 2017, which includes everything from “letmein” to “monkey”, “starwars”, and, yes, our old frenemy “password” (and its accomplice, “123456”).

When PCnet manages your IT, you are getting much more than just a technology provider. We are experienced professionals with an exuberant passion and drive for helping businesses operate more efficiently. Working with a managed service provider (MSP) will help you keep your network and technology infrastructure in smooth, working condition. With an experienced managed service partner by your side, you’ll be able to take advantage of several structured IT solutions that will ultimately get you ahead of the curve.

Partnering with an MSP service is a business solution that will direct you towards long-term success. These are some of the main reasons why it helps to have a professional support team in your corner:

Better Security and Compliance:

There are several risks that are constantly lingering around networks. By working with a managed IT provider, you are mitigating a lot of these matters. An MSP will monitor your network and will inform you when any alarming issues are on the horizon. Additionally, your infrastructure will be protected by a strong layer of defense such as firewalls and antivirus software. Finally, the MSP will be responsible for helping you adhere to any compliance standards and regulations that your business follows.

Less Pressure on Your IT Department:

CIO’s and IT administrators have a lot of responsibilities on their agendas. They are responsible for managing every aspect of your computer and network support system. Partnering with an experienced MSP can help alleviate a lot of stress that they deal with on a daily basis. In reality, your IT department is too busy to monitor the network from a close lens, so an MSP will be able to cover this ground, in order for administrators to focus on more internal matters.

Better Maintenance and Fewer Repairs:

A managed service partner will help tune up any infrastructure to keep it in tip-top condition. Working with an MSP will expose you to upgrades that can give your system an extra boost. This will improve security and finetune any inefficiencies that you might be dealing with. As a result, you can expect less repairs and fewer headaches in the future.

Flexibility and Scalability:

Working with a managed IT provider makes it easier for you to deploy the technology you need, whenever you need it. They’ll help you get the tools you need when your company is going through any vertical movement. This is an easy and stress-free way to bring on new workstations or downsize on any equipment that isn’t necessary to have in the office.

More Responsive Services:

A technical disruption can be very frustrating and obstructive. If you experience a technical failure of any kind, it can take a lot of time and money to get things running and back to normal. Any downtime can put your operation out of commission and hamper your bottom line. You won’t have that problem when you partner with the right MSP. A specialist will quickly analyze the situation, find the source of the issue, and help you patch up the situation immediately.

Affordability and Cost-Efficiency:

A managed IT partner can help you save a fortune on your technology spending. They’ll examine your budget and develop a cost-effective plan to help get the most out of your technology solutions.

 

If you are looking for a managed IT partner, then contact the experienced professionals at PCnet today. We deliver flexible and authentic solutions to specifically serve each company’s needs. With more than 30 years of experience under our belts, we bear the skills, knowledge, and resources to help direct your business in the right direction. Set up a consultation with one of our certified technicians to learn about the affordable solutions that will help take your company to new heights.

PCnet 30th Anniversary Logo-01
October 28th marked PCnet’s 30 Year Anniversary!

We’re proud to be a part of Springfield’s amazing community, made up of friends, partners, clients and team members.

As we honor our past and celebrate all the many blessings and people that have gotten us here, we now look forward and will work to uphold all the values that we as a company hold so dear.
Thank you to everyone that has been a part of our family business.

As technologies change, there’s one thing that doesn’t, the team you rely on to help you navigate that change.

We look forward to helping your business recognize its full IT potential by taking IT off your plate and giving you the time to focus on what you do best.

Thank you for trusting us as your IT partner, we look forward to growing with you!

Marty Roach
President, PCnet & 85under

shutterstock_56197189

What does it mean for your company?

Ten years ago, Microsoft presented Office 2007, a software suite which helped popularize the Ribbon interface toolbar and several other software enhancements. Businesses still use this decade-old software suite, despite mainstream support ending in October 2012. Most companies have upgraded to newer versions of Office, but many still rely on the 2007 Office suite. With extended support for the software end date of October 10th, 2017 quickly approaching, it is time for businesses to seriously consider upgrading to a newer version. Read more