Tag Archives: voip service provider

Moving? A few things to consider……

Moving? A few things to consider……

Technology is at the core of your business. It is essential that your IT move is done right the first time minimizing the disruption to the ongoing operation of your business. Your IT staff or VoIP service provider needs to be an integral part of your relocation team to ensure there is little to no downtime for your business.

Moving to a new office is the perfect time to upgrade your communications systems or refresh old technology. While your new location is being built out or renovated it is the ideal time to install a new technology infrastructure. All the necessary cabling, electrical and wireless foundations can be laid to ensure your technology investment functions at it’s best.

Don’t forget what you’re leaving behind. Planning for a move also requires consideration about the condition you leave your former office, or rightly called ‘office decommissioning’. Without a thoughtful process this could be an unintended major expense. Shawn O’Neil of Argosy Management Group, a leader in office relocation, warns not to overlook your old office space. “Neglecting to properly decommission the old office space leaves you exposed to unnecessary costs. The majority of commercial leases contain very specific requirements as to how the old space needs to be turned back over to the landlord. If not, it’s your deposit that hangs in the balance. The removal of unwanted furniture can be an expensive undertaking.”

So how do you dispose of old office furniture, equipment and technology when you move? Thankfully, finding a good way to dispose of old furniture, phones and computers doesn’t have to be such a headache. In fact, there are some pretty good ways to make disposal easy and sometimes work to the advantage of others.

The first step prior to a commercial move is making a comprehensive inventory of what you’ve got and what you don’t want to take with you. Secondly, assess the condition of the furniture and equipment. Is the furniture is able to be broken down and assembled again without issue? Is the equipment in good working order? If yes, then it could be re-sold. Be sure to notate in your inventory list the condition of the items. The more accurate your inventory, the easier the disposal process will be.

Here are a few suggestions for furniture disposal:
• Offer the option to your employees to buy the furniture
• Re-sell to a used furniture store
• Contact the vendor you purchased from, they might buy it back
• Donate to a charity (Habitat for Humanity, Goodwill, Salvation Army, your local church may need furniture for their offices, etc)
• 1-800-Junk is an option but you will have to pay a fee for removal
If you take advantage of moving as an optimal time for a technology upgrade, utilizing modern technologies will give you a competitive edge and empower business growth. So what can you do with the electronic waste left behind?

Every computer dumped into a landfill represents a missed opportunity to provide technology and tools to individuals and organizations across the digital divide. Ancero partners with The Trenton Digital Initiative – a nonprofit program working to help economically challenged Trenton families gain affordable access to the internet. TDI reconditions, repurposes, and then distributes donated computers to these families for free, as well as providing low-cost, high-speed Comcast Internet service. Ancero serves as an equipment drop off location at 1001 Briggs Road, Suite 220, Mount Laurel, NJ between the hours of 9:00am and 4:00pm.

Very old or broken hardware should go to end-of-life recycling, meaning responsible destruction that’s safe for the environment. A computer recycler is a business or organization that salvages useful computer parts before breaking down what’s left, safely removing hazardous materials in the process. Always remember to wipe any sensitive information from any hardware before you turn it over for recycling.

For listings of recycle drop off locations in your area visit these resources:
Earth911
NJ State eWaste recycle centers
PA State Electronics Collection programs

Of course, if you donate furniture or technology you’re eligible for a tax write-off so you can still end up with some financial gain in the end along with the knowledge that you are helpings others!

Don’t pay to move an aging phone system or outdated technology when Ancero has helped hundreds of clients to cost effectively modernize their business phone systems and IT infrastructure with options that don’t require an initial capital outlay for the hardware! Moving is complicated and stressful. Entrusting Ancero, a full service IT company, with your IT infrastructure and communication needs gives you one less thing to worry about. Getting you back to business faster, with minimal downtime.

 

VoIP is not immune to security threats

VoIP is not immune to security threats

The many benefits of switching to a VoIP system from traditional telephony are why it has become widely adopted by businesses everywhere. But since most businesses view the switch to VoIP as just an upgrade to their phone system, the importance of VoIP security rarely crosses their mind. VoIP’s technology has inherent vulnerabilities that can pose a risk, but with the right security measures set in place, VoIP can be secured to prevent attacks or misuse of services. Security specifically for VoIP communications can be examined in three important parts:

What do you need to protect?

  • Keep your VoIP service running continuously, without disruptions or downtime
  • Protect sensitive customer information and business data, including call transcripts and transaction records
  • Prevent unauthorized users from making calls, and gaining access to your network
  • A secure VoIP system will help your business maintain compliancy standards

Who are you protecting against? Understanding where threats may come from and the motivations behind the attacks is critical. The main threats generally come in three forms:

Toll Fraud: A person or organization that wants access to VoIP services can piggyback on your system to gain free international or long-distance calls and data transmissions.

DoS attacks: Denial of Service attacks, organized assaults on a VoIP system are initiated to gain access to confidential information, along with telephone numbers, IP addresses, etc. This sensitive data can then be sold to competitors, or used to redirect calls for other purposes. DoS attacks are not always financially motivated. Sometimes the intent is simply to disrupt or shut down a network and may have been initiated by a disgruntled ex-employee or a sneaky competitor.

SIPVicious attacks: SIPVicious in its benign form is a developer tool used to audit the state of your SIP network. But the tool can be corrupted for bad intentions and used to gain access to a network or shut down systems, crippling your business.
What security measures are needed? VoIP security measures are not that different from data network security and layered steps work best.

Encryption – Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are the standards for data encryption. These measures encrypt or scramble information so that it cannot be easily deciphered if the data transmission is intercepted.

VLAN – A VLAN segregates broadcast domains between networks. Because it separates voice and data, you can apply different security measures to your voice and data packets while improving the performance of your VoIP system. A VLAN is a good security measure for remote phones that connect to the business network.

Network security – It is just as important that your business network infrastructure is secured with firewalls, antivirus, gateway protection, end point security measures. Software patches and updates should be run regularly to keep systems up to date and eliminate vulnerabilities. To prevent outages and downtime, a redundant power supply, backup servers and regular data backups should be built into your VoIP network.

User Security – Educating the user is vital to preventing human error. Employees must use strong voicemail passwords, be educated about threats and how their actions can either help or hurt security. Employers must set and enforce security policies. For instance, applying a pin code for international calling is a common security measure to prevent unauthorized international calling. If a business is lax with precautions, they may not even know when a breach has occurred until after the damage has been done.

Businesses shouldn’t shy away from a VoIP phone system due to security concerns. The benefits far outweigh the risks! Just as with any technology, when you take the necessary steps to ensure that your system remains secure, risk becomes greatly minimized. Many of the VoIP systems available today include robust security protocols as part of their offerings. Be sure to inquire with a VoIP service provider about built in security options if you are planning a move to VoIP.

Take a look at Ancero’s Utility VoIP cloud based phone system. Our award winning Managed Communications services can help you plan a communications strategy perfect for your business needs.