Category: Tech News

Protected Harbor’s New PBX Phone System

Protected Harbor’s New PBX Phone System

 

Protected Harbor’s New PBX Phone System

 

Protected Harbor is proud to introduce a state of the art phone system 3CX.  It is available to all our current clients and anyone in the market looking to upgrade their current set up.  Protected Harbor partnered with 3CX, and provides system configuration and support.

The benefits of this new phone system are plentiful, starting with the end-user being in complete control.  This PBX can be installed on-premise and virtualized on a Linux or Windows platform.   It is easily set up via iOS and Android apps for remote work via QR code.  Staff can easily be added, and voicemail can be set up in minutes.  The user management is simple and easy which will save countless hours of work.

The biggest benefit perhaps, of our system is that it has a softphone so you can make and receive business calls from your PC, tablet or smartphone.  There is no need to be tied to a hard physical phone in your office.  It’s perfect for businesses that have employees working from home during COVID-19.

Moreover, many of the phone features that other vendors classify as add-ons, such as video conferencing, iOS and Android mobile apps or call center features, are included with Protected Harbor’s PBX. So, there are no hidden costs for the features you need.

Switching to this configuration makes complete sense when you compare pricing to that of other PBX vendors such as 8×8 and Avaya. Our system provides a complete unified communications solution that is easy to manage, flexible and affordable. Whether you are a small business or a large enterprise, you can save thousands and avoid all the hassle of purchasing additional extensions and add-ons as your business grows.

Think less about maintaining your PBX, and more about your business – call or email us today to find out more about Protected Harbor’s new phone system! www.protectedharbor.com

Disadvantages of AWS, Azure, and Other Big Brand Hosting

Disadvantages of AWS, Azure, and Other Big Brand Hosting

When it comes to hosting for a business, you don’t want to use just anyone. There are many critical factors to consider including security, stability, uptime, scalability, and more. Because of this, many businesses gravitate towards big, established brands for hosting and management such as Amazon’s AWS or Microsoft’s Azure.

Companies like these can likely provide well beyond your technical needs. That’s not to say they’re all the exact same. Azure caters to Microsoft products, allowing large companies to move their Windows-based infrastructure online more easily. Meanwhile, AWS boasts their general flexibility and universal capabilities.

Each brand has its unique strengths. When it comes to weaknesses, however, there are some overlapping issues that basically any large-scale hosting company deals with.

Overwhelming Options

Right from the start, many businesses are overwhelmed with the variety of packages and services offered by large hosting companies. AWS, for example, greets you with an entire library of services and products to choose from. Simply trying to find basic website hosting proves to be difficult and confusing.

Unclear Pricing Structures

Equally confusing are the pricing structures. Many companies try to sign you up on free trials or temporary discount pricing, only for you to discover the true inflated price months down the road.

These companies also tend to work off a pay-per-use model. In other words, the more data you process and store, the more your hosting costs. While it sounds nice in theory, as you only pay for what you use, it can make it very difficult to predict your monthly costs as prices fluctuate.

It also leaves you severely exposed to DDoS attacks.

DDoS attacks infect a large number of devices with malware and then use them to unleash a coordinated flood of traffic on an unsuspecting network. In addition to slowing down and (likely) crashing your systems, it results in a massage spike of data use.

The average size of a DDoS attack is 2.5 gigabits per second. If you’re being charged per data used, you’ll be left with a very large hosting bill following a DDoS attack.

Advanced Knowledge

Once you’ve figured out what your business needs, the real difficultly begins. Within any given service, there are countless add-ons, tools, settings, and more. While this provides a lot of flexibility and customization, it requires a lot of work and understanding. The deeper your needs go, the deeper your understanding needs to be.

Each platform is different, which means you either need to hire someone who is experienced on a particular platform, or you’ll need to invest in training a current employee. The question is, do you want someone learning a new platform as they’re managing your IT needs?

Support Problems

Platforms like AWS and Azure do offer their own technical support, should you require it. In fact, they often provide a certain amount of free support when you sign up. However, those hours can quickly be eaten up during the onboarding. After that, you’ll pay for support.

Things can get very expensive very quickly.

A better solution is generally to find a third party to help manage and maintain your hosting needs. This can provide more affordable support, but it also adds complexity to your hosting management and expenses.

A Simpler, Yet Powerful Hosting Solution

At Expedient Technology Services, we provide straightforward, yet diverse hosting solutions for businesses of all sizes. Whether you’re a start-up or an enterprise, we have the capabilities to meet your specific needs.

We operate under flat rate costs, so you know exactly what you’ll pay every month. We can even bundle in support hours so that you get professional assistance when you need it. As your company grows, we can easily scale our services with you.

While our initial costs may seem higher, they’re generally cheaper in the long run. Best of all, they’re much less stressful to understand and manage. After all, ETS exists to provide Stress-Free IT. For hosting, computer services, and technical support in Dayton, Ohio, and beyond, contact ETS today.

What Does the Average Company Pay for Downtime?

What Does Downtime Cost the Average Business banner

 

What Does Downtime Cost the Average Business?

 

One bad experience is all it takes to rattle a business owner. Infrastructure matters and when your system or applications crash. It can have an enormous impact on your bottom line not to mention your business operations.  Monetary and data losses from unexpected crashes can even, in some cases cause a company to close its doors permanently.

According to an ITIC study this year, the average amount of a single hour of downtime is $100,000 or more.  Since 2008, ITIC has sent out independent surveys that measure downtime costs. Findings included that a single hour of downtime has risen by 25%-30%.  Here are some staggering results:

  • 98% of organizations say a single hour of downtime costs over $100,000
  • 81% of respondents indicated that 60 minutes of downtime costs their businesses over $300,000
  • 33% of those enterprises reported that one hour of downtime costs their companies between $1-5 million

The only way to mitigate risk is to be proactive by having the right technology in place to monitor, prevent, and when an attack happens (and it’s not IF but WHEN), having the right company on hand to restore, rebuild and restart. Once you understand the real-life costs of downtime it should not be hard to take proactive measures to protect your business.

Protected Harbor has a full team of technical experts and resources to maintain your system’s well-being and ensure business continuity. Contact us today for a full assessment of your applications and infrastructure.  www.protectedharbor.com

How did Twitter get hacked?

How did Twitter get hacked?

On July 15th many Twitter accounts were compromised.  How did this happen to a company like Twitter?

‘This was the worst social media hack ever happened in history’twitter hacked

The security involvement of the hack are also wide-reaching, not just for Twitter but for other social platforms.

Early suggestions are the hackers managed to access administration privileges, which allowed them to bypass the passwords of any account they wanted.

Twitter appeared to confirm this in a tweet saying: “We detected what we believe to be a co-ordinated social-engineering attack by people who successfully targeted some of our employees with access to internal systems and tools.”

As we generate more content online we are creating a larger digital footprint.  These attackers simply contacted Twitter and asked for the names of key personal, the head of the customer service, their CIO, etc.  Once the attackers knew the identity of key individuals they then researched their web pages, Facebook links, LinkedIn profiles, etc.

The attackers were able to gain enough information from those pages to be able to correctly answer Twitter’s support questions and gain access to those accounts.

Once the attackers had access to an Admin account they could reset end-user accounts and then login as those users.  It was that easy.

Some questions that should be asked; What would have helped prevent this disaster?  Is your system(s) vulnerable to a similar attack?   How can your system(s) be protected?

2FA or Two Factor Authentication would have stopped this attack.  With 2FA the mobile device is registered to the account and the login is not possible until a code on the mobile device is entered.

At Protected Harbor we support 2FA for all systems, allowing our customers to be safe, secure, and protected, as in Protected Harbor.

TAKING YOUR PRIVACY BACK FROM GOOGLE

TAKING YOUR PRIVACY BACK FROM GOOGLE

 

With every new technology comes benefits and concerns.

Now Google can present coupons for stores you have purchased from while you are driving past them, and tell you what you need to buy in your smart refrigerator, or based on your driving pattern can tell you when you will next visit a location.

As someone who works IT, I do not like my refrigerator telling Google what I am eating and I don’t like Google knowing all the details of my life.

Google does not make it easy to control your data because that is how they earn revenue. Google doesn’t charge for Android, the majority operating system for cell phones because they earn money by monetizing your behavior and selling what you are interested in. Do a Google search for “Cruises from Boston” for example and see what ads appear in Google and are emailed to you.

Google tracks your location, what you search for, your buying habits and most activity on your cell phone.

For example, when I looked up a friend’s location history, I could go back to 2015 and see where they had been and for how long.

It is possible to take control over much of your Google data by visiting; https://myactivity.google.com/more-activity?authuser=1/ . This page presents a menu of data collection items, each one can be adjusted or disabled.

WITH EVERY NEW TECHNOLOGY COMES BENEFITS & CONCERNS
Google tracks your location, what you search for, your buying habits and most activity on your cell phone.

Protected Harbor’s COVID-19 Response

Protected Harbor’s COVID-19 Response

Protected Harbor’s COVID-19 Response

Protected Harbor manages IT for a variety of small, medium and large companies.  Due to the COVID-19 outbreak, virtually every one of our clients decided to or were forced to work from home.  These requests came from all our clients at the same time over a matter of days.
Due to our infrastructure design, and the responsiveness of our staff, Protected Harbor was able to migrate our clients to “work from home” within hours of the request, and with minimal or no interruption in their business.
Also, support costs for clients as they work from home is included in our base price, which is a flat monthly rate.  So none of our clients experienced a rise in IT costs.
If you are struggling to migrate your business to work from home, please call Protected Harbor at 201-957-1616.
Protected Harbor also offers businesses Cloud Services, Network Management, Ransomware and Security Protection, Disaster Recovery and more.