The Benefits of Unified Communications

Most organizations use phones regularly for daily communication therefore quality reliable business class voice service remains an important business requirement. In the past, proprietary phone systems were costly and complicated, as well as challenging to install and maintain in an ever-changing business environment. Fortunately, Unified Communications (UC) technology such as hosted Voice over IP (VoIP) offers an advanced alternative to systems of the past.

Learn more about the benefits of Unified Communications...

Thursday, November 09, 2017/Comments (0)/
Categories: Data Security

Trends in Business Security

The Need for Information Security and How This Ties to Cloud Initiatives

As we are moving to the cloud, hosted and other managed services, we have to think about how security pertains to that. If you think back five years or even a little longer, security was a firewall because we sent email back and forth and we had to understand who was sending us what and if it was malicious. Now, with mobile devices and other technologies, the attack mechanisms have grown ten-fold.

Read further to learn more about trends in business security. This information came from an article by David Lichtman, the publisher of the Sacramento Business Journal who sat down to talk with Darren Peterson, vice president of product marketing at Consolidated Communications.

Monday, May 01, 2017/Comments (0)/
Categories: Data Security

PCI Compliance: It's Just Business

With constantly changing technology and increasingly sophisticated cyber threats, how can your company maintain PCI Data Security Standard (PCI DSS) compliance? The latest version of the standard, Version 3.0, may make it easier by helping your organization make payment security “business as usual.”

The key message behind the changes is that meeting the PCI requirements shouldn’t be a once a year kind of thing. Rather, security monitoring, corrective action and reviews should be integrated into everyday business processes. 

Here’s what you need to know to start making that happen...
Monday, January 19, 2015/Comments (0)/
Categories: Data Security

Data Security in a Post-Target World

Asked why he robbed banks, Willie “The Actor” Sutton is reputed to have said “Because that’s where the money is.” The same logic may explain why hackers went after heavily protected customer data at Target: big challenge, big prize! In retrospect, Target’s logo now seems to have been the bull's-eye thieves went after looking for a monumental payday, but you don’t have to have tens of millions of customers’ credit cards and personal data to become the next ”target.” Here at Consolidated Communications we see lots of customers, both large and small, who face the same kind of risk. The asset can be company data, customer data, protected medical information, or third party information of all kinds. And the attack can occur via an in-house computer, the network, an unencrypted laptop, a phone or tablet, or even a customer device. We’ve seen attackers talk employees into giving out sensitive passwords and a penetration tester, who showed up dressed as a power company representative, was escorted into the computer room, and walked out with one of the company’s servers. Data security has never been more important than it is now, nor has it ever been harder to maintain. When your data storage is provided by Enventis, we work tirelessly to secure your data and prevent any telecommunication mishaps. 

Thursday, January 23, 2014/Comments (0)/
Categories: Data Security