Posts

How RingCentral Provides Best-in-Class Cloud Voice Security for the Hybrid Work Environment

During the turmoil of the last few years, businesses of all sizes scrambled to put in place flexible communications and collaboration tools to enable their employees to work from their homes or office. Many pieced together several applications for video conferencing, messaging, and telephony without considering the importance of a holistic security strategy.

Security is essential for UCaaS which spans the cloud provider hosting facility, network infrastructure, applications, and customer business processes. This affords IT departments peace of mind and enables them to focus on core business requirements rather than spending time creating and enforcing security policies across the UCaaS environment.

What Does Security with RingCentral MVP Look Like?

Maintaining customers’ trust in their data handling practices, demonstrating respect for data privacy, and arming customers with dynamic admin controls are top priorities at RingCentral and TCI.

The foundation of RingCentral MVP’s best-in-class security is its secure cloud platform with end-to-end encryption and a robust portfolio of security and compliance certifications.

RingCentral MVP offers compliance with global privacy laws and frameworks such as GDPR and HIPAA, stringent information security protection, and privacy and compliance controls to safeguard your business. Compliance with various industry regulatory standards includes STIR / SHAKEN, Kari’s Law, RAY BAUM’s Act, FINRA, HITRUST, and PCI.

The RingCentral MVP platform also puts a comprehensive set of administrative controls across video, message, and phone systems at your fingertips. You can require meeting attendees to authenticate, limit who can enable screen sharing, and require waiting rooms for your users to approve attendees who can join meetings.

For existing Mitel cloud communications customers, our partnership with RingCentral makes upgrading to the leading UCaaS platform a convenient, cost-effective, and secure business decision.

Arrange a meeting with our Cloud Voice Experts to discuss security and start your upgrade to the cloud. We’ll help you at each step of your journey to RingCentral MVP. Contact us today: (703) 321-3030 or GetHelp@tcicomm.com.
 

Keep Your Guard Up! Another Softphone Breach Shows Why Mitel Software Assurance is so Important

Software maintenance and updates, often called Software Assurance, aren’t top of mind for many business leaders. And yet, when you fail to realize its importance, big problems can occur, like last month’s softphone security breach that affected millions of people.

Together, TCI and Mitel are determined to help our customers safeguard what counts.

We understand the importance of protecting against the unexpected – proactively monitoring for threats, installing the latest patches and fixes, and providing outstanding support whenever our clients have an issue.

Mitel is tracking the security posture of global companies

Research has found that only 37% of companies have implemented a proactive security strategy covering real-time and non-real-time applications and services. 30% say they’re either developing or evaluating a security strategy, and 33% of companies are approaching communications and collaboration security in a piecemeal fashion.

Mitel is a Global Leader in Secure Communications

Mitel’s Secure Development Life Cycle is a comprehensive framework that begins with new app development and extends through ongoing product security and data privacy assurance. Mitel’s framework includes proven governance, security practice standards and guidance, constant measurement, and continuous improvement.

Local Response. Global Resources.

TCI backs up our DC region response working with Mitel’s Global Product Security Incident Response Team. Time is your most valuable asset during a security attack, so the sooner you identify and mitigate a threat the more likely you are to minimize the cost and damage of that attack.

TCI customers also benefit from our global network of Mitel partners, engineers, and customers who help us understand security issues and quickly take proper remediation steps together.

Mitel’s commitment to software assurance can also be found in Mitel’s latest software assurance (SWA) levels: Advantage SWA and Premium SWA

Both offer Mitel’s industry-leading protection, including 24x7x365 tech support, rapid response times, enriched performance analytics, automated security and functionality updates, APIs, full access to CloudLink Gateway, and real-time support during security incidents.

Even the best software assurance can’t guarantee you’ll avoid being attacked. What it can do is make sure you’re prepared and fully supported so that attacks are deflected or mitigated before they negatively impact your business.

If you don’t have that level of confidence in your communications, let’s talk about Mitel Software Assurance. Contact us today: (703) 321-3030 or GetHelp@tcicomm.com.


Choosing the Best Deployment Platform for Your Business Communications

We don’t believe in “one size fits all.” TCI’s custom solutions are designed to meet the precise communication needs of large and small organizations. A variety of cloud and on-premises deployments are available to connect your company and every location in your enterprise, and we’ll help you find the one that fits you best.

Cloud Considerations

When it comes to the cloud, here are some of the factors that will help determine the best platform or combination for your business…

  • What goes in the cloud? What stays? Start by identifying the applications that really matter and check for redundant functionality across applications; then focus on the key business and technical reasons for moving to the cloud. Use those decisions to shape the specific criteria for determining which applications should move to the cloud.
  • What level of privacy and security do you need? If you’re in government or a highly regulated industry like financial services or healthcare, you may want to consider combining a private, onsite platform with cloud services. A hybrid solution enables you to keep control of your communications infrastructure while still reaping cloud benefits like scalability, resiliency, and cost management. If advanced features, privacy, and control are essential to your business, dedicated private solutions offer the customized tools and flexibility you need.
  • How important is reliability? If your workforce needs immediate and reliable access to complex data, like large multimedia files, consider storing your data using redundant onsite and offsite storage. If you operate a busy contact center, a dedicated private cloud solution combined with redundant backup can protect you from costly downtime – if you lose your onsite system, the cloud will be there. Likewise, if a network failure hits your cloud provider your in-house infrastructure will be your safety net.
  • Will the communications system grow and flex with you? For many small and mid-sized organizations, the public cloud environment can be very cost-effective. You typically pay on a flat, user-per-month basis. In addition, even though you may connect via a public Internet connection, you can overlay a private network service for added reliability. A hybrid solution gives you added flexibility to scale more broadband when needed, ensures reliability, and allows you to maintain control.

On-Prem Still Makes Sense for Many Industries

Many TCI customers continue to choose on-prem based on control, reliability, security, customization capabilities, and complex integrations with other business applications. In some cases, Cloud providers either simply do not support these customizations or, if they do, they require the use of additional third-party platforms and complex custom application development.

A preference for CAPEX over OpEX and forecasted Total Cost of Ownership (TCO) are financial factors that drive some organizations to go with on-premises platforms or complement what they have with cloud apps.

Making the Right Decision

TCI can help you refine your communications strategy and will design, deploy, and support a solution tailored to your specific requirements – on prem, cloud, or a blend of both.

Get started today. Contact us at (703) 321-3030 or GetHelp@tcicomm.com.

 

The Power & Business Benefits of a Single Platform UCaaS Solution

Create new opportunities to boost efficiency, improve employee experience, and better serve customers.

For all the power we now carry in our pockets with our phones, many businesses still struggle with enabling seamless communications and collaboration in the world of remote and hybrid work.

Apart from the fact that talking — real-time audio conversation — has become one of the least popular communication methods, and collaboration platforms are incredibly diverse, there’s a wide variety of solutions for messaging, video conferencing, file sharing, whiteboarding… the list goes on.

Many businesses have invested in a Unified Communication as a Service (UCaaS) platform to replace their old fragmented systems. The next step is to integrate communication and collaboration into one platform.

The Benefits of Bringing it all Together

Bringing communications and collaboration into a single, purpose-built platform delivers four key benefits.

1. Remote work. Recent research from the SMG Group shows that hybrid work environments are a crucial differentiator when people are looking for jobs. This helps businesses attract and retain top talent and makes it easier for employees to collaborate.

2. Business-app integration. Having communication and collaboration tools all on one app makes it much easier to integrate with your other business apps and processes. Why? It gives you a single integration point rather than having to integrate with multiple apps in a patchwork solution.

3. Cross-channel communication. A universally compatible platform works, regardless of device or operating system. This lowers the burden on your IT staff to troubleshoot compatibility issues and is another enabler of productivity and collaboration for your employees.

4. Asynchronous and live communication. Real-time communication is sometimes essential. But not every discussion or workstream must, or can, happen in real-time. Asynchronous chat helps everyone stay current between live calls no matter the time zone or hour of the day.

How to Choose the Right UCaaS Solution

Once you’ve decided to move to UCaaS that combines communication and collaboration tools on a single platform, remember that not all of these solutions are created equal.

Here are the must-haves to consider as you evaluate moving to a new UCaaS solution…

  • Ease of onboarding. Is the platform easy to use, with a friendly user interface? Will the vendor help with change management as you migrate?
  • Security. How does the vendor address issues like encryption and authentication? How do they keep your data safe from cyberattacks?
  • Reliability. Does the service have guaranteed uptime? How robust is their customer service in the case of an adverse event?
  • Versatility. Is the solution compatible with the other business programs you use every day? Do they offer a comprehensive suite of integrations and/or API availability to draft your own?
  • Global integration. Will the platform be as reliable and responsive in Europe and Asia as it is in the United States?

Together is Better

If your business is experiencing barriers to working together across the office, remote and hybrid work environments, your local TCI team can help bring your communication and collaboration together. Contact us today: (703) 321-3030 or info@tcicomm.com.

Keeping Up with Data Security & Privacy Regulations… They’re Complex and Changing

Because larger enterprises are highly visible, serve a large customer base, and typically have deep pockets, they need to adhere to the highest standards of compliance. But that becomes more challenging when policy and regulations are a moving target.

To avoid penalties for non-compliance, enterprises must thoroughly research the data privacy and security laws of each market they operate in before placing sensitive and critical data in the cloud. The more geographically distributed they are, the more research they need to do, and the more requirements they must comply with to avoid ending up on the wrong side of regulations.

The TCI and Mitel Solution

For example, TCI’s Mitel-powered solutions allow enterprises to deploy their unified collaboration and communication solutions in their data center, in a partner-managed data center, or via a dedicated instance private cloud environment that uses data center companies like Amazon Web Services (AWS), Google, Azure – or any combination – to achieve compliance with local data privacy laws.

Selecting a serverless private cloud option using AWS, Google, or Azure enables the enterprise to keep control of its data without owning its hardware. This option also removes the complexity of maintaining hardware, simplifying management, and reducing costs. Finally, using the private cloud option increases flexibility to grow or reduce capacity, based on changing business needs.

Our customers can also leverage hybrid cloud scenarios, where the on-premises solution can be deployed using a private cloud in combination with cloud applications. This approach provides the ability to either remain on a current on-premises solution using dedicated hardware, use a private cloud while taking advantage of cloud applications, or migrate or expand a part of the business using a public cloud solution.

It’s All About Choices

When the stakes are high and complexity looms large, many enterprises are turning to TCI and Mitel. Talk with our experts about how to find the right communications solution deployment for each market and how to ensure they all work together.

Learn more about how TCI can help you successfully navigate the complex data security and privacy environment. Contact us today at (703) 321-3030 or info@tcicomm.com.

 

Need Wi-Fi Support Help? Simplify Management & Secure Your Office Network from the Cloud

Wireless connections are a critical element of today’s network infrastructure and one that consumes a growing share of IT resources to secure and manage. To support your wireless connections, TCI offers cloud-managed Wi-Fi solutions that enable you to streamline switching, routing, and security tasks via the web.

Protecting your Wi-Fi networks

You can arrange to dynamically grant or restrict network access to a device based on its security status, location, installed software and OS version, and more. And when a user fails to comply with a set security measure – such as disabling the antivirus program, jail-breaking a device, removing a passcode, or leaving a given territory – that person’s access to your Wi-Fi networks will be automatically revoked.

Need Wi-Fi support help?

TCI’s certified network experts can optimize and manage the hosting of your entire Wi-Fi infrastructure by offering:

  • Immediate implementation and expansion of Wi-Fi, switching, and security to new sites.
  • Upgrades, patches, and maintenance.
  • Support to allow mobile and remote workers to become as productive on the road as in the office.
  • Tiered services to suit the needs of any sized organization.

TCI’s cloud experts are ready to help you secure and manage your Wi-Fi network. Contact us today at (703) 321-3030 or info@tcicomm.com.

 


The Bad Guys Are Listening… Preventing Desktop Phone Hacks

Many offices have IP phones, but unknown to most users is that hackers can actually listen to everything that’s going on in the room – whether or not you are on a phone call.

Hackers from a remote location have been able to exploit some IP phones’ vulnerable software and firmware to gain access – even phones sitting behind a firewall.

Here’s some of the mischief hackers do when they ‘tap’ your IP phone:

  • Listen in on your phone conversations and identify who you’re calling.
  • With access to the phone’s microphone, hackers can feed the conversation into a speech-to-text engine and post the transcript to social media.
  • Since the microphone never shuts off, hackers can listen to everything the phone hears, such as conversations in a company’s board room.

IP phones are basically computers and manufacturers periodically issue software and firmware updates to plug security holes. The trouble is that smaller businesses – and many larger ones – are still lax about keeping their systems updated with the latest patches.

The most effective way to stop hackers from taking control of your IP phones – or any other computer – is to keep the software and firmware current with the latest patches from your phone manufacturer.

Ignoring these patches – or waiting too long to implement them – could leave your business exposed to hackers bent on doing it serious harm.

Concerned about possible IP phone vulnerabilities at your location? We have security and communication solutions that can protect your business. Contact TCI today: (703) 321-3030 or info@tcicomm.com.

 

Securing Your Business Requires Asking Service Providers the Right Questions

Secure communications can protect your business from the damage and destruction of a data breach. And it’s not just a priority for banks and healthcare providers – any business has daily office emails and phone calls that can contain confidential customer and corporate information.

Your communications system must be able to protect the data shared within your business and beyond. Here are 5 questions you should ask your provider to ensure you’re getting the best security:

1. What infrastructure is your system hosted on?

A strong cloud communications provider will be leveraging a best-in-class infrastructure to ensure the highest level of security. This saves you time and resources that can be focused on performance and innovation rather than management and maintenance. A secure communications software system, like TCI Host, can do all this, plus integrate with the programs you already use.

2. Can your communications software handle mobile securely?

Working on the go is a growing norm, meaning mobility is even more important for a communications system. However, a mobile system doesn’t always mean it’s secure. Ensure you can connect and work away from the office – without sacrificing in-office functionality and security.

3. Is your communications software certified HIPAA-Compliant?

Certified HIPAA and SOC 2 compliant software guarantees that your data is encrypted in transit and at rest with anti-virus protection and security protocols that adhere to the most stringent data compliance standards.

4. How do you monitor your system?

Your cloud communications provider should have a Network Operations Center, a location that continually monitors a telecommunications network – all day, every day. Do they support it in-house or outsource? What tools and analytics are they leveraging to stay ahead? Top providers are predictive and proactive, not reactive.

5. How do I get informed of any issues?

If issues do occur with your communications system, you need to know about them quickly. How do they alert you when problems arise? Is there a public site where you can stay up to date about any issues and their solutions?

Whether you’re in healthcare, finance, education or just interested in an additional level of security, look for a communications system that keeps your customer and sensitive data secure. And make sure you can connect to client information from anywhere, while ensuring your client’s privacy needs are met.

Looking for a communications system that’s built for security? Contact us today at (703) 321-3030 or info@tcicomm.com.

 

The Challenge of Remote Work & Maintaining Financial & HIPAA Compliance

With millions of people working from home in response to the pandemic, many businesses have embraced remote work as the “new normal.” This arrangement looks like it may permanently change how many leaders approach how they work, manage employees and structure their organizations.

But some things will not change…

Enforcement of regulations such as the Gramm-Leach-Bliley Act (GLBA), which deals with the security of consumers’ personal financial information, and the Health and Insurance Portability and Accountability Act (HIPAA), which deals with the security of patient records, does not stop just because people have shifted to working from home.

No matter where your people work…

Businesses that rely extensively on distributed workers cannot use just any cloud-based solution without incurring risk. So it is critical to verify that your technology supports customer teams working from home with the same levels of compliance as when they worked in the corporate office.

This is especially important when recording interactions and transactions, including any internal consultations that take place when a financial or healthcare professional is seeking clarification or guidance from a colleague. This also extends to those organizations whose teams continue to handle payments over the phone.

Whether your business is in the financial, healthcare or retail sector, TCI offers secure, reliable cloud communication services. We’re ready to assist your business maintain regulatory compliance no matter where your people work. Contact us today at (703) 321-3030 or info@tcicomm.com.

 

5 Ways to Safeguard your Business from Cyber Threats

One thing that has been fueled by the pandemic is the increasing frequency and greater scope of IT cyber attacks. And still, many businesses remain ill-prepared. Over one-third of small business owners recently surveyed admit they were at risk of falling victim, and a third said they were not confident that their business would recover if attacked. Only half believed they were well prepared.

Although there are new cyber threats every day, here are five measures that can help protect your business from the threat of imminent attacks:

  1. Schedule Annual Risk Assessments – Before taking any steps to prevent cyber-attacks, you need to understand the threats that are out there and your organization’s vulnerabilities. Risk assessments need to be thorough and conducted at least once a year.
  2. Monitor Your IT and Phone Systems – Keep a close eye on all critical IT systems to mitigate imminent threats. Consider hiring a trusted partner to monitor your network traffic, phone systems, server environment, and data processes around the clock.
  3. Back Up and Encrypt Your Data – Team up with trusted Voice and IT experts to set up a reliable cloud-based backup infrastructure system. Encrypted and safely backed-up data can protect against a range of eavesdropping and ransomware attacks.
  4. Manage Admin Privileges – Ensure that employees have access only to the IT resources and data they need to complete their tasks. Limit IT privileges across the board, especially for installing new software and accessing or manipulating sensitive data. Restrict admin privileges to only a few individuals and immediately revoke privileges when people leave the organization.
  5. Train Your Team – Regardless of the cybersecurity measures you have in place, it’s crucial to ensure that your workforce is on board with security protocols. Schedule routine staff training sessions to establish cybersecurity awareness, responsibilities, and accountability across your business.

Defense is the Best Offense

It makes more sense to invest in preventive solutions now rather than scrambling to act after an attack. Keep in mind that a majority of businesses never recover from successful cyber attacks.

With all the dangers lurking out there, you can’t afford to take chances with your security posture. Contact TCI to discuss your Voice and IT security challenges: (703) 321-3030 or info@tcicomm.com.