Posts tagged "Phone"

business email phone encryption

Encryption for Email and Phone Security

January 4th, 2018 Posted by Best Practices, Cloud, Communication, VoIP 0 thoughts on “Encryption for Email and Phone Security”

To Encrypt or Not to Encrypt:

What is email encryption? Why would you use it? What about security for your business phones? Are you protecting sensitive data?

Today I want to jump into a topic that most of Think’s competitors seem to be missing. I walk into businesses every day that are not taking the necessary steps to protect patient, client, customer, and employee information. Email encryption is a simple a la cart service that Think Network Technologies provides.

HIPAA, PCI Compliance, and Email Encryption

Why does it take the urgency of regulatory requirements (HIPAA Compliance, PCI Compliance, or other laws) to get a company to purchase a product that is a socially and ethically responsible business practice? Encrypted communication should be a standard piece of every company’s infrastructure in 2018.

This topic came to light for me recently when I had a lawyer I was working with on a project send me an email. It was addressed from [email protected] (Names have been changed to conserve the privacy of individuals in this story.) I was in disbelief and appalled that an attorney was utilizing a Gmail account, so I decided to look into whether or not it was even legal.

What I found was that it does not comply with the new American Bar Association guidelines, and in some cases can actually be a breach of attorney-client confidentiality. Take a moment to consider your own methods. How do you handle potentially sensitive information? Are you sending personal health information over an insecure connection? Are your client phone calls secure?

encryption email phoneVOIP and Phone Encryption

The key to ensuring secure voice communication is to use VOIP (Voice Over Internet Protocol). Even using VOIP it is very important to understand the difference between transport encryption, and end to end encryption. Popular services like Skype and Google Voice can’t guarantee compliance and privacy. They may be cheap and easy to use, but you need to consider the consequences of having those communications intercepted. Would the cost of a privacy breach be worth the “convenience” of using a free service?

The Electronic Frontier Foundation has created a simple and short guide detailing secure communications. You can read the details here. No time for that? It’s okay, because we have you covered.

Secure Communications Solutions

Think Network Technologies has a full suite of cost-effective solutions for health care providers, legal firms, manufacturing, financial organizations, and many other companies who are mandated to utilize encrypted communications. We also have options for our clients who want to be responsible when sending client, employee, and confidential information via email. Let Think Network Technologies secure your communications today with our Secure Communications Suite of products.

Get in Touch!

Are you not sure whether you are in compliance? Are you interested in an audit of your business practices? Call or email today for a consultation.

How Secure Is Your BYOD Policy?

August 8th, 2017 Posted by Best Practices, byod, Data, Devices, Networks, Newsletters, Phone, Security, Staff 0 thoughts on “How Secure Is Your BYOD Policy?”

It only takes one unsecured device that’s plugged into your network to lead to a network breach. That’s why it’s so important to have a bring your own device (BYOD) policy.

BYOD has its pros and cons, and organizations that already have a policy in place or are contemplating implementing one need to tick some boxes to make sure it runs as smoothly and securely as possible.

 

The Upside

BYOD has obvious advantages for staff who like the convenience and familiarity of working on their own devices. It could also lead to productivity gains, as users have an affinity for their own personal devices and how they use them.

Personal laptops, tablets and smartphones are usually more cutting edge, given that companies often don’t update their desktops for years on end. BYOD also allows staff to carry only one or two devices around with them, rather than different ones for work and personal use.

BYOD policies can save organizations money, as they don’t have to spend as much on their IT hardware while allowing workers increased mobility.

 

The Downside

Having said that, BYOD practices are not free from security concerns. More and more mobile devices provide greater scope for ways to breach a company’s IT infrastructure.

Some employees may not be as stringent as they should be about the information they bring home that could be highly sensitive or confidential. Once they take it out of the office, there’s nothing stopping them from sharing it across devices, networks, emails or even showing it to their family and friends.

Disgruntled employees about to walk out the door pose an even bigger threat. If they are leaving to work for a competitor, BYOD makes it easier for them to take intellectual property with them. Alternatively, if an employee uses a smartphone to access the company network then loses it or it’s stolen, an unauthorized person could retrieve unsecured data on the device. Staff can also sell their devices or give them away and forget to wipe company data beforehand.

 

And the Essentials

A good BYOD policy should contain two critical components: an application or software program for managing the devices connected to your organization’s networks, and a written agreement that clearly states the responsibilities of employers and staff.

For example, IT departments wishing to monitor the use of personal devices must ensure that they only monitor activities that access company information.

Software developers and device manufacturers are constantly releasing security patches and updates for threats such as viruses and malware. BYOD policies should have the necessary processes in place to automatically apply those patches across all the agreed BYOD devices.

Additionally, organizations can simplify the whole process by limiting the number or make of devices allowed in their BYOD programs and the systems they have to support. Supporting a broad range of devices could become an administrative nightmare.

The IT department should also have permission to remotely wipe the device if it’s lost, the employee leaves or if it detects a data breach, virus or any other threat to its infrastructure.

BYOD should satisfy employees and management alike, as long as there’s a clear understanding of everyone’s responsibilities. Before settling on the best BYOD policy for your organization, it’s worth getting input from HR, IT, finance, legal and anyone else who has a stake in the matter.

 

Let the Think specialists help you and your company! Please contact our sales team at [email protected] if you would like our recommendations or a quote.

T-Cloud Hosted VoIP

March 17th, 2017 Posted by Cloud, Hosted Services, Newsletters, Phone, VoIP 0 thoughts on “T-Cloud Hosted VoIP”

Reduce IT Costs with T-Cloud VoIP Hosted Phones

The business environment in today’s world is always changing. New technologies, developing consumer behaviors, and a wavering economy accentuate this fact. Continual change introduces real and constant challenges for businesses of all sizes, so flexibility is crucial. But flexibility is more than a management mindset. Your infrastructure needs to be flexible too and that includes your phone system. A flexible VoIP phone system should cover and form to fit your current and future needs.

Project a Big-Company Image

With enterprise features like auto attendant, music on-hold, hunt groups and much more!

Cut Your Monthly Phone Bill In Half

Reap enormous savings while improving call quality, reliability and employee productivity.

Benefit Your Business

No software costs. Unlimited local and long-distance calling. 99.9% up-time. Fixed & predictable monthly bill. Starting at $25 per month, per user.

On the Go (ADV Feature)

Using Cisco Jabber, connect iOS and Android Devices to your phone system for the ultimate mobile experience.

Unify Your Employees

Join everyone together wherever they are – at the office, at home or on the road!

Cloud Infrastructure

Managed on our secured Data Center.

Email Integration

Your system will send voicemails to email for easy sharing.

Increase Your Productivity

  • Call Management & Routing
  • Automated Attendant
  • Hunt Groups
  • Visual Voicemail
  • Instant Messaging & Presence
  • Video Conferencing
  • Music on Hold
  • Voicemail to Email

Let’s Get Started!

Call us at 1-888-98-THINK or email us at [email protected]. We will answer your questions and prepare a personalized quote for your business.

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

© 2018 Think Network Technologies, LLC. All rights reserved.