Is your phone system outdated and inadequate for meeting your needs?
Legacy phone systems often impede business growth. They can be expensive to maintain, have confusing maintenance contracts and obsolete features. They’re also usually incompatible with newer technologies, such as Voice over Internet Protocol (VOIP). Planning for a new office telephone system can sometimes be a daunting task. A phone system should be easy to understand and use. It should be scalable and able to interface with today’s popular mobile apps.
Here’s a checklist to help start the process:
- How many employees do you have?
- What is your business growth plan over the next five years?
- What telephone system features will be required to support your growth?
- What features will help you be more competitive?
- Will you want your phone system on your premises, or migrated to the cloud?
- How many phones do you expect to need?
- Is a call center part of your business?
- Must-have call center features: automatic call distribution (ACD) queues, real-time dashboard reporting, call recording.
- Do you need voicemail, auto attendant, business hour rules, call detail records?
- Will you need to port phone number(s) or acquire phone numbers?
- Do you have access to broadband Internet?
- Important system features to consider: voicemail, email integration, auto attendant, ring routing, business hour rules, call detail records, etc.
- Other considerations: audio and video conferencing, text chat, etc.
For a no-obligation consultation, speak with one of our experts today:
or email email@example.com to arrange a complimentary appointment.
Next time you create another password, pay a little more attention and make it a stronger more secure one! The goal is to prevent attackers from gaining access to your account and stealing your personal information.
Unfortunately, even though people may think this type of criminal activity is somewhat rare, identity theft statistics show that your chances of being affected might be much higher than you think. Identity theft is one of the most common consequences of data breaches.
In 2017, 1 in 15 people became victims of identity fraud, and 1 in 5 victims have had their identities stolen more than once. In other words, if your chances of winning the lottery were 1 in 15, like the odds of being an ID theft victim, we would all have family, friends and colleagues who were millionaires.
Although we can’t help you secure a future Lotto 6/49 prize, we can offer some thoughts on changing your odds when it comes to identity theft statistics.
Some good prevention tactics include changing passwords regularly, being cautious when putting personal information on social media and checking your bank and credit accounts frequently to spot fraudulent transactions.
Your password should be long, complex and unique. Here are additional steps you can take to help create strong passwords and secure your accounts:
Avoid common words or phrases
Don’t use the information available to others like your birthday, phone number, or Social Security number. Attackers often use a dictionary of previously exposed passwords and information gathered from the internet to help them guess a password.
Change passwords quickly if there is a breach
Attackers who steal data from companies often obtain password information. If you receive a notification from a company about a possible breach, change that password and any account that uses a similar password immediately.
Consider a password manager
Most people have trouble keeping track of all their passwords. Consider storing your passwords and security questions in a password manager, an easy-to-access application that allows you to store all your valuable password information in one place. Use a strong password to secure the information in your password manager.
If you forget your password, most companies require you to answer security questions to regain access. Here are some tips to make sure an attacker can’t use your security questions as a way to get into your account:
- Select security questions where only you know the answer. Many security questions ask for answers to information available in public records or online, like your postal code, mother’s maiden name, birthplace. That is information a motivated attacker can obtain.
- Don’t use answers to security questions that can be guessed. An attacker can guess the answer to a security question that has a limited number of responses (dates, colours, Provinces, countries). Avoid questions like “What Province were you born in?” or “What colour was your first car?” which allows an attacker to guess all possible answers.
- Don’t give a generic answer to a security question. Find an answer to a security question that you will remember but is also more complicated than a generic word. For example, if the security question asks “What is your favourite childhood memory?” the answer “watching the Dodgers with my mom” is more secure than “baseball.”
Do you like these Tips? Call now to speak to one of our security experts.
or email firstname.lastname@example.org to arrange a complimentary consultation.
Contributed by Erick Preza
Working Alone with no one to monitor your work, tell you what you are doing wrong or constantly asking you questions, sounds like the Perfect Job. Working Alone really means that you are further away from help and first aid if anything happens. These Incidents can be Tragic for the Worker, their Family and the Company.
Although Provincial Regulations vary, there are a few common principals that apply. Every Employer must conduct a hazard assessment, they must take all reasonable measures to eliminate or minimize the hazard and provide an effective communications system for the specific Lone Worker situation.
Lone Worker Environments
Those who work alone can be grouped into five categories:
- Workers handling cash. Store Clerks, Retail and Food Outlets and Taxi Drivers.
- Workers who travel away from their Base Operations to meet Clients. Home Care Workers, Social Services and Enforcement Officers.
- Workers who do hazardous work but have no frequent interaction with the Public. Logging, Oil and Gas Industries.
- Workers who travel alone and have no regular interaction with Customers or the General Public. Truck Drivers, Business People traveling to various locations/
- Workers who are at risk of encountering violence because their work location is isolated from the Public. Security Guards and Janitorial Custodians.
The key to meeting and surpassing the Working Alone Regulations is to provide a source of Communication for someone to be either in contact with the person or being able to locate the person working alone.
Although there are many methods and types of Communications Equipment that can assist a Company with staying in contact with their Employees working alone, a few of the more common methods include:
- Two-way Radios
- Two-way Radios with built-in GPS
- Vehicle and Personal GPS Systems
- Cellular Phone Apps
- For the very remote locations Satellite Phones and GPS
We will always encounter environments and locations that will challenge the existing equipment and methods of staying in touch with Lone Workers. Methods and Solutions are constantly changing and the equipment is always evolving. Communications Providers are always working on the next Solution and for the Companies needing these Solutions the question, they must answer if what Solution best fits their wants and needs. A recommendation to these Companies is to explore the options and don’t settle on the first Solution.
Working Alone is only done when it is necessary. Working alone isn’t as easy as it sounds, there are many Rules and Requirements that the Province has set out to ensure the safety of Alberta’s Lone Workers. To check on the requirements needed for your Industry, go to the Canadian Centre for Occupational Health and Safety.
Contact us today for a no-obligation consultation to explore the options:
Or email email@example.com for a professional consultation!
Contributed by Wade Miller
For a hospitality property a working phone system is a priority. It is an emergency if the phone system is not working. However, it is part of the property that is rarely thought of, like a chair or a desk.
For most property’s features have been relatively static since the addition of voice mail, but this is changing fast with new technology.
For larger properties, Nutec has been supplying PC attendant consoles, formalized call centres and advanced 911 options. Nutec also supplies paging, sound systems, two-way radios, WiFi and surveillance systems for hotels and motels. We are happy to talk to you about these as well.
Here are some new options that appeal to properties of all sizes:
CRYSTAL PLASTIC FACEPLATES
Have your guest room phone faceplates printed on crystal plastic, and they are water and stain-proof, much more durable than paper and the colours last longer.
Unleash your night manager from the front desk. Get better communication with maintenance and other staff. Add an extension of your NEC phone system to a live or WiFi-only cell phone. Most properties use a cordless phone with a limited range.
IN HOTEL PROPERTY MANAGEMENT SYSTEM
For up to 120 rooms NEC has a phone system that includes a complete comprehensive integrated Property Management System. No additional computer or monthly fees are required. Easy to use for faster billing or rooms, calls, mini bar, spa, restaurant and lounge.
- Room allocation – See current and future guests on a colour coded calendar view
- Jump to Date – Quick access to any future date
- Guest Filter – Easily find a guest reservation or stay using the filters
- Room Management – See the colour coded status of all rooms (clean/dirty/out of order)
- Folio Management – Add charges for services and products to guest folio
- Invoice Generation – Complete invoice generation for room nights, services & telephone calls
- Message Service – Capture messages for guests with automatic room notification
- Flexible Room Rates – Based on calendar dates or days of the week
- Multiple Connections – No license for additional connections, folio items can be added by housekeeping or restaurant
- Guest Stay Information – Capture information about the guest, contact details and stay reasons; opportunity to build CRM database of guests
- Custom Products & Services – Can be created & added to the guest folio
- Checkin/Checkout Functions – Automatically control telephone restrictions
- Guest Name Display – the Guest name is transferred when the guest checks in, displayed on reception phone when a call is received from the room
- Telephone Billing – All calls are captured and billed against the guest folio
- Flexible Rates – Custom rates can be configured to allow the hotel to set its own call rates
- Multiple Telephones – Multiple telephones can be grouped into a single room and billed to a single guest stay
- Hotelier Control – The hotelier can set call restrictions (local only/local & national/ international), block room to room calls and set Do Not Disturb feature from the hotel console
- Centralized Wakeup Call Management – Wakeup calls can be set by the guest or hotelier & managed, modified or cancelled within InHotel
Or email firstname.lastname@example.org for a professional consultation!
Contributed by Trevor Naish