What questions need answers when selecting a Hosted VoIP System?

For many small businesses, a hosted/cloud-based VoIP communications system is an excellent way to maintain a professional connection with your customers without the challenges of maintaining a traditional premise-based phone system.

Here are some questions that you may wish to ask:

  • How is Hosted VoIP different from regular VoIP or my cell phone?
  • What kind of phones do I need?
  • Can I integrate with my CRM?
  • How will this work for employees who are out of the office or travelling?
  • Will it help reduce my business costs?
  • What features do I really need?
  • I have a contact center. Can VoIP support this?
  • Can I do video or audio conferencing?
  • How do I add new locations or additional employees?
  • Do I have to have phones on my desk?
  • What productivity tools are included?
  • What training and support is provided?

Contact us now to get all your questions answered:

Telephone systems Edmonton





Each user receives their own personal video conferencing account.


  • Easy to use and easy to install mobile and desktop applications. No heavy IT infrastructure
  • Embed your online meetings experience into everyday applications like Google®, Microsoft® and more.

MEET ANYWHERE Host and join meetings wherever you go with the MEET desktop and

MEET SECURELY MEET enables HIPAA compliance and offers end-to-end encryption for all meetings using WebRTC standards.


  • 30 Web Meeting Participants
  • 12 Active Video Panels
  • 200 Audio Participants
  • Video Conference
  • Screen Sharing
  • Remote Control
  • Chat & Notes (Capture meeting notes in realtime–notes are automatically sent to all meeting participants)
  • Meeting Recording with Transcription
    • Recordings can be played back from virtually anywhere at any time.
    • Like a ‘virtual PA’ – Artificial Intelligence (AI) based transcription ensures accurate taking of meeting notes.
    • Outcomes and progress no longer suffer due to scheduling conflicts.


2 Way Radios Calgary


Learn more https://www.univergeblue.com/cloud-services/meet

Contributed by Trevor Naish

“Hey Siri, Who’s at the Front Door?”

Have you explored the availability of important home security/video options?

iOS mobile users can now get quick, hands-free access to live streams from their video and doorbell cameras by using Siri Shortcuts like:

“Hey Siri, show me my living room camera.”

With Siri Shortcuts, you can create custom phrases to open a live video window on your mobile phone. You can even see who’s at the door even when your hands are full or see what’s happening around a property without needing to tap through the app to find the right camera.

Contact us now to learn more:

Telephone systems Edmonton




Whether you are communicating with a colleague, a customer, or a group of people who are dispersed across different locations, using video and audio to connect online has become a method of choice!

With remote work becoming more common, companies need to find a way to maintain face-to-face contact to get work done. The online meeting technology only requires basic equipment. You need an Internet connection, audio (from computer speakers, microphone, or via telephone), and a webcam (standalone or integrated with your monitor/laptop). Compliment this with secure application software and you’re ready for business!

Benefits of virtual meetings include:

  1. Participants are less likely to multitask on video
  2. Seeing actual faces makes for a genuine connection
  3. It’s easier to get your point across on video
  4. It makes it easier to complete tasks

This is one of the powerful components of Wildix Unified Communications and Collaboration, a solution that is secure by design.

Please contact us today for details!

Telephone systems Edmonton



“Approved by Health Canada”

  • One second to detect skin-surface temperature of a person
  • Multi-person detection simultaneously
  • Non-contact measurement to avoid physical contact
  • Immediately alarming to notify operators
  • AI detection to reduce false alarms from other heat sources

Hikvision Temperature Screening Solution

Multiple product types and wide range of applications, designed for the detection of skin-surface temperatures so as to achieve rapid and safe preliminary screening in public areas with high efficiency in a multitude of scenarios.




Human Skin-Surface Temperature Measurement

Fast preliminary temperature screening without contact




Elevated Body Temperature Screening Thermal Cameras

  • Works with HikVision NVR for recording, displaying and warning on up to 2 monitors
  • Provide 0.5 °C accuracy with 2 levels of alarm temperature configuration
  • Offer temperature Detection Distance range: 2.5m-9m (8.2 ft-29.5ft)
  • Provide audible beeping warning; push notification and email to your cellphone or remote desktop

Temperature Screening with Fast Deployment

  • Thermographic Bullet/Turret Camera, Visualized bi-spectrum live view
  • Wireless Devices, Easy connection, cable free
  • Thermographic Handheld Camera
  • Metal Detector Doors
  • Real-time sound and light alarm

Temperature Screening with Access Control

  • Touch-Free, Access is Easier but Safer
  • Access control with temperature measurement
  • Wall-mounted to control the door

Group Temperature Screening

  • Thermographic Bullet Camera
  • Simultaneous temperature screening of multiple people

Temperature Screening on Patrol

  • Thermographic Handheld Camera
  • Anytime, anywhere, just one click
  • On-spot temperature screening without disturbing a person

Temperature Screening & Mask Detection

  • Thermographic camera and DeepinMind NVR
  • Special interface of DeepinMind NVR visually displays temperature and mask status

Please contact us today for details on how you can take advantage of our help!

Telephone systems Edmonton




5 Ways to Rethink Your Work-at-Home Situation

As countless people began working from home for the first time in their lives, time and again I have heard them express one especially common worry:

“How can I get any work done when I have so many distractions?”

The fact is there is no way to just poof away every distraction available. So to keep disruptions at bay, you need to start with how you approach them and the idea of work itself — in other words, the solution is to reassess how you think about productivity and where it can occur.

Read on to learn five points to consider if you are worried distractions are keeping you from being the best smart home worker you can be.

1. Appreciate the Absent Annoyances

Although there is plenty to distract you in your own digs, the upshot is that, at home, you are free from office disruptions.

Before you tell yourself your home situation is unmanageable, keep in mind that there was also plenty in the office to take you out of a work mindset: loud coworkers, noise from other rooms, someone running the copier for an hour.

But working from home, those distractions all disappear. Not only are you away from the environment where those issues popped up, but just by muting your inbox and setting your status to DND, presto! You have officially nixed your nagging workplace woes.

So anytime you find yourself lamenting the distractions at home, remember that you pulled through distractions at the office, too — only, now, you can turn those issues off.

2. Stick to Your Own Deadlines

Except, the initial problem was that home does have plenty of its own distractions. After all, you have probably got a TV, books, an overly affectionate pet or two — and no manager over your shoulder to keep you on task.

As self-explanatory as it may sound, the key to overcoming these obstacles is self-policing. To boil it down, this means staying aware of your deadlines and making certain you stick to them on your own.

One specific way to aid with this is to make use of task management software like Jira, Wrike or Asana, which all let you create tasks just for your own purposes.

Another way is to create short-term milestones for yourself. Set explicit goals on a smaller scale; instead of saying “I need the audits done by the end of the month,” say “I need four expense reports processed today.”

With this approach, you can track progress (and procrastination) on a smaller scale, making it easier to manage yourself.

3. Re-Evaluate Your Work Boundaries

But — what happens if you are not making progress? Suppose that siren call of Netflix cuts through your carefully crafted work schedule. What then?

Though this question is too complex to fully answer in this post alone, the solution in brief is to separate yourself from your home’s biggest distractions — both physically and mentally.

The physical side works on a case-by-case basis, like stowing your phone far from your workplace or shutting yourself away from roommates or family. The mental aspect, meanwhile, entails putting an internal boundary against distractions.

Again, it is important to embrace the mindset that, so long as a task sits in front of you, that must be your focus, not the diversions you naturally associate with home. Learn to notice when that craving for a distraction pops into your head, then to brush the thought aside.

Call it self-help, call it a kind of meditation — the point is, focus must come from internal conditions as well as external ones.

4. Make Distractions Your New Breaks

To approach this whole issue from another angle, though, it has worth pointing out that work-time distractions are not necessarily a problem.

As psychological studies have shown, giving your brain some off-time is good for your work in the long term. With a brief period to reset, you will be able to come back to your task refreshed and more capable of getting those to-dos done.

Consider that what you call “distractions” may be a way to reset your thinking — or potentially some comfortable background noise to make your work more manageable.

5. Know When to Quit

But perhaps most crucial for settling into a work-at-home routine is learning to recognize your accomplishments.

A negative habit the office instills in us is the need to act busy just to look it, even if we have done the most we can for that day. Whether due to workplace standards or social pressure, finishing early does not always create more time for you.

This mindset can easily bleed into remote working. Sometimes, despite how you have finished the day’s work and your mental energy is totally sapped, there is a nagging fear that you cannot leave your laptop behind due to some abstract sense of “professionalism.”

The thing is, at home, you can afford to measure your work by what you have completed, not by your total hours online.

When turning your attention away from distractions and toward work, think about “tasks” instead of time. Remember, completed projects are a helpful, concrete way of measuring your progress; focusing on time, on the other hand, is arbitrary at best and unhealthy at worst.

So, if you have already finished with what work you had that day, then great! Feel free to give into a distraction or two. In fact, if you have no other commitments, it is even fine to log off early.

Credit: Austen Read-McFarland, Wildix

Please contact us today for details on how you can take advantage of our help!

2 Way Radios Calgary


Amid the sudden surge in demand for smart working, one option that has caught on with literally millions of consumers is Zoom. With its rise to the spotlight, the freemium videoconferencing app has drawn a lot of attention — but not always for the best reasons.

The explanation for Zoom’s popularity is most likely that it does what it says on the label: it provides a fast, approachable means of connecting people over video (albeit without providing the degree of end-to-end encryption it promises).

In a perfect world, this would be all an end-user needs out of a web conferencing app. But the problem is, we are living in a world full of security and privacy threats.

This means using Zoom poses enormous problems for businesses and individuals alike. Because, at the end of the day, Zoom does very little to keep you safe from those threats. In fact, it even does a whole lot to make you more exposed to them.

Let us dive into all the ways Zoom gets security and privacy wrong — and what Wildix does instead.

Unsecured, Inside and Out

A well-known exploit in Zoom is the ability for strangers to enter videoconferences uninvited. In fact, the practice is so common it’s been given its own name: “Zoombombing,” a term which even the FBI has recognized after having to step in to warn about the attacks.

This issue has garnered attention because of the shocking disruptions Zoombombers cause: shouting obscenities or even screensharing sexually explicit material, they aim to disturb attendees as much as possible and make their harassment all anyone can focus on.

These intrusions were made possible largely through Zoom’s lax approach to conference security. The big issue is that Zoom’s conference URLs all use a simple nine- to eleven-digit numerical code, making it easy for malicious agents to enter a conference room through brute-force hacking — meaning that Zoom conferences can easily be disrupted even if their room invite is kept secret. Further complicating matters is that, until recently, Zoom’s preventive measures against such disruptions, such as password locks and waiting rooms, had been turned off by default.

All this suggests that Zoombombing is not the result of user error, but of poor design. Practically speaking, a program’s security is only as good as the average end-user can be expected to maintain it. Consequently, it is essential that communications software is secure automatically, without the need for endless user guides and video tutorials.

Yet what we see in Zoom is just the opposite; instead of the program ensuring users are safe on its own, the program makes it the user’s responsibility to understand the platform in perfect detail or else be subject to security breaches.

The poor design in Zoom is even more apparent in the app’s rather odd choice of using pre-installation tools in its Apple software. This code, security experts have revealed, allows Zoom to install itself on macOS without user permission — and, alarmingly, is usually seen in malware, not web conferencing tools.

This is a problem not because Zoom itself is malicious, but because it can become an unwitting accomplice for malware. Thanks to pre-installation exploits and the permissions you’ve given the app, Zoom can be leveraged by viruses as a way to record you without your knowledge.

Yes — with Zoom on a Macbook, it’s actually easier for malware to hijack your webcam and mic.

Meanwhile, with Wildix, these vulnerabilities are effectively non-existent.

First off, the issue of unwanted guests entering a conference is solved automatically thanks to a more complex alphanumeric URL. By including both random numbers and letters in conference URLs, the platform automatically makes it exponentially more difficult for intruders to enter (let alone disrupt) a conference.

As for malware, that problem is solved through browser-based design. By running through WebRTC, Wildix requires your explicit permission to use your mic and webcam from new web domains. But more importantly, the program is exceptionally difficult to hack in the first place thanks to the near-impenetrable design of WebRTC.

As far as security is concerned, Wildix operates efficiently and transparently from the word go.

Zoom, meanwhile, utilizes design that keeps users in the dark about its security operations.

A Not-So-Private Branch Exchange

Zoom’s secretive approach to its functionality has also extended to their privacy policy, which cybersecurity expert Doc Searls described as “creepily chummy” with ad tracking companies.

Per a complaint by Consumer Reports, Zoom’s long-standing privacy policy allowed the software to not only store the data it captures during a videoconference — which includes anything from your face to the objects in your call’s background — but to then sell your data to the marketing sector.

While, thankfully, this practice has ended with Zoom’s latest privacy policy, it is still concerning why such a policy was ever included, considering a competent web conferencing developer ought to be making money off their proprietary software, not by mining data.

Yet more concerning still is the way Zoom handles video recordings of conferences. As revealed by the Washington Post, when Zoom stores a recorded conference, the service defaults to saving the file to a public URL — so public, in fact, that Zoom’s recordings can be found through a simple Google search.

By default, Zoom quite literally puts conferences out for the entire internet, and thus the entire world, to see. While user settings and custom names can again add a layer of privacy to these recordings, it is nevertheless mind-boggling that such a lack of security is possible at all.

More worrying still, your Zoom account may not be safe even if you skip recording your conferences. Since January 2020 onward, databases containing Zoom account names and passwords have been circulated and sold on the dark web. As Zoom took on more and more users, that database has only grown larger and more valuable to hackers, meaning there is all the more reason for new accounts to be exposed.

With Wildix, these privacy issues are outright nonexistent. Wildix does not store any video communications for ad tracking purposes — in fact, since the app works directly from browser to browser, it’s impossible to intercept or save such data, even for Wildix technicians. Recorded conferences are also private by default, since they are given a complex, randomly generated URL that’s inaccessible from the outside web.

Again, privacy is the built-in, automatic default with Wildix. With Zoom, meanwhile, the responsibility for protecting privacy is once again relegated entirely to the end-user.

The Takeaways

To Zoom’s credit, the company has taken active notice of their system’s flaws. As of April 1, 2020 — not long after undergoing investigation by the New York Attorney General — they announced they would suspend feature updates for 90 days to focus on existing security issues.

This announcement came in an apology for Zoom’s security flaws issued by the company’s CEO, Eric Yuan, which also highlights why the product was released with such defects at all. In the post, Yuan states that the number of active users on the platform “far surpass[ed]” what the company expected to ever host, and that Zoom “was built primarily for enterprise customers – large institutions with full IT support.”

Yuan is certainly correct, though more through omission than admission. With all the security issues that have come to light, perhaps it’s appropriate to say Zoom should be used only in conjunction with an internal tech team — provided said team is large enough to devote much of their working hours to upkeep on the program.

Of course, the underlying implication of this point is equally correct: for small to midsize businesses, and even for individuals, Zoom is not a worthwhile, purpose-built solution.

This seems to be a conclusion shared by New York City public schools, who are now dropping the platform, and by self-described “public interest technologist” Bruce Schneier, who wrote about the software’s issues at length. Princeton computer science professor Arvind Narayanan, meanwhile, outright calls Zoom “malware.”

If there is anything to take away from these examples, it’s that security must be integrated into communications platforms. Since user error is guaranteed to happen, safety must always be active in the solution, not something that can be casually flipped on or off.

We have often talked about how being secure by design is an integral part of the Wildix solution. With Wildix, security is not simply a setting that you have to turn just right or else be exposed to threats — security works automatically as soon as you start using the platform. Here, there is no need to choose between convenience or security, because Wildix gives you both.

In fact, what we have seen is that nothing makes a solution inconvenient quite like a lack of security. As Zoom’s example shows, once you lose security, you lose usability.

After all, no solution is less usable than one that puts you and your organization at risk.

Credit: Austen Read-McFarland, Wildix

Please contact us today for details on how you can take advantage of our help!

Telephone systems Edmonton


There is a lot of noise and confusion about hosted phone systems, work at home options and collaboration options in the current pandemic environment.

Nutec has been providing hosted and OPEX solutions for our customers that deliver on these options and opportunities.

Nutec Hosted Voice, powered by Wildix.

Now with Nutec hosted voice and collaboration, powered by Wildix, we are continuing to bring a personalized approach to cloud voice solutions.

The Custom Solution YOU Need

Nutec provides a customized hosted voice solution on a private cloud solution at public cloud pricing. Therefore, your business gets what you want and need. You do not have to settle for what the cloud crowd is pushing.

Local Support and No-Surprise Billing

We provide you with the advantages of the cloud along with local support, training and on-site support. Nutec hosted voice gives your business consistent monthly (OPEX) pricing eliminating big-ticket sales cycles and unexpected capital expenses.

The fastest way to work from anywhere

Nutec Smart Working solutions provide you with the advantages of Work at Work, Work at Home and Work Anywhere. If you have internet, you can have a great phone experience.

Wildix by Nutec provides your business with the best Browser-Based Unified Communication and Collaboration Solutions. Custom designed and flexible and ready for your staff today.


Submitted by Trevor Naish


The value of things we take for granted is only discovered when we lose them. 

Among these things, health perhaps comes first.

That is why it is in times of coronavirus emergencies that we discover the importance of paying attention to our bodies and to others.

“I’m fine? I’m sick? Maybe it’s the case that I won’t go to work today if I’m not feeling well, to protect my colleagues. ”

Not being able to go to the office has opened our eyes to the need to have working methods disconnected from physical places, in two words, Smart Working.

Office productivity can’t stop if people can’t access their desks for some reason. It is now anachronistic to link the business to the four walls of the workplace.

This emergency is paradoxically instructive for the business world, from large to small and medium-sized companies: workers must continue to produce, even if the roads to the office are closed due to weather adversities.

Smart work is not a new thing but there are still very few companies that put it into practice. However, hundreds of studies have shown that individual employee productivity increases by 20% when they have the opportunity to work from home. Not to mention the significant drop in sick leave, facilities in the management of parental leave and maternity leave; smart work as a more effective non-economic incentive to conquer and retain talent.

The technology offers all the tools to share chats, phone calls, documents and video conferences in a 100% secure way, thanks to intuitive solutions and inexperienced digital interfaces.

So work smarter and stay healthy!

Please contact us today for details on how you can take advantage of our help!

Telephone systems Edmonton

Identity and access management (IAM) refers to the policies and tools used by IT departments to ensure that people and entities have the appropriate level of access to the organization’s technical resources. IAM systems are technology solutions to securely manage digital identities and their access to various applications and systems.

IAM systems provide administrators with the tools and technologies to change a user’s role, track user activities, create reports on those activities, and enforce policies on an ongoing basis. These systems are designed to provide a means of administering user access across an entire enterprise and to ensure compliance with corporate policies and government regulations.

Identity and management technologies include (but aren’t limited to) password-management tools, provisioning software, security-policy enforcement applications, reporting and monitoring apps and identity repositories. Identity management systems are available for on-premises systems, such as Microsoft SharePoint, as well as for cloud-based systems, such as Microsoft Office 365.

IAM systems can be cloud-based (often called IDaaS) or on-prem. The first IAM systems were on-prem, i.e. physically located within the organization’s firewall and managed by the organization. Today, more and more organizations are moving to cloud IAM systems, with McKinsey reporting that only 38 percent of the enterprises they interviewed expect to be on-prem in three years.  In three years, 60 percent will rely on a third-party IAM service that supports multiple public-cloud environments and unifies access across on-prem and public-cloud resources.

The move to cloud IAM is being driven by cost savings and reliability. Using a third-party cloud IAM means savings in infrastructure and maintenance. It also reduces the risk of downtime as cloud vendors provide distributed and redundant systems with high up-time and short SLAs.

In today’s complex compute environments, along with heightened security threats, a strong user name and password doesn’t cut it anymore. Today, identity management systems often incorporate elements of biometrics, machine learning and artificial intelligence, and risk-based authentication.

At the user level, recent user authentication methods are helping to better protect identities. For example, the popularity of Touch ID-enabled iPhones has familiarized many people with using their fingerprints as an authentication method. Newer Windows 10 computers offer fingerprint sensors or iris scanning for biometric user authentication. The next iPhone, due out later this year, is rumored to include iris scanning or facial recognition to authenticate users instead of fingerprint scanning.

IAM is a central practice to protecting sensitive business data and systems. Implemented well, IAM provides confidence that only authorized, authenticated users are able to interact with the systems and data they need to effectively perform their job roles.

While any IAM implementation will start with an audit of an organization’s needs (defining roles, access requirements, etc.) and creation of a policy, there are many different IAM tools and solutions that can help you execute on an IAM program. Any tools you select should meet the use cases for your environment.

Also consider prioritizing those tools that can provide highly automated workflows to simplify IAM administration, and identity management tools that integrate well with other systems and security technologies (such as PAM). The more seamless the tool fits within your own environment and with other security tools, the more likely you are to close security gaps and improve business operations.

For more information on Identity and Access Management please contact us today:

Telephone systems Edmonton


Contributed by Erick Preza