Archive for the ‘Software’ Category

How to Improve Your Small Business Cybersecurity

Wednesday, August 8th, 2018


A whopping 87% of small business owners do not think that their small business is at risk of having a cybersecurity breach. However, half of small businesses will experience a cyber-attack. Small businesses are appealing to hackers, who know that security measures will be looser and more data can be gleaned. Protecting your business and customer data is more critical than ever, so now is the time to invest in adequate cybersecurity measures.

Train Your Employees

Your employees are your front line defense against cybersecurity issues. When creating a network safety plan for your business with help from the experts at Teltek, you should also include policies and best practices that your employees will follow. Procedures for securing customer, employee and vendor information safe should all be clear and easy to understand. You should also outline what should be done in the event of a breach. Employees should also know the importance of strong passwords and be utilizing two-factor authentication. A little extra time can mean the difference between a breach and staying secure.

Update Computers Regularly

If you have managed IT services, Teltek can take care of performing regular updates. However, you should still regularly check to see if there are software or security updates available for all desktops, mobile devices, tablets and laptops at your business. Browsers should also be kept up to date. Any software on your computer will need to be updated, but cloud software should be regularly updated anyways.

Secure Your WiFi

WiFi is one of the most significant vulnerabilities that most small businesses have. If you do not secure your WiFi, people outside of your business or even next door could access your company and customer data. When your WiFi is set up, make sure that it is secure and that employees do not know the password. If you do want to offer your customers free WiFi, you should set up a completely separate network with different permissions.

Cybersecurity Solutions from Teltek

Teltek is a leader in IT and cybersecurity solutions for businesses of every size. Thanks to our Total Care Assurance Guarantee, we have a loyal and thriving customer base. Our proprietary approach to meeting any business’s IT needs for a single fixed price is part of what makes Teltek different. If you are ready to learn more about Teltek and our Total Care Assurance solutions, contact us today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

Are Your Remote Employees a Security Risk?

Wednesday, March 21st, 2018


Today’s workers are used to more flexibility than ever before, as many companies allow workers to be remote employees. There are many benefits to allowing workers to work from the comfort of home, including lower overhead costs and increased productivity. However, there are several downsides as well. One of the biggest risks of using remote employees is security. Here are some of the best ways to ensure that your remote workers don’t become a security risk.

Make a Plan

A data breach or sensitive data exposure can do permanent damage to your company’s reputation and bottom line. Even though that is the reality of the situation, many small and medium-sized businesses do not have any cybersecurity protocols. Work with your managed services provider, like Teltek, to develop a plan for security in the office and the home office. Employees should know the proper procedures for password creation, storing data, deleting data and alerting the proper people when they think that something went wrong. If you do not proactively tell employees what to do, they may make a mistake and keep it to themselves, leading to a huge vulnerability.

Keep Devices Separate

If you do have remote employees, you should encourage or require them to use company-issued computers, phones and tech devices for all work-related activities. It is much simpler to keep things secure when you own the equipment, and much more difficult to regulate activities on employee-owned tech. If your employees do use personal devices, make sure that they understand the importance of never transmitting sensitive information or discussing secret information over the phone. Data can be stolen and compromised easy on unsecured devices.

Require VPN Usage

Virtual Private Networks (VPNs) are designed to create a separate, secure internet connection. VPNs work by encrypting data and then hiding the IP address of the end user. Your remote employees could then work with sensitive or secret information and securely transmit it over the connection between the computer and your business. VPNs are a relatively inexpensive way to keep a business network secure without needing to invest in all new computers, tablets and mobile phones.

Protect Your Business from Remote Employee Security Risks

If you are curious about the best ways to keep your employee devices secure or how to set up VPNs for your employees, contact Teltek today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

The Most Common VoIP Security Threats

Wednesday, March 14th, 2018


Business owners are finally starting to understand the importance of investing in computer, network and VoIP security, but many are still hesitant to invest in measures to protect all three until something bad happens. A 2017 study found that the average cyber-attack on small businesses with fewer than 99 employees cost a whopping $36,000. With costs that high, you can’t afford to not invest in protecting your network and your VoIP system.

The Most Common VoIP Security Threats

  • SPIT (Spam Over Internet Telephony) is similar to spam emails that can be sent through compromised email accounts. Unlike spam emails, which are easy to identify and delete, SPIT calls are often time-wasters since they are hard to identify until the phone has been answered. Installing a robocall blocker can help, but SPIT calls often still slip through as a result of number spoofing. SPIT is growing rapidly, and now VoIP spam constitutes over 10% of all online spam.
  • Unencrypted traffic is a significant VoIP security threat since it allows for eavesdropping on your conversation. While traditional telephone lines are also unencrypted, VoIP phones are particularly at risk because they are directly connected to the internet. Many businesses with VoIP systems set up virtual private networks (VPNs) using an IT services provider to protect all VoIP traffic.
  • Hacking is always a risk for any device connected to the internet, and VoIP devices are no different. While the ability to use your phone number and voicemail from anywhere in the world using your mobile device or computer is convenient, it does not come without heightened risk. Your business should regularly change VoIP security passwords and PIN numbers and limit who has access to that information.
  • Hardware that is outdated is another common VoIP security threat. If you are still using older models of VoIP hardware like IP phones or analog telephone adapters, you could be putting yourself at risk. Newer telephones come with additional security features to protect you and your customers.

Protect Yourself from VoIP Security Threats with Teltek

Teltek partners with numerous commercial businesses to protect VoIP hardware and software from hackers, spammers and anyone with malicious intent. Our IT consulting services begin with an assessment of the existing hardware that you have and include recommendations for new VoIP devices that are more secure and able to meet your needs. Whether you’re looking for a way to integrate VoIP lines with your current telephones or seeking to upgrade your outdated system, Teltek can help you! If you are curious about how why VoIP security is so important for your business, contact Teltek today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

Why Are Antivirus and Malware Protection So Important for Your 2018 Security?

Wednesday, January 10th, 2018


2017 was a notable year in the network security world thanks to numerous high-profile viruses and malware variants that compromised major healthcare systems and thousands of companies. 2018 is shaping up to be no different, with multiple ransomware and malware variants on the horizon.

Notable 2017 Ransomware

Over the course of 2017, the following types of ransomware and malware wreaked havoc on numerous networks throughout the country:

  • WannaCry
  • NotPetya
  • Cerber
  • Locky 

Are Any of These Viruses Coming Back?

Many industry leaders expect ransomware strains like WannaCry and NotPetya to be re-released in a slightly modified form to do more damage to networks throughout the country. Both of these types of ransomware were created using a stolen National Security Agency exploit called EternalBlue, which used a known vulnerability on computers running old versions of Windows to spread.

Predictions for 2018

Network security industry experts are predicting that ransomware and Ransomware as a Service (RaaS) will continue to spread. RaaS kits are available to any level of hacker, regardless of their technical knowledge and skill, which makes them a particularly dangerous possibility.

While computers and networks have been traditional targets for viruses, Android mobile devices are becoming increasingly at risk. WannaCry was found in multiple apps on Google Play. Google works its hardest to remove these apps, but the hackers are working just as hard to put out more apps and stay a step ahead. Security for your office’s mobile devices, like tablets and phones, is going to become more important in 2018. 

Teltek Offers Top-of-the-Line Antivirus, Spam and Spyware Protection

Unfortunately, many of the businesses targeted by ransomware and malware attacks do not have a security strategy or know what to do when the worst happens. By partnering with an experienced network security partner like Teltek, you can rest assured that your security will be proactive and not reactive. We work hard every day to protect your network from the latest viruses and other security threats.

Partner with Teltek for Antivirus and Malware Protection

If you are ready to learn more about Teltek’s network security services and see how they can protect your company, contact Teltek today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

Enhance Your Avaya Phone System

Wednesday, July 12th, 2017


Have you updated your phone system since you opened your business? Do you have the bare minimum of features needed to get your job done, or are you struggling under the weight of too many useless elements you don’t use? The Xima software suite is designed to change the way that you use your business phones and equip you with the data that you need when you need it.


Chronicall is the core of the Xima software suite. It offers a broad range of features including custom call reporting, call recording and real-time updates. The standard reports are designed to give you the basic information you need to effectively meet the needs of your business and your customers. The 40 types of standard reports include:

  • Hunt Group reports
  • Agent/extension reports
  • Caller ID reports
  • Inbound/Outbound Call reports
  • Call cost reports
  • Time interval reports
  • Trunk/Line-reports

Beyond the basics, all of the Chronicall reports include unlimited supervisor logins, report scheduling, user access controls and detailed charts. 

Custom Chronicall Reports

If you need specific information about your business and customers, the custom reports module allows you unlimited custom reports. The report type could include any of the following:

  • Agent
  • Account code
  • Call direction
  • Call report
  • Caller ID
  • Event type
  • Feature type
  • Group
  • Local number
  • System report
  • Time interval
  • Trunk

Once you choose the designation for your report, you can select from filters and values to get exactly what you need. Confused by all of the options available to you? Teltek and Xima Care are both available to help with tutorials and troubleshooting.

Xima’s VRTX Call Recording System

If you rely on accurate call recording, Xima’s VRTX (Voice Recording Technology) is the perfect solution. The VRTX system can be used by connecting the in-line hardware and your phone system and plugging it into your Chronicall server. This call recording technology will record everything and add it to the Chronicall recording library. Once they are added to the library, they will be easily accessible 24/7.

Change the Way You Use Your Avaya Phone system with Xima’s Software Suite

If you’re ready to see how you can save money with Teltek and our managed IT services, contact us today for a free consultation at 1-866-9-TELTEK or 410-552-6580.

TechSoup Can Transform Your Non-profit

Wednesday, May 10th, 2017


Just like non-profits rely on the community to fund their programs, the community relies on non-profits to take care of its most vulnerable community members. TechSoup is an innovative website providing steep technology discounts and product donations for various non-profits throughout the globe. What can TechSoup do for your non-profit?

TechSoup’s Amazing Impact

Since its inception, TechSoup has provided hardware and software to over 300,000 non-profits throughout the world including libraries and schools. As a non-profit, TechSoup receives hardware and software donations and discounts that are passed along to worthy recipients. TechSoup works with countless high-profile companies to distribute donations, including:

  • Adobe
  • Cisco
  • Dell
  • DonorPerfect
  • GoDaddy
  • GrantStation
  • Intuit
  • Microsoft
  • Quickbooks
  • Skype 


Running a non-profit takes a huge amount of work behind the scenes. Without the proper software to organize and maximize productivity, executive directors can turn into administrative assistants. TechSoup boasts an impressive catalog of heavily discounted software including the Microsoft Office Suite, anti-virus software, Adobe Creative Cloud and QuickBooks.


Are you more concerned about getting a computer to put software on than the software itself? TechSoup has a robust catalog of refurbished and new computers, laptops, monitors, networking hardware, headsets and mobile hotspots. TechSoup also has staff available on call to help non-profits determine their hardware and software needs.

TechSoup & Teltek

In addition to TechSoup’s expansive catalog of offerings, Teltek provides IT services, maintenance and tech support for non-profits. If your organization is struggling to stay connected with clients and donors, we can help determine your needs, procure the right equipment, set up your office, train your staff on how to use new devices and check back in to make sure everything is working properly. If you’re ready to see how you can save money through TechSoup and through Teltek, contact us today for a free consultation at 1-866-9-TELTEK or 410-552-6580.