(888) 208-0020 [email protected]

We repair most phones systems and offer great trade-ins

We can repair most premise-based systems such as:  Avaya Office, NEC, Toshiba, Shoretel, Allworx, Mitel., and more.

Nortel Systems – BCM, Norstar, Meridian, Succession
Avaya Systems – IP Office, Partner, Magix, Definity, Cisco
Cisco 15454 ONS – Panasonic KXT – Allworx

We are also:

  1. Take trade-ins and offer new VoIP Cloud Based Systems.
  2. Sell used and refurbished phones and systems
  3. Buy old phones and phone systems

Old Office Phone System Recycling. We are a green company. If your used phone systems or equipment are no longer of value, we will properly recycle your old office phones and equipment for you.

 

Electric bills too high?

Utility audits  that secure  refunds from utilities

 We work on contingency (and have for over 15 years).  We find savings of over 75% of our clients.  We don’t sell anything, we simply find savings and refunds. 888 208 0020

 

Recent cyber attacks

World Health Organization

Industry: Consumer Services/Non-Profit

What Occurred:

What are believed to be elite hackers leaked login credentials of staff at the World Health Organization (WHO) around March and April of this year. The data leak was believed to be part of a larger attempt to target groups trying to combat the coronavirus – nearly 25,000 private email addresses and passwords were unlawfully released from organizations including the WHO, the National Institutes of Health (NIH), the Center for Disease Control and Prevention (CDC), the Gates Foundation and more. The WHO confirmed a phishing campaign had been deployed directed at its staff. WHO’s Chief Information Officer, Bernardo Mariano stated, “Ensuring the security of health information for Member States and the privacy of users interacting with us a priority for WHO at all times, but also particularly during the COVID-19 pandemic. We are grateful for the alerts we receive from Member States and the private sector. We are all in this fight together.” It is still unclear if the attack had any major effect. According to WHO, the leaked information did impacted an older extranet system, causing them to move to a more secure infrastructure.

Twitter

Industry: Technology

What Occurred:

Twitter saw one of the most brazen online attacks to date when on July 15, 2020, hackers verified Twitter accounts of many high-profile figures and celebrities, everyone from Kim Kardashian and Kanye West to Barack Obama, Elon Musk, and Bill Gates. The successful attack targeted a small number of employees though a phone spear phishing campaign, granting hackers access to Twitter’s internal support system which then enabled them to target additional employees. According Twitter, using the acquired credentials, 130 Twitter accounts were targeted, with the hackers Tweeting from 45, accessing the direct messaging inbox of 36 and downloading the Twitter Data of 7. Twitter Support released a statement saying, “This attack relied on a significant and concerted attempt to mislead certain employees and exploit human vulnerabilities to gain access to our internal systems.” The true outcome of this enormous hack has yet to be seen, but the incident has led to major distrust with Twitter and its security measures, and will most likely live on as one of the worst cybersecurity disaster to a social media platform.

Zoom

Industry: Telecommunications

What Occurred:

The pandemic caused organizations across the global to enact work from home policies and the popularity of video conferencing solutions skyrocketed. Zoom quickly became the big name, the go-to for virtual meeting – and the most popular for cybercriminals. The application has been relentlessly targeted by various cyberattacks and in April 2020 did in fact experience a data breach. More than 500,000 Zoom passwords were stolen and available for sale or even being given away for free across dark web forums. This impacted everything from personal accounts to financial and educational organizations. Victims’ login credentials, personal meeting URLs and HostKeys were released. Because many people tend to reuse passwords, it is believed that attackers were able to used old stolen credentials, some from 2013, and employed a credential stuffing attack that used multiple bots to avoid the same IP address being used for multiple Zoom accounts and to prevent being detected as a denial of service (DoS) attack. Following the half a million user credentials being compromised, Zoom responded, saying, “We have already hired multiple intelligence firms to find these password dumps and the tools used to create them, as well as a firm that has shut down thousands of websites attempting to trick users into downloading malware or giving up their credentials. We continue to investigate, are locking accounts we have found to be compromised, asking users to change their passwords to something more secure, and are looking at implementing additional technology solutions to bolster our efforts.”

Magellan Health

Industry: Healthcare

What Occurred:

Healthcare giant Magellan Health suffered a ransomware attack and data breach in April 2020 that left 365,000 patients impacted across eight Magellan Health affiliates and healthcare providers. The sophisticated attack began with hackers first exfiltrated data by installing malware before launching a ransomware attack five days later. Using a social engineering phishing scheme impersonating a client, hackers were able to get into Magellan’s system, installing malware to steal employee login credentials. The attack, contained to a single corporate server, granted the cyber criminals access to personal employee information and ID numbers as well as sensitive patient details such as W-2 information, Social Security numbers, or Taxpayer ID numbers. The data breach is one of the biggest we’ve seen this year within healthcare, and the second notable phishing scheme to hit Magellan, following an incident in 2019. There is currently a class-action lawsuit pending against Magellan, filed by three former employees over the most recent attack.

Marriott International

Industry: Hospitality

What Occurred:

A major security breach earlier this year with leading hotel chain, Marriott, led to the data of more than 5.2 million guests being compromised. According to the Marriott, hackers might have obtained login credentials of two employees either by credential stuffing or phishing, and then were able to acquire access to information for customers in the company’s loyalty application. Although Marriott disclosed the security breach on March 31, 2020, it was believed that the data had been obtained approximately a month before and involved personal information including names, birthdates, and telephone numbers, travel information, and loyalty program information. This was not the first time that the hotel giant announced a major data breach – in late 2018, they suffered an enormous attack leaving 500 million guests impacted.

MGM Resorts

Industry: Hospitality

What Occurred:

Although it began in 2019, the data breach suffered by major hospitality group, MGM Resorts, continues in 2020. And it may be much bigger than initially reported – now believed to have impacted more than 142 million hotel guests (14 times the 10.6 million reported in February). This has come to light through an ad published on the dark web marketplace offering to sell the data of 142,479,937 MGM guests for just over $2,900. According to the seller, MGM Grand Hotels data was also compromised. Hijacked information is believed to include name, home address, phone numbers, email addresses, and birth date of guests, including those of Justin Bieber, Twitter CEO Jack Dorsey, and major government officials. A MGM Resort spokesperson confirmed that impacted guests were notified about the data breach and added “We are confident that no financial, payment card or password data was involved in this matter.” Although this is considered “phone book” information, a fear is that the personal data being sold opens up opportunities for spear phishing campaigns.

What Can We Learn from These Cyber Attacks?
Businesses need to be diligent. Cyber security always needs to be front of mind and system and setups need to be routinely assessed. Any organization can become the victim of phishing schemes, ransomware, DDoS, malware, and other attacks leading to data breaches. Stress to your customers that taking all necessary precautions is the best chance they have at staying secure. Along with detection and response tools, authentication protocols and ongoing employee security awareness training can make the biggest difference.

 

Reduce your phone bill by 30% or more

877 208 0021          text or call 941.900.6220

How do cloud phone systems compare?

A cloud communications and collaboration solution  not only gives you everything you need to simplify and empower your business, it also completely alters the cost structure of both hard and soft costs. Let us look at some of the hard cost savings.

One all-inclusive cloud communications and collaboration solution-All you need in a phone system, plus text, audio and video conferencing, meetings, and team messaging and collaboration. This eliminates the need for additional services from third-party vendors, immediately removing a layer of surplus expense and complexity.

Lower multi-site management costs-Anyone can add phones and numbers, make changes, and handle moves from an intuitive web interface.

Reduced IT maintenance and infrastructure-All handled in the cloud by the service provider, eliminating operational expenses and IT distraction.

Elimination of many telephony costs-This includes removal of several line items such as switches as all voice and UC traffic travel over the internet.

Lower IT service provider costs for ongoing updates- RingCentral handles updates and provides continuous improvements and innovations.

Increased worker productivity- New capabilities, such as direct-extension dialing and the ability to forward calls and faxes to mobile phones make workers more effective;  also handles integrations with leading CRM systems like Salesforce® and Microsoft® productivity tools or suites.

Reduced up-front cost-Phones can be rented, making it a lot easier to upgrade to the latest models without a large initial layout.

Decreased cost of supporting a mobile workforce-The unique  app enables you to turn a smartphone into an office phone, saves carrier costs, especially for conference calling, video meetings, and those associated with international travel.

The cost-saving benefits, along with the simplicity, flexibility, and manageability of unified cloud communications explains the rapid adoption of these solutions by businesses of all sizes.

  • Cloud solutions allow you to move all your business communications to the cloud and benefit from the same cost and operational expense reductions you can experience when you move other critical business applications.
  • Office provides an all-inclusive cloud communications and collaboration solution that can be customized to suit your business needs and budget.
  • Not only can you rest assured that your overhead will be reduced considerably, you will have the peace of mind that your employees have everything they need to do business effectively, today, and long into the future.

 

great webinar on TEAMS and Cisco and a funny cartoon

Session 1:
Wednesday, April 1st at 4:00 – 4:45 PM EDT
Enable Work from Home Strategies from Evolve IP

Session 2:
Friday, April 3rd at 1:00 – 1:45 PM EDT
Enable Work from Home Strategies from Evolve IP

Applied Consulting Group and Common Sense Technologies have asked Evolve IP, a Cloud Strategy company, to present a webinar highlighting Work from Home solutions for end users such as yourselves. Some of the questions they will address are:

1. How can I keep my people safe and secure while ensuring that they are still engaged and able to collaborate with others?

2. How do I get the most out of my investment in Microsoft Office 365 and TEAMS?

3. How can I securely access the tools and applications I need to do my job from any place, any device, and at any time?

4. How can I use video to connect with my co-workers and customers alike when I can’t meet with them face-to-face?

5. How can I enable my employees to talk on the phone without making them use their mobile phone?

We have two sessions available (both presenting the same material) and hope you’ll be able to attend one with the link below or you can email [email protected] and she will set you up.

https://evolveip.webex.com/evolveip/onstage/g.php?MTID=ee76945223d1683666c4894c545630176