Blog

Blog

VoIP 101: Understanding the Basics

By: Gregory Sandifer on Dec 5, 2018 8:28:51 AM

Voice-over-Internet Protocol (VoIP) is a communication technology that allows voice calls to be digitized and transmitted over Internet Protocol (IP) networks, such as internet, rather than through regular telephone circuits.

Read More

Topics: voip, communication

Supply Chain Attacks Exploit Relationships With Third-Party Vendors

By: Nick VanGilder on Nov 27, 2018 10:34:14 AM

It's undeniable that cloud computing and outsourcing have resulted in better margins and higher profits for businesses over the past 10 years. However, data breaches have continued to plague companies around the globe with no end in immediate sight. This begs the obvious question: Could there be some relation between the two?

Read More

Topics: cybersecurity, Cloud

Expert Ethical Hackers Lead the C Spire Cybersecurity Consulting Group

By: Christina Southern on Nov 13, 2018 8:02:00 AM

Meet our Cybersecurity Consulting Group! This team partners with organizations to help identify, quantify, and eliminate business risk as it relates to security.

Read More

Topics: Security, C Spire News, Healthcare

Facebook's Hack Reached 1% of Users. Not Everyone Can Say the Same.

By: Robbie Morris on Oct 23, 2018 6:17:03 AM

Social media giant Facebook recently announced 30 million users' personal information was compromised.

That’s terrible, right? Well, factor this: Facebook has 2.2 billion active user accounts, and the initial reports indicated the hack only impacted 90 million.

Read More

Topics: cybersecurity

Password Cracking – Here’s How the Pros Do It

By: Nick VanGilder on Oct 23, 2018 6:15:00 AM

Most companies freely acknowledge that a data breach event would cause significant impact to their business. If a company processes, stores and accesses sensitive customer information (i.e. medical records, credit cards, social security numbers, etc.), it would also acknowledge that it already knows what types of data the criminals mostly like want to steal … or hold hostage.

Read More

Topics: cybersecurity, passwords

8 Tips to Stop Password Hackers

By: Christina Southern on Oct 23, 2018 4:35:00 AM

Passwords do not receive the respect they deserve as a first line of defense against threats. Roughly 60 percent of confirmed data breaches involve weak, stolen, or default passwords. Most businesses provide little to no training for employees around selecting secure passwords, so it's no surprise that "123456", "password", "qwerty", and "Star Wars" are commonly used.

Read More

Topics: cybersecurity, hacking


CONSIDER IT MANAGED. C Spire Business is the nation’s first full-stack managed solutions provider, capable of offering advanced connectivity, cloud, software, hardware, communications, professional services, cybersecurity, business continuity, and technology support in a single, seamless IT solution portfolio. The result is smarter. Faster. More secure. From desktop to data center, we meet you wherever you are and take on your biggest technology challenges.

Download the free VoIP guide
Debunking VoIP myths blog post
New call-to-action

Subscribe Here!

Recent Posts