Wilson Technology Group and More

Your One Stop IT and Telecommunications Firm


Leave a comment

Network Security

Because wireless networks use radio waves that can pass through walls, your network’s signal could go beyond the boundaries of your home. If you don’t try to secure your network, people with computers nearby might be able to access the information stored on your network computers and use your Internet connection to get onto the web. By setting up a security key on your wireless network, you can help protect it from unauthorized access.

www.wilsontechgroup.com

Find us on Facebook and LinkedIn

Advertisements


Leave a comment

Disadvantages of the Old Centralized Standard Security Camera

Usually, cameras only supply the images while the processing and recording is done later on a central PC using expensive video management software.  This traditional centralized structure has many limitations, since it requires high network bandwith and the PC processing power is not enough for several cameras.   An HDTV MPEG4 film already puts considerable strain on a PC, so how can it be expected to process dozens of high-resolution live cameras?

Traditional central systems are less suitable and unprofitable when compared with high-resolution systems due to the high number of PC’s needed.  The higher the resolution, the more accurate the detail in the image.  With analog technology, a recorded image generally has no more than 0.1 megapixels.  Imagine what you can see with a camera that records with 3.1 megapixels?   You can see approximately 30 times more detail!  As a result, larger image areas with up to 360 degree all-around views are possible, thus reducing the number of cameras, and there the costs.  For example, four lanes of a gas station can be recorded with one camera instead of the four conventional cameras.

Unlike other systems, with a decentralized concept, a high-speed computer and if necessary, digital long-term memory  is built into the camera.   This provided several days of continuous recording time.  the PC and the video control center now serve only for viewing and controlling the cameras (not for analysis or recording).  This makes it unnecessary to purchase expensive video management software, as the most important and computer-intensive functions can already be integrated into the cameras.

Find Wilson Technology Group on:  Facebook; LinkedIn; and Twitter

www.wilsontechgroup.com


Leave a comment

Questions to Ask When Buying a Security Camera for Your Business

The following are some of the questions to ask yourself when considering a security camera for your business:

  • What needs to be monitored?
  • Why is monitoring necessary?
  • When is monitoring necessary?
  • How should monitoring take place?
  • Who should be responsible for monitoring?
  • What are the local conditions?
  • What infrastructure already exists?
  • What requires special attention?

Find Wilson Technology Group on:  Facebook; LinkedIn; and Twitter

www.wilsontechgroup.com


Leave a comment

HIPAA Fine for Lack of Firewall Assessment

Idaho State University ((ISU) has agreed to pay $400,000 to HHS for violations of the HIPAA Security Rule.  The settlement involves the breach of unsecured EPHI of 17,500 individuals who were patients at an ISU clinic.  OCR opened its investigation after ISU notified HHS that the EPHI of approximately 17,500 individuals was accessible at its Pocatello Family Medicine Clinic because an ISU server firewall was disabled.  OCR investigators found that ISU did not apply proper security measures and policies to address risks to EPHI and did not have in place procedures for routine review of information system activity which could have detected the breach in the firewall much sooner.  Overall, ISU failed to ensure the uniform implementation of required Security Rule Protections at each of its covered clinics.

A key requirement of the compliance regulations, such as HIPAA, HITECH, or PCI DSS, is that organizations must conduct a comprehensive and thorough assessment of the potential risks and vulnerabilities of the confidentiality, integrity, and availability of all sensitive information such as Personally Identifiable Information.

Learn more by going to:  www.wilsontechgroup.com

Find us on:  Facebook; LinkedIn


Leave a comment

The Telephony Market Landscape

The telephony market has shifted to the point where most PBX  vendors offer Internet Protocol PBX (IP PBX)  allowing businesses the ability to move beyond the core functionality of yesterday’s basic desk phone.  As a result, VoIP continues to gain market share and many businesses are making the switch from Plain Old Telephone Service (POTS).  Hosted VoIP is becoming popular because it is low-cost (short term) and low-maintenance.   There are negatives, however.  Cost can be quite high in the long run, to name just one.

More than just a cheaper replacement for legacy voice systems, VoIP moves voice out of its traditional IT silo in the enterprise environment.  And with that move comes the opportunity for businesses to grow and expand in ways that traditional voice solutions never allowed.  Hidden benefits of VoIP include the ability to provide rich media services and with proper IP connectivity, VoIP offers number mobility with a phone device capable of using the same number virtually anywhere.  And perhaps the most potent arrow in VoIP’s quiver is its ability to enable Unified Communications which in turn will feed the growing popularity of the virtual workplaces.

Find Wilson Technology Group on:  Facebook; LinkedIn; and Twitter.

www.wilsontechgroup.com

Taken in part from:  Compare Business Products – What do Do with Your Legacy PBX  2012


Leave a comment

Answering the IP Telephony Call

As budgets for most businesses have been contracting in recent years, a growing number of enterprises have abandoned their legacy PBX systems and turned to IP technology to lower telecom costs and improve their bottom line.  Moving voice traffic to the data network allows business to cut – or eliminate entirely – the costs associated with the maintenance of a dedicated voice network, including staffing and equipment.

Businesses today have more choices than ever when it comes to telephone systems.  The world of telephony has come a long way from the days when choosing a phone system was relegated to the PBX/key system/Centrex toss of the dice.  Prior to the advent of IP (Internet Protocol) telephony, the choices were pretty simple:  Buy an expensive PBX, a less-expensive key system, or pay-as-you-go with Centrex.

Back in the dark ages of telephony (less than a decade ago), plain old telephone service (POTS) was the standard for both consumer and business telecommunications.  POTS is the analog, voice-grade telephone service that runs on public switched telephone network (PSTN), a global network of public, circuit-switched telephone networks.  Business users would invest in a private branch exchange (PBX) to serve its office, route ingoing and outgoing calls, and to reduce the cost of internal phone calls.  Available since the late 19th century, POTS remained largely unchanged for decades.

The telephony market began to change in the mid-2000’s with the advent of IP telephony.  VoIP (Voice over Internet Protocol) relies on existing broadband Internet access, as users make and receive telephone calls in much the same way as they did via PSTN.  The difference with IP telephony centers on the fact that calls travel on the Internet, rather than the PSTN.

Find Wilson Technology Group on:  Facebook; LinkedIn; and Twitter

www.wilsontechgroup.com

Taken in part from:  Compare Business Products:  What to Do with Your Legacy PBX 2012


Leave a comment

The Legacy PBX – When Is Integration a Poor Choice?

Integration is a poor choice for enterprises where:

  • Business growth has exceeded PBX limits
  • The business requires remote office integration
  • The business requires telephony features not supported by existing PBX

According to TechDay, the rising costs of keeping a legacy PBX reliable under increasing demand – not to mention a more competitive business environment – is simply not viable for most modern enterprises.

Find Wilson Technology Group on:  Facebook; LinkedIn and Twitter

www.wilsontechgroup.com