A Deep Dive into Wildix’s Security Policy: How We Keep Your Data Safe

A Deep Dive into Wildix’s Security Policy: A guy explaining the Security Policy to the people sitting in the room, which is located under the water
There are few things more important to a communications system than how well it’s protected. With cyber attacks continuing to escalate and businesses constantly increasing their points of contact with the internet, the chances of being hacked are only increasing. Worse, the fallout of a hack is only growing more severe, with the average data breach now costing SMBs $4.35 million USD per attack.

Continue reading “A Deep Dive into Wildix’s Security Policy: How We Keep Your Data Safe”

Spring Cleaning Your Data: Let’s Get Your Office Organized


Spring is in the air. Flowers are blooming. The days are a little bit longer and brighter. And for some of us, that means we have the yearly impulse to deep clean our homes and offices.

But just like our closets and attics benefit from a good sort-out, so can our digital storage. Far from a simple nice-to-do, cleaning your data can help keep you compliant, safe and organized — especially if you take the time to set up a system that works all year round.

Continue reading “Spring Cleaning Your Data: Let’s Get Your Office Organized”

Stopping Spoofed Calls With STIR/SHAKEN

Stopping Spoofed Calls With STIR/SHAKEN

Outside of paper cuts or mosquitoes, few subjects have earned as much universal scorn as robocalls — especially ones with fake caller IDs. These days, it’s often enough of an interruption simply to get a phone call. But to pick up a local or official number, only to hear yet another monotone text-to-speech scammer? That’s enough to peeve most anyone.

Continue reading “Stopping Spoofed Calls With STIR/SHAKEN”