Our Blogs

The 988 system can provide our military service members with the resources to prevent a crisis from becoming a tragedy.  Sergeant John …

Women’s History Month is the perfect time to spotlight the often-unsung heroines who have shaped our modern telecommunications landscape. As is nearly …

Navigating the Wireless Waves: Wi-Fi 6E vs. Wi-Fi 7 

Understanding the differences between Wi-Fi standards can help you make the right decision.  –Lee Curling  Get ready for the incoming wave of …

NG9-1-1 represents a revolution in emergency-communication systems and services.  –Michael Fowler  A few years ago, a harrowing situation unfolded when a witness …

Safeguarding Business Continuity 

The Crucial Role of Redundant Connections  – Michael Fowler  Last month, more than 10 million Australians—nearly half the population—were left without mobile …

SD-WAN is Simplifying Network Management and Saving Companies a Fortune  Walmart, Inc., is the world’s largest company and the world’s largest private …

Next-Generation 911 (NG911) represents a monumental leap forward in emergency communication capabilities.  -Michael Fowler Austin resident Sarah Lewis recently found herself in …

  VoIP offers the healthcare industry multiple communication options, greater information security, and enhanced care delivery for patients all while keeping your …

Guarding the Digital Fortress From Within 

The Crucial Role of Tackling Insider Threats to Your Cybersecurity -Michael Fowler In today’s interconnected digital reality, the battle to secure sensitive …

Safeguarding School System Networks 

The Crucial Role WiFi 6 Can Play in Defending Schools from Cyberattack  —Michael Fowler  The digital age is having a profound effect …

How Vulnerable Are You to Cyberattack?

Threat and Risk Assessment is the First Step in Safeguarding Your Network —Michael Fowler Sophisticated networks of greedy, malicious cybercriminals are proliferating …

The Security Menace of SIM Swapping

The Federal Bureau of Investigation (FBI) has warned about a significant upsurge in smartphone SIM swapping. SIM swapping, or SIM hijacking, is …

Most people spend a lot more time looking at their phones than at their desktop screens. Cyber-criminals know this, and they’re increasingly …

Why Email Phishing Is So Dangerous

Email Phishing Is So Dangerous Because It Targets the Mind Instead of The Machine  During the past several months, the world has …

The Internet of Things began humbly enough when a scientist connected a toaster to the internet back in 1990. The term was …

How Do You Deal with Holiday-Season Cyber Attacks?

Cyber criminals never take a day off. And during the holiday season, employees can be distracted, letting their guard down and forgetting …

Should My Business Use the 3CX Phone System?

Remote work has completely shifted the landscape for business communication, both internally and externally. We’ve been introduced to different communication platforms which …

What is Phishing?

Over the past decade, cyber-attacks have become much more prominent and vicious than ever before. Phishing isn’t the only type of cyber-attack, …

How VoIP Saves You Money

Business VoIP systems have become increasingly popular over the past decade due to the advances in the technological industry and the rising …

How to Prepare Your Business for a Cyber-Attack

In this day and age, it’s extremely common to hear about businesses experiencing a cyber-attack and individuals falling victim to a security …

Is My Business Safe From a Cyber Attack?

Cyber-attacks can infiltrate your business and cause losses that you might not be able to recover from. To ensure this never happens …

Why Choose Netmaker Communications?

It’s no secret that the telecommunications, information technology, and cyber security industries have grown immensely over the past two decades alone. That …

5 Reasons We LOVE VoIP

We LOVE VoIP and are confident that you will too once you learn more about it!  First things first, what is VoIP? …

It’s no secret that the technology industry has gone through drastic advancements over the past few decades. While technology has the capability …

It’s a new year, which means a new array of personal and professional resolutions. In the age of technology, it’s a must …

Putting The Cart Before The Horse

Winchester, VA – September 9, 2019: This last week the Department of Defense (DoD) awarded a multi-billion-dollar award to General Dynamics Information …

STIR SHAKEN HERE TO STAY

Winchester, VA: March 16, 2019 — According to YouMail Robocall Index, nearly 48 Billion Robocalls Made in 2018. This annoyance to both …

Feburary 11, 2018 – Winchester, VA. Having wrapped up a week in San Diego, CA attending AFCEA West, I had the opportunity …

Convergence in Name Only

Winchester, VA – October 7, 2018 : The Information Technology industry has been marketing the concept of convergence for over ten years …

VoIP and 911

One of the issues being wrestled with by the FCC is how to govern 911 requirements in a Voice over IP (VoIP) …

DOD UC Summit 2017

On January 11th, we had the pleasure of holding a DOD UC Summit meeting at Shenadoah University for a full day of …

Department of Defense UC 2.0

In response to the large number of requests received to publish a follow-up on my last post, I am posting this in …

TDM Telephony vs. VoIP

As many vendors of legacy TDM telephony technology end their support for classic End Office and PBX solutions, customers are faced with …

Security Considerations for UC

When engineering a Unified Communications solution for any enterprise, the issue of security has to be baked in from the beginning. Many …

It amazes me how DOD leadership continues to ignore the growing crisis stemming from aging telephony technology and infrastructure. No, it’s not …