Phone System Services -Rolling-Meadows, IL 60008
Whether you need a legacy phone system maintained, or an
entirely new communications system for multiple offices, Andromeda Technology Solutions
is the answer you have been looking for. As our expertise also includes complete
data network solutions,
you can rest assured that we can fully integrate a communications system that will best leverage your existing or
future IT infrastructure.
In many cases, your telephone system is the first thing
people will experience when dealing with your business.
• Does it show your company in a good light?
• Is it set up so your clients have a good experience?
• Does it help maximize employee productivity?
Let us show you how a phone system should be set up!
Experience the simplicity of having an experienced company to handle all aspects of your communication systems, letting you focus on running your business.
Contact us or fill out the Request form on this page now to ask us to contact you!
lives to serve organizations like yours near Rolling Meadows, IL—at your level of need, your timetable, ...your budget!
Hybrid PBX and IP-based Phone Systems
We support a host of major phone systems—from Avaya, NEC, Panasonic to Toshiba— and are a certified Panasonic dealer for both a traditional PBX system,
as well as a true IP-based VoIP system. The beauty of these systems lies in
their very extensive feature set (over 800 features) and their mix-and-match
capabilities. Each system can mix analog, digital and IP phone sets to match
almost any application. Also, each system has extensive functionality
built-in for incorporating branch offices, work-at-home employees and other
We spend a great deal of time understanding all your requirements, so we can select the system and functions that are exactly what you need.
The Phones Become the Network
If you are considering an IP-based telephone system, it is important to
understand these systems are more data systems than phone systems. Unlike a
traditional PBX system, a VoIP system puts a significant burden on your data
network, and requires specific equipment and configuration to ensure
everything is running properly.
Many traditional telephone service companies lack the skills to properly
install and maintain a VoIP system. Andromeda Technology Solutions excels in
all aspects of voice and data, and will ensure you get the system that is
right for you.
Whether Cloud-based, Hosted/virtual PBX, or completely on-premises, we have the knowledge AND experience to guide you and implement your voice communication system to perfection.
Replacement of Legacy Phone Systems
We have many years of experience upgrading/replacing legacy phones systems from: ComDial, Nortel, Toshiba/Mitel,
and Samsung just to name a few. If you would like to experience service from a truly
customer-focused organization, call us when you are ready to replace and upgrade your existing legacy telephone system.
AndroPedia Tech Library
As part of our service, it is important to keep our client-partners well informed on Telephone system developments, news, and best practices. Here is just a sampling of typical items from our AndroPediaSM library archive:
There will most likely come a time when you decide you want to change service providers for your business internet and telephone.
That makes sense.
In fact, we would suggest that you audit your phone service and bills at least once a year if not every 6 months. (For more on auditing your phone bills – read here).
The telecom industry term for the date you go from one service to the next is the “cutover date”. Basically, this is the day that you cut service with your old provider and begin service with your new provider.
You’d think this is as simple as the switch of a button but there are actually a lot of ways that a cutover can cause trouble for you and your business.
The last thing you want is for a cutover issue to mean loss of profit or productivity in your office. After all, every minute your phones are down costs you.
With this in mind, we thought you would enjoy a quick checklist to ensure your telephone service cutover goes as smooth as possible.
Andromeda Technology Solutions Telephone Service Cutover Checklist: 6 Things to Do Before Your Cutover Date
1- Bring your IT/Telecom Service Provider Up to Speed
First things first, the moment you start thinking about changing telephone/internet service providers; you should get your IT group involved.
A good vendor will guide you through the process of preparing for your telephone service cutover date.
A GREAT Technology Partner will guide you through the prep for your cutover but they will also help guide you in the right direction when it comes to your service levels and providers.
There are a lot of important factors to consider when choosing a telephone/internet provider.
- Customer Service Reputation
- Bandwidth options
- Type of service
- Availability in your area
- Impact on other technologies and departments in your business
It is important to get your IT/Telephone Solution Provider involved for your cutover but it is just as important to get them involved as soon as you make the decision to shop service providers.
This will allow you to avoid a lot of headaches and it will also prepare you properly for everything you’ve got to get done.
Keeping your technology partners in the loop is one of the best ways to steer clear of speedbumps.
2- Notify your current vendor that you’re switching service.
This one is very simple. Once you’ve decided to switch service providers, you need to notify your existing telecom service provider.
Most companies require 30 days’ notice or they will charge cancellation fees.
You’ll also want to make sure you aren’t under a contract. If you find that you are still under contract, you’ll need to figure out what types of penalties or charges the existing vendor has in place for early termination.
As a general rule, you always want to be aware of your contract dates. Even if you aren’t switching vendors, your rates might rise if you aren’t under a long term contract with your vendor. This is best practice and ensures you aren’t being overcharged for your services.
3- Get a “cut sheet” from your current service provider.
The cut sheet is a list of all of the necessary work prior to your telephone service cutover. This is a great way to make sure you have all of your ducks in a row before the official telephone service cutover date.
Once you have the cut sheet you need to make sure and get a copy of it to whoever manages your telephone system.
This sheet includes any equipment you’ll need, programming needs as well as a list of all the numbers you need ported over.
By providing this to your technology partner you ensure that they can schedule technicians to get the required work done prior to the big day.
4- Check your IT closet or equipment room out.
Changing service providers may require some new equipment. Make sure to find out what space that will require and ensure that you have the space available.
Be clear on who will install the new equipment and where you want it as well.
5- Map out your current setup
You’ll want to map out all of your existing set up.
Make sure you have a list of all phone numbers and extensions.
This is something you can do yourself or you can request that your phone system vendor does this for you. They will dive a little deeper and check for dial tones, testing ports and checking for local & long distance capability.
Just be sure to request that your vendor provides you a full report of your findings.
6- Get the date on your calendar and notify anyone who might be impacted
It might sound obvious but you want to make sure that everyone knows your cutover date.
Andromeda recommends that you let all employees know the date and time. Additionally, you’ll probably want to schedule and send out a few emails to customers in case there is any service disruption.
Communication is key with these types of projects.
Customers won’t be upset that they can’t reach you by phone if they know that you can be reached via email or other communications.
This will also make sure that everyone is prepared just in case the cutover doesn’t go as smooth as planned. If your phones are down for longer than expected, you’ve covered your bases on the front side and shouldn’t feel a backlash from employees or customers for the temporary disruption of phone service.
As you’ve probably noticed – most of these steps and the checklist recommends that you communicate with your telephone system vendor. These projects are pretty simple but can easily go wrong if everyone isn’t on the same page.
If you are thinking about switching phone service providers make sure to get in touch with whoever manages your phone system.
You’ll be glad you did.
The post 6 Things You Need To Prepare Before You Change Telecom Service Providers: Your Telephone Service Cutover Checklist appeared first on Andromeda Technology Solutions.
It’s that time of year. The winter holiday season is prime time for criminals and scammers. In fact, it is estimated that fraud attempts increase upwards of 30% during holiday shopping season. There are multiple different techniques and we covered a few of the more popular smartphone scams last year too. You can find our two part series here:
- Popular Phone Scams & How to Avoid Them
- Popular Phone Scams & How to Avoid Them – Part 2
Now, let’s dig into some scams we are seeing in 2018 including some smartphone scams you’ll want to avoid.
Verify Information Smartphone Scams
Criminals and Identity Thieves know that your personal information is valuable. A criminal can use it to open up fraudulent credit cards, empty your bank accounts, impersonate you or they can even steal it and sell it on the dark web for a quick profit.
With this in mind, criminals are always looking for new ways to get ahold of your data.
This popular phone scam begins with a criminal impersonating a representative at a company you probably already do business with or subscribe to. Many times, criminals will impersonate your insurance provider (Blue Cross Blue Shield is very popular).
The criminal calls you and informs you that they are making a routine call to update and verify information on your account . . . sounds innocent enough . . . but don’t fall for it!
Some ways you can defend yourself:
- Most of the time these big companies automate this process through pre-recorded messages. If you get a call from a real human being asking to verify your information – this is your first sign of fraud. Your best bet is to get off the phone and call the company direct. Confirm that they are the ones actually trying to update your info that way.
- Don’t fall for threats or bullying! Often, when you resist these criminals they will begin threatening you and try to intimidate you into giving the info over. “You can lose your insurance” “You will face fines” If these kind of threats and bullying techniques are being used, you’re almost certainly being scammed.
The Tech Virus/Issue Scams
This scam has been around for a while but it tends to pick up traction during the holiday season.
You get a call from a tech company of sorts letting you know about some issue with your equipment or software. The criminal on the phone may direct you to download a ‘patch’ or the solution to your problem. In reality, the criminal just got you to download and open a file with a virus attached. You weren’t infected before but your equipment is now.
The criminal, still impersonating a tech employee or customer service rep, now explains that they can fix the problem for a fee.
The most popular version of this is a Microsoft scam where criminals call you to inform you that your computer is infected (wouldn’t that be some awesome customer service!). Once they get you to your computer they either have you change settings that will allow them to wreak havoc on your comp and steal data from you, or they prompt you to download a file/visit an infected website.
Once you are infected they extort you to get the outcome they desire.
At the end of the day, there are very few companies who are going to call you and tell you about a virus or an issue on your computer or smart device. If you get a call like this . . . disregard. If you want to make sure you don’t have a virus on your computer, contact your IT support staff instead.
Text Message Phishing or SMShing Smartphone Scams
With smart phones at our fingertips most hours of the day, criminals have turned their focus to these devices as a great way to steal information and cause trouble.
These text message phishing scams and SMS phishing (SMShing) smartphone scams use the same techniques you’ll see in an email phishing scam. They will send you messages via text designed to get you to click links, download programs/apps and they try to trick you into handing over personal information.
There are some techniques you can use to discover and avoid these scams:
- If you don’t know the person texting you or don’t recognize the number, don’t click links in their text messages.
- Your bank and other financial institutions aren’t going to text you to verify password info – if you do get a text from someone claiming to be from your bank etc. go direct to the website and handle things that way.
Fake or Look-alike Apps
A big new scam on the market, fake applications are designed by criminals to look like real applications you’d download and use on your smartphone. These applications are designed with malicious hidden code designed to steal your personal information, access your contacts, send spam messages from your phone to your network and even track your location via GPS tracking.
These bad applications are more common on Android devices because the application marketplace is a bit easier for criminals to navigate but that does not mean that you don’t need to be on the look out if you are an iPhone user.
- Make sure you only download applications from trusted web stores and application stores.
- Take a look at the developers of the app and do some research. Make sure they are reputable and trustworthy.
- Read through the terms and conditions of applications before you download. Be sure you know what permissions you are giving developers and programmers when it comes to the data on your phone and usage.
These scams are some of the more popular ones in the market but there are many more including popup smartphone scams, IRS scams, Utility scams and the ‘yes’ scam.
The key to defending yourself is educating yourself and others on these criminal tactics as well as the techniques used to identify and outsmart them.
The post Beware! Popular Phone and Smartphone Scams And How To Defend Yourself appeared first on Andromeda Technology Solutions.
When was the last time you conducted a company wide audit on all the software running on all the machines tied to your firm's network?� If you're not sure the answer to that question, it's almost certainly been too long.� The risk, at least according to the latest survey from Avast, is that there are almost certainly programs running on those PCs that are outdated. Outdated software, regardless of what it is, poses a very real security threat to computers and companies.
Sure, most IT professionals are quite good at keeping the OS's on company machines up to date, along with the big, high profile pieces of software that see heavy daily use.� The problem is that almost every company in existence relies on more than just these.� There are often dozens, if not scores of other programs installed on a few machines here and there. These rarely get the same level of attention that the bigger, more visible programs get when it comes to keeping them updated.
As a case in point, according to Avast's survey, in excess of 94 percent of the PCs that have Adobe Shockwave, Skype, or VLC's media player installed on them haven't been updated in more than a year, which puts them woefully out of date.� That, in turn, leaves a very large security hole in your company and offers any determined hacker easy access.
Worse, it's often the case that a company will retire a given piece of software, stop using it, but then fail to remove and properly uninstall all instances of it from the network. That means it's sitting there like a time bomb, waiting to be exploited.
The solution is simple, but fairly time-intensive.� If you haven't conducted a comprehensive audit of exactly what is installed across your network and how long it's been since those programs have been updated, the time to do so is now.