Blog

Return to Normal Stronger And Safer

Return to Normal Stronger And Safer

While everything changed over the last year, as businesses return to full speed and return to normal stronger, they need to address the basics by examining their IT management and security. There wasn’t a blueprint for moving so many people to remote work, and there isn’t a blueprint for moving employees back. However, this moment is not to be lost, and those who step up and invest in their IT protection and Managed Services will be better off and far ready to move forward than those who do not.

What is Zero Trust Security?

What is Zero Trust Security?

Zero Trust Security requires all users, whether in or outside of a business’ network, to be authenticated, authorized, and continuously validated for security configuration before being granted or keeping access to applications and data. Zero Trust assumes the networks can be local, in the cloud, or a combination with resources anywhere and workers in any location.

What is Doxware?

What is Doxware?

Ransomware attacks breach systems, usually through infected email, and lock essential files or networks until the user pays a specified amount of money. On the other hand, Doxware is far more dangerous. This latest form of malware holds a company’s data hostage, including intellectual property, and can compromise the privacy of conversations, photos, and sensitive files.

Research Shows Remote Work Intensified Data Protection Challenges

Research Shows Remote Work Intensified Data Protection Challenges

Barracuda, our trusted partner and leading provider of cloud-enabled security solutions, released recent key findings from a report titled “The State of Office 365 Backup.” Commissioned by Barracuda, the research surveyed global IT decision makers to capture their opinions and perspectives about Office 365, data security, backup and recovery, SaaS solutions, and a variety of related topics.

Time To Build Your Zero Trust Architecture

Time To Build Your Zero Trust Architecture

The National Security Agency has released a guidance document on implementing Zero Trust within networks. The paper “Cybersecurity Information Sheet: Embracing a Zero Trust Security Model” explains what Zero Trust is, why it is necessary, and how to get started.

Five Things Your IT Team May Not Have Mentioned

Five Things Your IT Team May Not Have Mentioned

If you’re a business owner who considers IT a necessary evil that you’d rather not have to think about…you’re not alone. You don’t know what you don’t know, so it’s easier to rely on your IT team to maintain your systems. And there’s nothing wrong with that. Whether it’s an outsourced team or an employee, finding trusted resources to employ their expertise on behalf of your business is the path to sustainable success.

Best practices to defend against evolving spear-phishing attacks

Best practices to defend against evolving spear-phishing attacks

Centrality’s partner, Barracuda, recently spent several months analyzing spear-phishing attacks looking for new patterns and tactics. They share their findings in the new report Spear Phishing: Top Threats and Trends Vol. 5 – Best Practices to Defend Against Evolving Attacks. This in-depth report takes a look at the evolving trends in spear phishing and the new ways attackers are tricking their victims.

Threat Spotlight: Form-based attacks

Threat Spotlight: Form-based attacks

A new type of brand impersonation attack is disproportionately using Google-branded sites to trick victims into sharing login credentials. Making up 4 percent of all spear-phishing attacks in the first four months of 2020. Researchers expect to see that number climb as cybercriminals have success harvesting credentials with these attacks.

Maximizing the Value of Your Existing Technology

Maximizing the Value of Your Existing Technology

Gain the IT Support You Need to Manage Your Business  Your small or medium-sized business helps power the global economy. You own or operate one of the firms that provides 90% of the world’s businesses and 50% of its jobs. However, it’s more difficult than ever to run...

Learn About The Latest Ransomware – Doxware

Learn About The Latest Ransomware – Doxware

Doxware is a recently evolved form of malware. It holds computers hostage and extorts victims by threatening to release sensitive information if a ransom is not paid. Like traditional ransomware, it must first find a way to infect a network or computer using phishing emails. These lures contain evil-intended attachments or links to malicious websites that have code imbedded in them that is capable of exploiting unpatched security vulnerabilities.

Proactive Cybersecurity Strategies For Small Businesses In 2021

Proactive Cybersecurity Strategies For Small Businesses In 2021

Cybersecurity needs to be a proactive strategy. While making plans for 2021, consider including an investment in your security before something happens rather than waiting to respond to a security crisis. The fact is, all small businesses face a relatively high risk of being targeted. With even a modest investment in cybersecurity defenses, your business will be able to ward off or minimize the majority of potential attacks in 2021.

URGENT: Windows Domain Security Notification

URGENT: Windows Domain Security Notification

Microsoft has released an update to resolve a vulnerability with the NetLogon service in Windows Domains. The vulnerability is being handled via a two-step approach. The update released in September for Windows Servers adds functionality to prevent devices with an...

Five Cybersecurity Threats That Slip By Traditional Antivirus

Five Cybersecurity Threats That Slip By Traditional Antivirus

Since the first computer virus in 1971, security professionals and computer programmers have been playing catch up. As an industry, they continually detect threats, update defenses, then repeat. Over time, there has been a rise of new defenses; however, each defense triggers a corresponding change in tactics from the bad guys.

The Differences Between MAV and EDR

The Differences Between MAV and EDR

There is no doubt that layered security is the best defense in the face of current and future threats to your network. Two solutions are frequently discussed to protect your environment: Managed Antivirus (MAV) and Endpoint Detection and Response (EDR). While these two solutions offer tremendous benefits for your business, as the lines between the two blur – how do you know the difference?

No End In Sight To COVID-19 Themed Cyberattacks

No End In Sight To COVID-19 Themed Cyberattacks

The level of cybercriminal activity related to the COVID- 19 pandemic continues to rise, and these attacks are likely to continue even when a vaccine for the virus is discovered. Phishing attacks purporting to share information about any eagerly awaited COVID-19 vaccine will be launched long before it ever becomes available.

Ransomware operators have hacked Brown-Forman

Ransomware operators have hacked Brown-Forman

Ransomware operators announced last week they have breached the network of the Louisville the spirits and wine firm, Brown-Forman. The thieves claim to have exfiltrated 1TB of confidential data and plan to put up for auction the most sensitive info and leak the rest.

Should You Use EDR To Protect Your Business?

Should You Use EDR To Protect Your Business?

Managed Endpoint Detection and Response, or EDR, uses artificial intelligence to stop advanced threats and malware at the most vulnerable point – the endpoint. Antivirus isn’t enough to protect data, and traditional antivirus programs are more simplistic and limited in scope compared to the modern EDR systems. These newer systems serve a much more significant role by providing comprehensive protection against digital threats.

Do You Know These Costly Email Attacks?

Do You Know These Costly Email Attacks?

Every business needs to know and understand the large variety of today’s email attacks. Data Exfiltration and URL Phishing are two attacks that can have a costly effect on your business. Providing knowledge to your employees helps them understand how these types of attacks work, and how to prevent them. This knowledge can save your business from costly expenses and wasted downtime.

Does Your Team Know About Social Engineering?

Does Your Team Know About Social Engineering?

The human systems set up around technology are consistently the weakest link in the security chain. Attention to detail when establishing training and security infrastructure can protect businesses from cyberattacks and their related fallout.

Do You Know The Most Common Email Attacks?

Do You Know The Most Common Email Attacks?

The email and phishing threats faced by organizations today vary greatly in complexity, volume, and the impact they have on businesses and their employees. There are a number of distinct categories of email threats, two of them being Spam and Malware. Spam is...

What’s The New Normal For Your Business?

What’s The New Normal For Your Business?

Will your employees fully return to the office once the disruption caused by the pandemic ends, or will some of your staff continue to work from home as part of your New Normal? Covid-19 rapidly accelerated the work-from-home trend as businesses rushed to adopt remote...

Threat Update: Malicious Use Of reCaptcha

Threat Update: Malicious Use Of reCaptcha

Cybercriminals are continuing to find new techniques to evade detection. Protect your business by keeping your users informed about current attacks. One of the newest tricks is phishing campaigns using reCaptcha walls to block URL scanning services from accessing the...

Is Your I.T. Getting Praise?

Is Your I.T. Getting Praise?

Amid COVID-19, businesses are collapsing, and some don't have ways to keep working while at home. From shoddy or unsafe Wi-Fi to broken communications, unprepared technology can make remote work miserable. And without an I.T. department, at-home workers are on their...

Update: Know These Covid-19 Spear-phishing Tactics

Update: Know These Covid-19 Spear-phishing Tactics

As the world discovers how to handle COVID-19, spear-phishing attackers are taking advantage of the fear and uncertainty. There has been a steady increase in the number of COVID-19 spear-phishing attacks since January, but a recent spike in this type of attack shows a...

Creating Secure Work-At-Home Environments During Covid-19

Creating Secure Work-At-Home Environments During Covid-19

Covid-19 is changing the working world to a remote environment. While social-distancing practice increases personal safety, the problem is there are serious cybersecurity risks with remote work. And these can put a company’s sensitive data at risk. A recent study by...

Fifth Third Customer Information Stolen

Fifth Third Customer Information Stolen

In early February 2020, Fifth Third had to notify customers some of their employees had stolen customer information. The data exposed included names, social security numbers, addresses, phone numbers, dates of birth, mother’s maiden names, driver’s license...

Coronavirus Outbreak Is Being Used To Spread Malware

Coronavirus Outbreak Is Being Used To Spread Malware

Security experts are warning of new phishing campaigns designed to capitalize on global fears of the fast-spreading coronavirus. True to form, cyber-criminals are looking to exploit the widespread need for news about the outbreak by using it as a phishing lure....

Ransomware Payments Doubled and Downtime Grew in Q4

Ransomware Payments Doubled and Downtime Grew in Q4

According to the most recent figures from Coveware, the average ransomware payment more than doubled quarter-on-quarter in the final three months of 2019 and average downtime grew by several days, according to the latest figures. Cybersecurity should be a top priority...

Cybercriminals Attack Non-profit Firm With Ransomware

Cybercriminals Attack Non-profit Firm With Ransomware

A Sherwood, Arkansas 60+ year fundraising firm business has been forced to close its doors and suspend services. This forced letting 300 employees go just before Christmas following a crippling ransomware attack in October. The Heritage Company is a professional...

Fight Holiday Credit Card Fraud

Fight Holiday Credit Card Fraud

While the holidays are a fun time of the year to give gifts — it can be one of the most dangerous for your credit cards. Most of us will spend money in ways that are out of character for our habits. There is a good chance your holiday gift list will taking your...

A Few Benefits that Come with CompleteCloud

A Few Benefits that Come with CompleteCloud

CompleteCloud has changed how businesses to leverage, manage and pay for their IT services.  CompleteCloud helps businesses stop the cycle of maintaining and upgrading their IT equipment.  This allows you to focus on what matters most- your business.  Technology is no...

Four Reasons To Evaluate Your Current Email Security

Four Reasons To Evaluate Your Current Email Security

According to the McAfee Report in August 2019, Ransomware attacks grew by 118%, with new ransomware families detected, and new threat actors using innovative techniques. Do you know the last time you evaluated your email security? Unfortunately, most organizations’ IT...

8 Surprising Cybersecurity Statistics You Should Know

8 Surprising Cybersecurity Statistics You Should Know

Security continues to be top of mind for businesses. It seems as if there are always breaking headlines that make the news about companies, and even entire cities, that have fallen victim to cyber attacks. Regardless of size or industry type, there are always bad...

7 Benefits of Managed Services

7 Benefits of Managed Services

Regardless of industry or size, technology lies at the center of every business. However, in most small to medium sized companies there are certain limitations when it comes to IT. With an outsourced IT managed services provider, your organization can save time and...

Phone System Success Story: Bullitt County Health Department

Phone System Success Story: Bullitt County Health Department

Finding a Phone System Partner Bullitt County Health Department (BHCD) was starting the process of looking for a new phone system partner. Their existing system was considered legacy and was no longer supported by the manufacturer. This made finding replacement parts...

Employee Spotlight: Brenda Christy

Employee Spotlight: Brenda Christy

Welcome to our team, Brenda! Read more about her role at Centrality in this exclusive employee spotlight.     What is your role at Centrality, and what do you do for clients? My role as a Business Development Specialist is to build long term professional...

Why You Need the Email Threat Scanner

Why You Need the Email Threat Scanner

  Email is the most prominent form of communication for businesses today. However, it is also the primary way that malware and other cyber threats infiltrate a network to gain financial, business, or other sensitive information. To determine what email security...

3 Reasons to Migrate to Microsoft Windows 10

3 Reasons to Migrate to Microsoft Windows 10

  Windows 7 becomes end of life on January 14, 2020. Is your business still running on Windows 7? Or do you have a mix of operating systems in production? It's time to start planning to migrate your business to the newest operating system, Microsoft Windows 10....

How to Enhance Security with Multi-Factor Authentication

How to Enhance Security with Multi-Factor Authentication

  There's no question that security continues to be an important aspect in businesses today. However, it often seems that it's a moving target as technology evolves and as cyber threats become more advanced. Having a strong password policy may seem like a...

Prepare for Windows Server 2008 and SQL 2008 End of Life

Prepare for Windows Server 2008 and SQL 2008 End of Life

Extended support for Windows Server 2008 and Windows Server 2008 R2 is ending on January 14, 2020. SQL Server 2008 & 2008 R2 ends in July of 2019. Although this may seem like plenty of time to prepare, these dates are just around the corner. However, there are two...

IT Success Story: Kentucky Elder Law

IT Success Story: Kentucky Elder Law

Kentucky Elder Law is a Louisville based law firm that specializes in estate planning as well as planning for long-term care. When Centrality was introduced to their team, they were experiencing issues that many businesses face when it comes to IT Support –...

Technology Trends in Transportation

Technology Trends in Transportation

Technology has become an integral part of businesses today, including the commercial trucking and transportation industry. Technology not only affects the truckers on the road, but also the staff back at the office or corporate headquarters. Read more about some of...

End of Life for the NEC SV8100

End of Life for the NEC SV8100

NEC has announced that on December 31, 2018 will the end of support and end of life for the NEC SV8100. But what does this mean if you have an SV8100, and what are some of the benefits of migrating to the SV9100? You want to protect your investment in NEC’s UNIVERGE...

Advanced Secure Access for Remote and Mobile Workers

Advanced Secure Access for Remote and Mobile Workers

With today’s mobile and remote workforce, the focus is on employee productivity rather than location. Work is being done anytime and anywhere—at home, in the coffee shop, on a train. Giving workers the freedom to do their work outside the office and without fixed...

Protect your Business from Spear-Phishing with AI

Protect your Business from Spear-Phishing with AI

Cyber threats are alive and well in today's business technology landscape. Unfortunately, users often fail to recognize these threats until it is too late. This can quickly escalate from not only production downtime, but also financial destruction if the proper...

Manufacturing & IT Compliance

Manufacturing & IT Compliance

Compliance regulations ensure that polices and procedures are in place and are followed relevant to the specific business. Especially over the last 2-3 years, IT infrastructure and cybersecurity have taken a large role in a majority compliance audits and standards. In...

Unique IT Issues in Manufacturing

Unique IT Issues in Manufacturing

IT is no doubt an important aspect of most (if not all) businesses regardless of the industry. In this blog post, we will dive deeper into some of the unique challenges that manufacturing and distribution verticals face when it comes to IT. Diverse User Environment...

GDPR – What You Need to Know

GDPR – What You Need to Know

  Security and data protection have always been a top priority for businesses. But with the European Union's General Data Protection Regulation (GDPR) taking effect May 25, 2018, what does this mean? Especially because of the increased numbers of cybersecurity...

Types of Cyber Security Threats & How to Prevent Them

Types of Cyber Security Threats & How to Prevent Them

    Security continues to be of concerns to both enterprise and small businesses alike. The increasing level of sophistication and number of threats bring security top of mind. Below we will outline a few of the most common cyber security threats, as well as...

Employee Spotlight – Tom Myhal

Employee Spotlight – Tom Myhal

    Centrality welcomes Tom Myhal as a new member of our Business Development team! Learn more about Tom's role at Centrality, as well as his background and what he enjoys outside of work.   Tell us about your new role at Centrality. As a member of our...

Spectre & Meltdown – How are you protected?

Spectre & Meltdown – How are you protected?

As you may have heard in the news, a flaw has been discovered in Intel processors made for over the last two decades that has led to two potential vulnerabilities. These hardware vulnerabilities have been named Spectre & Meltdown. While there is currently no...

What are your IT plans for 2018?

What are your IT plans for 2018?

As 2017 is coming to a close, your organization is likely planning for 2018. Projects to be completed, projected revenues, budgeting, etc.  IT spend is likely a part of that planning. Although many companies do have an IT department, we have seen especially in the...

The Layered Approach to Cloud Security

The Layered Approach to Cloud Security

Ransomware, virus, cyber security - these are all common buzzwords today, and for good reason. A common myth that many businesses have is that the cloud is unsecure, unknown, and an endeavor that only large enterprises can afford to maintain. However, this is far from...

New Ransomware Outbreak: Bad Rabbit

New Ransomware Outbreak: Bad Rabbit

You may have heard about the recent outbreak of ransomware known as Bad Rabbit. This variant of Petya, another of the Cryptolocker ransomware viruses, is currently spreading in Russia and Eastern Europe. While it has not hit big yet in the United States, it...

Cloud Computing to Replace On-Premise Technology?

Cloud Computing to Replace On-Premise Technology?

What comes to mind when you think of " the cloud"? This term has many different meanings and can refer to various concepts, depending on who you ask. Although this may seem new and many believe that it is a fad that will disappear in the next few years, cloud...

Email Security

Email Security

Security is a pretty hot topic in IT news today. With the latest ransomware attacks like WannaCry and Petya, as well as various data breach attacks security has rightfully become top of mind. When thinking about your business' IT network, you probably have anti-virus,...

Prevent Against Advanced Threats like Ransomware!

Prevent Against Advanced Threats like Ransomware!

Stories of people and organizations getting ransomware have been all over the news lately - on a global level. Cyber-crime has become a lucrative business, which is a large part of why it is so common. Unfortunately, anyone is susceptible to this type of threat. We...

Take your Phone System Mobile with NEC’s MLC

Take your Phone System Mobile with NEC’s MLC

Over the years, changes in how the workforce operates has dictated the evolution of the business phone system. For instance, the need to integrate voicemail with email, with customer relationship management (CRM) platform and more importantly the use of mobile...

Global WannaCry Ransomware Alert

Global WannaCry Ransomware Alert

Ransomware continues to make headlines - as it did this past Friday, May 12, 2017 with the WannaCry Ransomware strain. So far, this attack has impacted more than 200,000 computers across about 150 countries according to Europol, taking the title as the largest attack...

Can your users spot a phishing email?

Can your users spot a phishing email?

Regardless of the security measures that you have in place for your network, it really comes down to user education to prevent security threats. Having top-notch firewalls, anti-virus, web and content filtering are all great lines of defense when it comes to limiting...

Boost Productivity while Protecting Corporate Data

Boost Productivity while Protecting Corporate Data

Mobility has transformed the way that we work, communicate and socialize. In today’s mobile enterprise, the lines have blurred between personal and corporate assets, and IT organizations are responsible for much more than simply protecting corporate-owned devices....

Five Key Strategies to Maximize Productivity

Five Key Strategies to Maximize Productivity

Computers are just slow, right? It’s an infamous myth some people who aren’t as savvy with the subject seem to take in stride. Although your PC may not be acting how it used to be, there is usually a tangible cause that can be remediated. It may not seem like much at...

3 Myths about the Cloud – Debunked!

3 Myths about the Cloud – Debunked!

Most would agree that the flexibility and cost savings associated with moving to the cloud are reason enough to make the change. However, "the cloud" still brings about a lot of confusion to many. Because of the overwhelming amount of information available, much of it...

Exchange 2007 End of Life – Migrate to Office 365

Exchange 2007 End of Life – Migrate to Office 365

Subsequent to last week's blog post about the risks of running end of support software comes the following announcement from Microsoft. As of April 11, 2017, Exchange 2007 will no longer be a Microsoft supported platform. Microsoft's Support Policy indicates their...

Best Ways to Enhance your Network Security

Best Ways to Enhance your Network Security

Although network security has always been a top priority for businesses, in recent years this has escalated to a necessity. New threats are constantly emerging, and compromising business data. There are now additional measures that should be taken above and beyond the...

Preparing for the Move to the Cloud

Preparing for the Move to the Cloud

For many organizations, especially in recent years, migration to the cloud has likely been a topic up for debate. How do you know if your business is ready to make the move? What are the benefits? And what is does this cloud migration entail? These are all things to...

3 Reasons to Renew your Software Assurance

3 Reasons to Renew your Software Assurance

If you have an NEC or a Mitel phone system, you may be familiar with the term "Software Assurance". Software Assurance (SWA) is not only a software subscription, but also a support program. Communication in today's workforce is critically important - both internally...

Windows Server 2016 – What’s New?

Windows Server 2016 – What’s New?

Many may already be aware, but the long awaited release of Microsoft Windows Server 2016 is officially here. With this new release, Microsoft has made many improvements while leveraging cloud-ready technologies at the operating system level. Advances in security,...

Employee Spotlight – Kyle Cheatham

Employee Spotlight – Kyle Cheatham

Kyle has been a valuable part of Centrality's Infrastructure Cabling and Telecom team since 2013. In this month's employee spotlight, learn more about Kyle's role at Centrality and his hobbies outside of the office. Tell us about your primary job responsibilities As...

Education & Cloud Computing

Education & Cloud Computing

We find that many schools are teaching the latest and greatest. However, when it comes to IT some of the technology may be lacking. Instead of paying for physical devices for students, which will most likely break or be lost, we’ll build virtual machines. Imagine...

Prevent mobile malware with MaaS360!

Prevent mobile malware with MaaS360!

Mobile Malware = The Next Big Security Threat Organizations are transforming at an unprecedented pace with mobility. The Bring Your Own Device (BYOD) trend continues to spread in the enterprise and SMB space. Mobile apps are creating new and efficient workflows for...

Failover Clustering for High Availability

Failover Clustering for High Availability

How much does an hour of downtime cost your organization? If your business has 2 or more servers and a SAN, it may be wise to consider failover clustering in the event of a hardware failure as a means of minimizing lapse in service. What is Clustering? Failover...

Does Your Business Need a Hardware Refresh?

Does Your Business Need a Hardware Refresh?

What is the importance about keeping your business infrastructure hardware refreshed? As a best business practice, ensuring that infrastructure hardware is current is pennies on the dollar when comparing the amount of time and money associated with downtime....

Claim your FREE Connectivity Audit Today!

Claim your FREE Connectivity Audit Today!

Today's workplace is almost entirely dependent on technology. Every business has the need to communicate effectively in order to run efficiently and productively. Having reliable internet connection and the ability to make and receive calls may seem very basic. But if...

Reduce Travel Costs with the Collaboration Meeting Manager

Reduce Travel Costs with the Collaboration Meeting Manager

Do you travel often to give client presentations or attend meetings? Does your organization have multiple offices, and at times need to work together on a project? Centrality has a solution that offers the same communication and collaboration abilities without the...

Customer Spotlight – Schiller Hardware

Customer Spotlight – Schiller Hardware

When Schiller Hardware was looking for an IT partnership, they wanted an organization that they could trust. After 15 years, Schiller still knows that Centrality will provide the technology services they need to help them to stay competitive in the commercial door,...

Five Ways to Protect your Customers from Ransomware

Five Ways to Protect your Customers from Ransomware

A well-meaning employee at a busy medical center opens an email attachment. Within minutes, the hospital’s entire system is locked out. Patient files are inaccessible and critical systems go down while malicious code encrypts the network. Under the threat of losing...

Not Just an Average Call Recording Solution…

Not Just an Average Call Recording Solution…

What is Voice Documentation? Voice documentation refers not only to the recording, but also to the reporting of calls. Call recording and reporting has become an integral part of many businesses today, and not only in a call center environment. Centrality’s voice...

A (Complete) Cloud Solution for your Non-Profit!

A (Complete) Cloud Solution for your Non-Profit!

Looking to the Cloud? Is your organization in the non-profit space and considering moving to the cloud? Centrality has the non-profit cloud solution for you. An all-encompassing solution provides a complete hardware refresh, connectivity and 24/7 support all in a...

BYOD – Establishing the Future of Business

BYOD – Establishing the Future of Business

What percentage of your staff uses their mobile devices for both personal and work use? More than likely, you have at least some of your employees with access to their work email on their Smartphones. The need to access information anywhere at anytime has driven the...

Why Quality of Service for VoIP?

Why Quality of Service for VoIP?

What exactly is QoS? QoS, or Quality of Service, refers to the ability for the network to prioritize specific data traffic over other less important data. This allows for certain applications or systems to perform optimally without interference. Otherwise, any voice...

Boost Productivity with Skype for Business

Boost Productivity with Skype for Business

Skype for Business is more than just instant messaging - it's a productivity booster! Many people already know how to operate Skype. With Skype for Business communicating and collaborating with colleagues and clients is just as easy. Why should you consider adding...

Employee Spotlight: Andrew Murphy

Employee Spotlight: Andrew Murphy

If you are on Centrality's Managed Services, then you may have spoken with a valuable member of our MSP team, Andrew Murphy. Andrew joined the Centrality team in 2015, and his educational background in computer science gives him the knowledge and expertise to manage...

Webinar Recap – Enterprise Mobility Management

Webinar Recap – Enterprise Mobility Management

Does your organization have users that access corporate email, applications, and files from personal mobile devices? How secure is that data on these devices, and what happens if one is lost or stolen? In our recent webinar, we discussed how Enterprise Mobility...

The 3 P’s of Centrality’s Managed Services

The 3 P’s of Centrality’s Managed Services

In today's workplace, many aspects of business are dependent on technology in some form in order to carry out daily processes. Downtime not only causes delays and frustrations for users. It also leads to lost revenue and business production for the amount of time that...

The Cloud – Now Customized for Engineering

The Cloud – Now Customized for Engineering

In the engineering and architecture industries, the ability to work productively with complex graphic files or power-intensive applications and with as little latency issues as possible are among top areas of concern. Centrality's Complete Cloud provides a customized...

Univerge 3C Review – Innovate the Way You Work

Univerge 3C Review – Innovate the Way You Work

The ability to connect, communicate, and collaborate within an organization provide many benefits to not only individual work productivity, but also to an organization's overall revenue. In last week's webinar, we uncovered 5 different areas of NEC's Univerge 3C...

IT Success Story: Quantum Ink

IT Success Story: Quantum Ink

When Quantum Ink recognized that they needed a reliable voice and IT partner, selecting Centrality was an easy choice. The company was growing and they needed for all of their locations to be included in an on-going IT support model, as well as an integrated voice...

Unlock the Keys to Security and Productivity with MDM

Unlock the Keys to Security and Productivity with MDM

How are you managing BYO or corporate-owned devices? As mobility is an increasingly necessary part of businesses today (as you may have read in our previous blog post), accessing corporate information such as email, documents, applications, websites, etc. is commonly...

Mobile Workforce vs. Healthcare

Mobile Workforce vs. Healthcare

Mobility has become an increasingly important element in the business world, and many organizations are taking advantage of the associated benefits. Having a mobile workforce enables for increased productivity, communication and collaboration outside of the office...

Prevent Ransomware From Corrupting Your Data

Prevent Ransomware From Corrupting Your Data

You’ve probably read about the latest malware to hit local and national businesses. The Locky Virus is a form of malware known as ransomware. By opening the wrong file attachment, or even the wrong website, files on your network become encrypted. To get your data...

Proactive vs. Reactive IT Webinar Recap

Proactive vs. Reactive IT Webinar Recap

Just in case you missed it, here are the top 5 take-aways from our last Webinar:   Total Cost Predictability: One of the many benefits of moving to a proactive support model like managed services is having total cost predictability. A single monthly cost for IT...

Employee Spotlight: J.P. Hansen

Meet Centrality’s newest team member, J.P. Hansen. Originally from Leitchfield, Kentucky, J.P. joined Centrality in January of 2016 as a Business Development Specialist and is already making great strides in providing clients with business IT solutions. With a strong...

Utility Based Services Structure

Utility Based Services Structure

In recent years, there are increasingly more services that have stepped away from the traditional up-front capital cost and are moving towards a utility - based model. Much like how we pay monthly for gas, electric, etc., IT services are also moving to a monthly fee...

Communicate and Collaborate with 3C

Communicate and Collaborate with 3C

When it comes to business phone solutions in today’s marketplace, there are more functions available than answering or making calls. Flexibility, mobility, as well as increased collaboration integrate into a single voice solution that can reduce operational costs and...

HIPPA and the Cloud

HIPPA and the Cloud

If you’re in the healthcare industry and considering moving to the cloud, more than likely following HIPAA regulations and protecting the confidentiality of patient information tops your list of concerns. So does switching to a cloud services model provide more...

Benefits of Upgrading to Windows 10

Benefits of Upgrading to Windows 10

As you may know, Microsoft launched Windows 10 in the summer of 2015. Millions of users have transitioned to this new platform, and many are saying that it combines the best of Windows 7 and Windows 8 with some additional benefits as well. As the platform is nearing...

VoIP Technology 101

VoIP Technology 101

The advantages of implementing a VoIP (Voice over Internet Protocol) telephone system are quickly being recognized by the average consumer. This technology is rapidly becoming the norm for many businesses and homes that will revolutionize and likely replace the...

4 Notable Tech Trends on the Horizon

4 Notable Tech Trends on the Horizon

For businesses operating in this exciting and ever-changing technological time, staying abreast of what’s on the horizon can help with staying prepared for the next big change coming.

Employee Spotlight: Dale Priddy

Employee Spotlight: Dale Priddy

With a degree in electrical engineering, Dale was a pivotal part of Centrality and the originator and initial developer of the company’s IT services division.

Microsoft Office 365: Much more than email

Microsoft Office 365: Much more than email

pro·duc·tiv·i·ty  — noun: the rate at which goods are produced or work is completed, the effectiveness of productive effort, especially in industry, as measured in terms of the rate of output per unit of input. —Merriam-Webster’s Dictionary Businesses are like...

How Technology Can Ease the Stress of Holiday Travel

How Technology Can Ease the Stress of Holiday Travel

The holidays are officially here, we’ve carved the turkey and Christmas is quite literally days away. For many, the idea of holiday travel plans causes extreme anxiety. Especially for busy professionals who often have big projects that cannot be left without...

The Benefits of Updating Your Phone System

The Benefits of Updating Your Phone System

The latest and greatest phone products now offer features that were unavailable 20, or even 10, years ago. Professionals who have waited a while since updating may find it is time to explore the enhanced capabilities available.

Rethinking IT Webinar Recap

Rethinking IT Webinar Recap

Thank you to all who attended our Rethinking IT webinar we hosted on 11/19! Just in case you missed it, here are the top 10 things that you should keep in mind when looking to move your business to the cloud (and in particular, moving to the CompleteCloud model). 1....

Choosing a Side: Cloud or On-Premise

Choosing a Side: Cloud or On-Premise

Every day more companies are taking the plunge into cloud computing. But, it’s not quite an all-or-nothing plunge. There are still many situations where critical business processes are best housed and maintained on-premise.

Voicemail Still has a Voice

Voicemail Still has a Voice

Since Alexander Graham Bell patented the telephone in 1876, technological advancements have been improving upon his original design. One of the phone’s most notable additions, the voicemail (introduced initially as the “answering machine”), has long been a staple of convenience for busy users, particularly in the business world. But, it seems as if the general usage of voicemail is on the decline and it’s a trend threatening to change the way business professionals have been communicating for more than 50 years.

Employee Spotlight: Liz Davis

Employee Spotlight: Liz Davis

Originally from Florence, Kentucky (Florence Y'all), Liz Davis, joined the Centrality team in February 2015 as a Client Development Specialist and already resembles a seasoned veteran of the IT industry. With guidance from Company President Noah Priddy, Liz embarked...

Top 5 SMB Technology Mistakes

Top 5 SMB Technology Mistakes

Technology can be a challenge, especially for small to medium sized businesses. Sometimes the CFO or the Office Manager also ends up wearing the IT hat. In other instances there may not be an IT staff internally, and an outside vendor is relied upon. Over the course...

NEC’s UC Desktop Suite: Improve the Way You Work

NEC’s UC Desktop Suite: Improve the Way You Work

In any business, effective communication plays a vital part in building and maintaining relationships. Having the right communication tools allow for increased productivity, efficiency, and customer service. These ultimately enhance the collaboration within your...

Rethink IT with Centrality

Rethink IT with Centrality

IT hardware has a single destiny: to become obsolete or to die. It’s time to stop the endless cycle of making capital expenses to maintain and upgrade your IT equipment in order to keep up with business production. With Centrality’s Complete Cloud, you’ll never have...

CLOUD COMPUTING 101

CLOUD COMPUTING 101

There’s a lot of talk these days about “the cloud”: data in the cloud, business in the cloud, security in the cloud… But what does cloud computing mean? At its core, there is no universal distinction among the terms “cloud technology” and “cloud computing”. No matter...

NEC’s UT880 = Desktop Phone + Tablet

NEC’s UT880 = Desktop Phone + Tablet

A New Spin on Your Traditional Desktop Phone NEC’s UT880 takes a more innovative and modern view on voice communications by integrating the traditional desktop phone and tablet into one device. As more individuals own smartphones and tablets, the user experience of...

New Name, Same Great Service

New Name, Same Great Service

cen·tral·i·ty: 1. The state or quality of being central.  2. A tendency to be or remain at the center. Since 1996, we have been assisting businesses with the center-most aspect of their production – their network and technology needs. Whether that be infrastructure...

Managed Services: What is Worry Free IT?

Managed Services: What is Worry Free IT?

Imagine never having to deal with another computer crash, renewing a backup software license, or worrying about the security of your network files. This is also known as "uptime." It is a slowly dissolving concept for businesses that desperately want to manage their...

Benefits of Virtualization

Benefits of Virtualization

When you look at virtualizing your infrastructure, there are many benefits and savings that can result for the business. While hardware and energy expenses are the obvious savings, organizations sometimes overlook the reductions in operating costs. Managing multiple...

Mitel Unified Messaging

Mitel Unified Messaging

Clients expect you to communicate with them in an extraordinary way. Being responsive to client messages and inquiries makes you and your company more agile and easy to work with. Mitel Unified Communications and Collaboration (UCC) includes Mitel Unified Messaging....

NEC Recognized as Lowest Cost of Ownership

NEC Recognized as Lowest Cost of Ownership

Why NEC? Is your business looking for ways to contain IT and communication costs now and in the future? NEC Corporation of America (NEC) is worth taking a look at. Earlier this month, the Nemertes Research report compared the total cost of ownership among the best...

Employee Spotlight: Steven Cox

Employee Spotlight: Steven Cox

For today's employee spotlight series, we're introducing you to Steven Cox, Cloud Services Manager at Centrality Business Technologies. Where did you go to college? What was your major? Western Kentucky University – Mass Communications What is your previous experience...

The Right Cloud Model for Your Business

The Right Cloud Model for Your Business

But Which Cloud? Just as there are various types of clouds in the atmosphere, there are also differing types of clouds in the networking universe. In the networking realm, "cloud" refers to various computing related services delivered to computers over a network or...

Has Office Efficiency Gone Out the Window?

Has Office Efficiency Gone Out the Window?

Have you recently found yourself wondering where your employers are? Or are you taking messages for workers who may or may not be in the building? Is there a constant struggle to gather a handful of employees together for a meeting due to out-of-the-office commitments...

NEC Financial Services Deferred Payment Lease Promotion

NEC Financial Services Deferred Payment Lease Promotion

With NEC's financial services deferred payment lease promotion, you can get the technology you want now, with no payments until 2014. Make no payments for 90 days after the start of the lease. Choose a 3 or 5 year lease with $1 or Fair Market Value Purchase Options....

Centrality Speaking at Microsoft Sponsored Event

Centrality Speaking at Microsoft Sponsored Event

Microsoft and Constant Contact have teamed up to offer a way for businesses to create an integrated marketing machine that's affordable, easy to use, and tremendously effective. The business-grade tools of Office 365 offer you a wide range of additional capabilities...

Free Compliance Analysis from Centrality

Free Compliance Analysis from Centrality

Are you in an industry that is governed by regulatory compliance acts? Is the threat of an audit always looming? Getting audited could cost your organization thousands in fines and delays!  Not only does Centrality have the technology and the know-how to prepare your...

Video: Introduction to NEC’s UC Desktop Product

Video: Introduction to NEC’s UC Desktop Product

UC Desktop Suite solution meets the challenge of providing exemplary service to your customers through productivity and organizational tools for all types of office and mobile workers. Watch this video below to learn more about the product.  

Mitel Customer Service

Mitel Customer Service

Businesses often find themselves repeating the same task over and over. There is nothing automated about the task and it seems to be done differently each time with no consistency. Perhaps they don’t have the products and tools in place to provide their employees the...

Mitel Business Dashboard

Mitel Business Dashboard

Would you run your business without knowing the details of accounting? Don’t you need to know how much revenue is coming in and how much money you are spending? Shouldn’t you expect the same type of details from your phone system? Wouldn’t it benefit your organization...

Data Loss – Are you Covered?

Data Loss – Are you Covered?

In today’s world, technology is a key aspect to all parts of your business. From accounting and management to day-to-day communication, more and more parts of your business are performed solely on computers. With the importance of computers and technology, it is...

What is Interactive Intelligence?

What is Interactive Intelligence?

Interactive Intelligence is a software company that provides unified global business communication solutions. This includes call centers, business process automation software, and IP (Internet Protocol) telephony for mid-size to large organizations. The...

What You Didn’t Know You Could Get With VoIP

What You Didn’t Know You Could Get With VoIP

The evolution of our phone capabilities is incredible. From taking a phone message with a pen on sticky note, to reading an email transposed from a live voicemail, technology is changing and improving rapidly. Today, the main proponent of this change has been Voice...

Call Now Button