701.775.5512

Blog

Are you an Email Stripper?

Over the last several years we’ve been well lectured on the horrors of absent mindedly clicking “reply all” on emails and thereby sending out embarrassing or inappropriate messages. It appears that message has sunk in and the good news is there seems to be fewer of those stories circulating. Good news right? Not so fast on that reply! Enter the proliferation of social media and broadcast responses to almost every communication. Since it’s “social” it… [READ MORE]

How important is your email?

We’ve probably all heard of someone that has lost email from some form of unmanaged email account. Google Apps, Office 365 and Exchange Online are all excellent affordable services to support your business communications needs. However, they also have their issues. Although the aforementioned communications services are robust, and they are very reliable, they are not immune to humans making mistakes. There are several human issues that uptime and reliability cannot address, such as; file… [READ MORE]

Polar Communications and Insight Technologies Announce Partnership

Collaboration Will Strengthen Web Development and IT Solutions for Enterprise Customers. Park River, ND – March 6, 2015 – Polar Communications announced they have entered into a partnership with Grand Forks & Fargo based Insight Technologies. Also involved in the partnership are Dickey Rural Networks of Ellendale, ND and Dakota Central Telecommunications of Carrington, ND. The affiliation will bring new opportunities to Polar customers such as Network Monitoring and Maintenance, Security, Vulnerability Scanning, Remote Support,… [READ MORE]

Data Security

What do Heartbleed, Cryptolocker, Tornadoes and Disgruntled Employees have in common? They can all lead to data loss, and data loss can lead to lost revenue or even worst; loss of your business. We’ve all heard the statistics that x% of businesses that experience data loss go out of business in x years, but we don’t need scare tactics to understand the value of our data. Just look at your business processes and make note… [READ MORE]

Vulnerability Scanning – Why is it important?

How vulnerable is your network? Do you really know? You have taken all of the steps you believe to be the best security practices so you should be protected, right? Let’s review some of the reasons why you may want to have a vulnerability scan performed on your network. Why should you scan the network anyway? Generally there are two motivating factors in a decision to scan for vulnerabilities. 1) Regulatory requirement, these include PCI,… [READ MORE]

Online Security

I’m too small to be attacked. I hear this all the time, a small company, whether 2 people or 10, think that because they are small they wouldn’t be an enviable target for a cyber-attack. The thing to keep in mind is that the attackers may not want to target you specifically, but to use your data to help facilitate a much larger attack. Customers of a nationally known online shopping service receive an email… [READ MORE]

Hosted PBX or On Premise phone systems

A lot of buzz is being created regarding hosted phone systems, those systems that only require the business to purchase a phone for each user with the server located somewhere in the cloud. The on premise business system has been around for a while and has costs associated with the purchase over and above the desk phones. Which one is right for your business? Let’s examine the differences then you can make an informed decision… [READ MORE]