Best Practices For Remote Working

Remote work has become increasingly prevalent, necessitating a focus on best practices to ensure both security and productivity in virtual environments. Here are some key strategies we advise our clients to implement:

Use Secure Communication Tools: Implement encrypted communication tools such as Slack, Microsoft Teams, or Zoom with end-to-end encryption. This will protect sensitive information during virtual meetings and discussions.

Establish Clear Security Policies: Develop and communicate clear remote work policies outlining acceptable use of company devices, networks, and data. Employees should understand their responsibilities in maintaining security standards.

Provide Secure Access: Use virtual private networks (VPNs) to encrypt internet connections and provide secure access to company resources. Multi-factor authentication (MFA) should also be employed for added security.

Regularly Update Software and Devices: Ensure that all devices, including laptops, smartphones, and software applications, are regularly updated with the latest security patches to mitigate vulnerabilities.

Data Encryption: Encrypt sensitive data stored on devices or transmitted over networks to prevent unauthorised access. Encryption protocols such as SSL/TLS should be employed for securing data in transit.

Employee Training and Awareness: Conduct regular training sessions to educate employees about common cybersecurity threats such as phishing attacks and social engineering tactics. Foster a culture of cybersecurity awareness and encourage reporting of suspicious activities.

Endpoint Security: Implement robust endpoint security solutions, including antivirus software, firewalls, and intrusion detection systems, to protect devices from malware and unauthorised access.

Secure File Sharing: Use secure file-sharing platforms such as Dropbox, Google Drive or Microsoft Sharepoint, which offer encryption and access controls to safeguard sensitive documents shared among remote teams.

Regular Security Audits and Assessments: Conduct periodic security audits and assessments to identify potential vulnerabilities and areas for improvement in remote work infrastructure. Address any findings promptly to maintain a secure environment.

Collaboration Tools Management: Administer access controls and permissions for collaboration tools to ensure that only authorised individuals can access sensitive information. Regularly review user privileges and revoke access when necessary.

Backup and Disaster Recovery: Implement regular data backups and disaster recovery plans to minimise the impact of data breaches or system failures. Data should be backed up securely and stored in multiple locations.

Encourage Work-Life Balance: Promote work-life balance among remote workers to prevent burnout and maintain productivity. Encourage regular breaks, set clear work hours, and provide support for mental health and well-being.

By implementing these best practices, organisations can create a secure and productive virtual environment, for remote workers while mitigating potential cybersecurity risks. Constant vigilance and adaptation to evolving threats are essential for maintaining the integrity of remote work operations.

it management support

Why You Need Regular IT Audits

Regular IT audits are crucial for maintaining the security of any business. Here are several reasons why:

Identifying Vulnerabilities: IT audits help to uncover vulnerabilities in your systems, networks, and processes. These vulnerabilities could be exploited by malicious actors to gain unauthorised access to sensitive data or disrupt business operations.

Compliance Requirements: Many industries have regulatory requirements for data security and privacy, such as GDPR, HIPAA, or PCI DSS. Regular IT audits ensure that your organisation remains compliant with these regulations, avoiding potential fines and legal consequences.

Risk Management: By conducting IT audits regularly, businesses can assess their cybersecurity risk posture and implement appropriate controls to mitigate these risks. This proactive approach helps to prevent security breaches and minimize their impact if they occur.

Detection of Security Incidents: IT audits can help detect security incidents such as data breaches, malware infections, or unauthorised access attempts. Early detection allows for prompt response and containment of the incident, reducing potential damage to the organisation.

Evaluation of Security Controls: IT audits evaluate the effectiveness of existing security controls and processes. This includes measures such as access controls, encryption, firewalls, and intrusion detection systems. Identifying weaknesses in these controls enables organisations to strengthen their overall security posture.

Protection of Intellectual Property: Businesses often store valuable intellectual property, such as proprietary technology or trade secrets, in digital form. IT audits help ensure that adequate safeguards are in place to protect this intellectual property from theft or unauthorised disclosure.

Maintaining Customer Trust: In today’s digital age, customers expect businesses to protect their personal and financial information. Regular IT audits demonstrate a commitment to cybersecurity and help build trust with customers, partners, and stakeholders.

Continuous Improvement: IT audits provide valuable insights into areas where improvements can be made to enhance security practices. By incorporating audit findings and recommendations into their cybersecurity strategy, businesses can continuously improve their defenses against evolving threats.

In summary, regular IT audits are essential for maintaining the security, compliance, and resilience of businesses in the face of ever-growing cyber threats. They help identify vulnerabilities, ensure compliance with regulations, manage risks, detect security incidents, evaluate security controls, protect intellectual property, maintain customer trust, and drive continuous improvement in cybersecurity practices.

it securrity

IT Budgeting Tips For Small And Medium Sized Businesses

Budgeting is crucial for small and medium-sized businesses (SMBs) to effectively manage their IT expenses while ensuring they meet their technological needs. Here are our IT budgeting tips for SMBs:

Align IT Goals with Business Objectives: Ensure that your IT strategy and budget align with the overall business goals and strategy. This helps prioritise IT initiatives that directly contribute to the success of the business.

Regularly Review and Update: IT needs can evolve rapidly. Regularly review and update your IT budget to account for changes in technology, business requirements, and potential security threats.

Prioritise Critical Investments: Identify and prioritise critical IT investments that directly impact business operations. Focus on projects that enhance productivity, efficiency, and customer satisfaction.

Consider Cloud Services: Explore cloud services as they often provide cost-effective solutions. Cloud computing allows SMBs to access scalable resources without the need for significant upfront investments in hardware and infrastructure.

Evaluate Total Cost of Ownership (TCO): Consider the total cost of ownership when making IT purchasing decisions. This includes not just the initial cost of hardware or software but also ongoing maintenance, support, and potential upgrade expenses.

Implement Cost Management Tools: Use cost management tools and software to track and analyse IT spending. This helps identify areas where costs can be optimised and ensures transparency in budget management.

Invest in Cybersecurity: Allocate a portion of your budget to cybersecurity measures. Investing in security technologies and employee training can prevent potential data breaches and the associated financial and reputational damages.

Explore Open Source Solutions: Consider open-source software alternatives for certain applications. Open source can provide cost-effective solutions without compromising on functionality or security.

Plan for Scalability: Choose IT solutions that can scale with the growth of your business. This prevents the need for frequent replacements and upgrades, saving costs in the long run.

Employee Training and Support: Allocate resources for employee training to ensure they can effectively use new technologies. Well-trained employees can contribute to increased productivity and efficiency.

Vendor Negotiation: Negotiate with IT vendors for the best pricing and explore discounts or bundled services. Establishing good relationships with vendors can lead to favorable terms and conditions.

Backup and Disaster Recovery: Prioritise backup and disaster recovery solutions. While it may seem like an additional cost, having a robust backup strategy can prevent significant losses in case of data loss or system failures.

Lifecycle Management: Implement a lifecycle management strategy for IT assets. Regularly assess the condition of hardware and software, and plan for replacements or upgrades accordingly.

Collaborate with IT Professionals: Consider consulting with IT professionals or managed service providers. They can provide expertise, guidance, and cost-effective solutions, particularly for SMBs with limited in-house IT resources.

By implementing these budgeting tips, small and medium-sized businesses can optimise their IT spending, enhance efficiency, and ensure that their technology investments align with their overall business objectives.

strategy it

Managed IT Services Or In-House IT : Pros and Cons

Managed IT Services and in-house IT both have their own set of advantages and disadvantages. The choice between the two depends on various factors, including the specific needs and preferences of the organisation. Here are some pros and cons for each:

Managed IT Services – Pros

  • Cost Savings:
    • Reduced Overheads: Outsourcing IT services can often be more cost-effective than maintaining an in-house IT department, as it eliminates the need for salaries, benefits, and other overhead costs associated with hiring full-time staff.
  • Expertise and Specialization:
    • Access to Specialized Skills: Managed service providers (MSPs) often have a team of specialists with diverse skills, providing a broader range of expertise compared to a small in-house team.
  • Scalability:
    • Flexible Resources: Managed IT services can scale up or down based on the organisation’s requirements, allowing for flexibility in adapting to changing business needs.
  • 24/7 Support:
    • Continuous Monitoring: Many MSPs offer 24/7 monitoring and support, ensuring prompt response to issues and minimizing downtime.
  • Focus on Core Competencies:
    • Allows Focus on Core Business: Outsourcing IT allows the organisation to focus on its core competencies without the distraction of managing IT infrastructure and support.

Managed IT Services – Cons

  • Dependency on External Provider:
    • Lack of Direct Control: The organisation may have less control over day-to-day operations and decision-making, relying on the managed service provider.
  • Communication Challenges:
    • Potential Communication Issues: There can be challenges in communication and coordination, especially if the MSP is located in a different geographic location.
  • Security Concerns:
    • Data Security Risks: Entrusting sensitive data to a third party raises security concerns, and organisations need to ensure that the MSP has robust security measures in place.

In House IT – Pros

  • Direct Control:
    • Greater Control: Having an in-house IT department allows for direct control over all aspects of IT operations, facilitating immediate decision-making and responsiveness.
  • Knowledge of Business Processes:
    • In-Depth Understanding: In-house IT teams often have a better understanding of the organisation’s specific business processes, which can lead to more tailored solutions.
  • Security Management:
    • Enhanced Security Control: Organisations can have greater control over their security measures and can implement customised security protocols.
  • Cultural Alignment:
    • Cultural Integration: In-house teams are more likely to be closely aligned with the organisation’s culture and values.

In-House IT – Cons

  • Higher Costs:
    • Increased Overheads: Maintaining an in-house IT team can be more expensive due to salaries, benefits, training, and infrastructure costs.
  • Limited Expertise:
    • Skill Constraints: In-house teams may have limited expertise in certain areas, especially if the organization requires specialized skills.
  • Limited Scalability:
    • Challenges in Scaling: Scaling up or down can be challenging for in-house teams, as it may require hiring or laying off staff, which can be time-consuming and costly.
  • Workforce Management:
    • Human Resource Challenges: Managing and retaining skilled IT professionals can be a continual challenge.

In summary, the decision between managed IT services and in-house IT depends on factors such as budget constraints, the need for specialised skills, control preferences, and the overall strategic goals of the organisation. Some organisations may even opt for a hybrid approach, combining both models to achieve a balance between control and flexibility.

keyinsite reliable it solutions

The Importance of Backing Up Microsoft 365 Email

Backing up your Microsoft 365 (formerly Office 365) email is important for several reasons:

Data Loss Prevention: Regular backups help mitigate the risk of data loss due to accidental or malicious deletion. Users can accidentally delete important emails, and without a backup, these messages may be permanently lost. In the event of a cyberattack or unauthorised access, emails could be intentionally deleted.

Security Threats: Cyber threats such as ransomware and malware can encrypt or damage your data. Having a backup ensures you can recover your emails even if they are compromised.

Legal and Regulatory Compliance: Many industries have regulations that require the retention of certain data, including emails. Regular backups can help you comply with these regulations and avoid legal issues.

Business Continuity: System Failures, server crashes, hardware failures, or other technical issues can result in the loss of data. Backing up your Microsoft 365 email ensures business continuity by providing a means to restore critical information quickly.

User Errors: Human errors, such as accidental overwrites or misconfigurations, can lead to data loss. Having a backup allows you to recover from such mistakes.

Migration and Upgrades: When migrating to a new email platform or upgrading your Microsoft 365 subscription, having a backup ensures a smooth transition by allowing you to transfer your email data easily.

Complete Data Protection: Backup solutions often provide a comprehensive approach to data protection, including calendars, contacts, and other important information, as well as email.

Unforeseen Events: Natural disasters, fires, or other unforeseen events can physically damage infrastructure. Having a backup stored offsite provides an additional layer of protection against such incidents.

Microsoft 365 does provide some basic data retention features, but they may not be sufficient for all scenarios. While Microsoft offers some level of in built protection against data loss, it’s essential to understand that it is a shared responsibility between the service provider (Microsoft) and the customer. Regularly backing up your Microsoft 365 email ensures that you have control over your data and can recover it when needed.


We all know how crucial cybersecurity has become for all businesses but are you including dark web scanning? Companies should consider implementing dark web scanning as part of their cybersecurity strategy for some very compelling reasons:

Early Threat Detection:
Dark web scanning allows organizations to detect compromised credentials and potential security threats at an early stage. Identifying threats before they are exploited can prevent unauthorized access and data breaches.

Protection Against Credential Stuffing Attacks:
Cybercriminals often use credential stuffing attacks, where stolen usernames and passwords from one breach are used to gain unauthorized access to other accounts. Dark web scanning helps organizations identify and mitigate the risk of such attacks.

Proactive Security Measures:
Implementing dark web scanning is a proactive approach to security. It enables organisations to take corrective actions, such as password resets or multi-factor authentication implementation, before malicious actors can exploit compromised credentials.

Data Leakage Prevention:
Dark web scanning helps organisations identify instances where sensitive data, such as customer information or proprietary data, is leaked or exposed on the dark web. This allows for timely action to prevent further data leakage.

Compliance Requirements:
Many industries and regulatory bodies have specific requirements regarding the protection of sensitive information. Implementing dark web scanning can help organisations comply with these regulations by actively monitoring for potential security risks.

Incident Response Preparedness:
Early detection of compromised credentials through dark web scanning contributes to incident response preparedness. Organisations can respond more quickly and effectively to security incidents
when they have timely information about potential threats.

Protecting Reputational Risk:
Data breaches and security incidents can severely damage a company’s reputation. Proactively monitoring the dark web for potential threats helps organisations protect their brand and maintain the trust of their customers and stakeholders.

Preventing Financial Losses:
Cybersecurity incidents, such as data breaches, can result in significant financial losses. Dark web scanning helps organizations prevent financial losses by addressing security threats before they lead to costly incidents.

Continuous Monitoring:
The dark web is dynamic, and new threats emerge regularly. Continuous dark web scanning ensures that organisations stay ahead of evolving cybersecurity risks and maintain an up-to-date security position.

Employee Awareness and Training:
Dark web scanning results can be used as part of employee awareness and training programs. It highlights the importance of using strong, unique passwords and following security best practices.

Third-Party Risk Management:
Organisations often work with third-party vendors, and the compromise of a vendor’s credentials can pose a risk. Dark web scanning can be used to monitor for potential risks associated with third-party credentials.

Competitive Advantage:
Demonstrating a commitment to cybersecurity and taking proactive measures, such as dark web scanning, can be a competitive advantage. It can instill confidence in customers, partners, and investors.

Implementing dark web scanning should be part of a comprehensive cybersecurity strategy that includes other preventive, detective, and responsive measures. It is an important tool in the overall effort to protect sensitive information, maintain trust, and safeguard the integrity of an organization’s digital assets.

How Will AI Impact Your Business?

Artificial Intelligence (AI) has become one of the most transformative technologies of the 21st century, permeating various aspects of our lives. From virtual assistants to personalised recommendations, AI’s applications are numerous and diverse. However, with great power comes great responsibility, and AI is no exception. As we embrace this technology, it is essential to understand both its advantages and potential drawbacks. In this blog we look at some of the pros and cons of AI

Pros of Artificial Intelligence:

Efficiency and Automation: AI excels at repetitive and mundane tasks, increasing productivity and efficiency across various industries. Tasks that once required hours or days of human effort can now be completed in seconds, freeing up time and resources for more complex and creative tasks.

Enhanced Decision-making: AI systems can analyse vast amounts of data at incredible speeds, enabling better decision-making and problem-solving capabilities. In fields like healthcare, finance, and weather forecasting, AI-driven insights have the potential to save lives, optimise investments, and predict natural disasters more accurately.

Personalisation and User Experience: AI-powered algorithms can track user behaviour, preferences, and interactions, leading to highly personalised experiences. From tailored content recommendations to product suggestions, AI enhances user satisfaction and engagement with various platforms and services

Predictive Analytics: AI’s ability to analyse historical data and patterns allows for predictive analytics. Businesses can anticipate customer behaviour, market trends, and demands, enabling them to make strategic decisions and adapt to changing conditions proactively.

 Medical Advancements: AI plays a pivotal role in the healthcare industry, assisting in early disease detection, drug development, and personalized treatment plans. AI algorithms can analyse medical images, identify patterns, and aid in diagnosing diseases with higher accuracy.

Cons of Artificial Intelligence:

Job Displacement: One of the most significant concerns surrounding AI is its potential to replace human jobs. As AI becomes more capable, certain roles, especially those involving repetitive tasks, may be automated, leading to job losses and economic disruption.

Bias and Fairness: AI systems learn from historical data, which can contain inherent biases. If not carefully monitored and controlled, AI could perpetuate societal biases, leading to unfair treatment and discrimination.

Lack of Emotional Intelligence: AI lacks emotional intelligence and empathy, making it challenging to understand or respond appropriately to human emotions and needs. This limitation is critical in certain professions that require compassionate interactions, and shouldn’t be ignored by any business which values their customers.

Security and Privacy Concerns: The massive amounts of data collected and processed by AI raise concerns about data security and privacy. Unauthorised access or breaches of AI systems can lead to severe consequences, including identity theft, financial fraud, and manipulation of public opinion.

Ethical Dilemmas: The development of AI technologies introduces ethical dilemmas surrounding their use, such as invasion of privacy through surveillance, and the use of AI in decision-making processes with high-stakes consequences.


Artificial Intelligence has revolutionised the way we live and work, bringing with it a plethora of benefits and challenges. From increased efficiency and improved decision-making to potential job displacement and privacy concerns, AI’s impact is vast and multifaceted. As we continue to harness the power of AI, it is crucial to strike a balance between its advantages and disadvantages. Responsible development, transparency, and ethical considerations will be key to ensuring that AI remains a force for good.

IT Services

Keep Hackers At Bay With Multi Factor Authentication

Multi factor authentication requires at least 2 forms of authentication and is becoming increasingly important as hackers employ more sophisticated and aggressive tactics. As a Managed Service Provider (MSP) we implement 2-step verification, also known as two-factor authentication (2FA) and recommend our clients do the same for a number of reasons:

  • Enhanced Security: we handle sensitive data and have access to various client systems. Implementing 2-step verification adds an additional layer of security protecting against unauthorized access. It significantly reduces the risk of security breaches and data theft.
  • Safeguarding Client Information: we are entrusted with confidential client information. Enabling 2-step verification on client accounts ensures that even if an MSP employee’s credentials are compromised, unauthorized individuals won’t be able to access client systems without the second authentication factor.
  • Compliance Requirements: Many industries and regulations mandate robust security measures to protect client data. Implementing 2FA helps meet these compliance requirements and demonstrates commitment to data protection.
  • Mitigating Credential Attacks: Passwords can be compromised through various means, including phishing, brute-force attacks, or data breaches. By using 2-step verification, even if a password is leaked, the second factor (e.g., a one-time code) acts as an extra barrier against unauthorized access.
  • Client Trust and Confidence: Clients expect their MSPs to have strong security practices in place. Utilizing 2FA shows a commitment to cybersecurity, fostering trust and confidence with clients.
  • Ease of Implementation: Many modern systems and services offer built-in 2-step verification options, making it relatively easy for MSPs to enable this security feature for their accounts and their clients’ accounts.
  • Scalability: Implementing a standardized 2FA procedure across all accounts can simplify security management and ensure consistent protection for both MSP’s and their clients.
  • Reduced Downtime and Recovery Costs: By preventing unauthorized access, 2-step verification can help avoid potential security incidents that could lead to downtime, data loss, and costly recovery efforts.

In summary, 2-step verification is a crucial security measure that MSPs should adopt to protect their own accounts and their clients’ sensitive data. It helps prevent unauthorized access, mitigates security risks, and enhances the overall trustworthiness of the MSP’s services.

Cloud or On Premises? Which Server Is Best For You?

The choice between cloud servers and on-premises servers for MSP (Managed Service Provider) companies depends on various factors and the specific needs of the organization and its clients. Let’s explore the advantages and considerations of each option:

Cloud Servers

  • Scalability: Cloud servers offer the ability to scale resources up or down quickly based on demand. This flexibility allows MSPs to accommodate clients’ changing needs without investing in additional hardware.
  • Cost-efficiency: Cloud servers typically operate on a pay-as-you-go model, where you only pay for the resources you use. This eliminates upfront hardware costs and reduces maintenance expenses.
  • Reliability: Cloud service providers often offer robust infrastructure with high availability and built-in redundancy. This can provide better reliability and uptime compared to on-premises servers.
  • Geographic flexibility: Cloud servers allow MSPs to deploy resources across multiple regions, enabling them to serve clients in different locations effectively.
  • Ease of management: Cloud providers handle server maintenance, updates, and security patches, reducing the burden on MSPs and allowing them to focus on core services.

On-Premises Servers

  • Data control: With on-premises servers, MSPs have full control over their clients’ data, which can be crucial for organizations with strict compliance or regulatory requirements.
  • Customization: On-premises servers offer greater flexibility in terms of hardware and software customization, allowing MSPs to tailor their infrastructure to meet specific client needs.
  • Performance: For certain latency-sensitive applications or workloads, on-premises servers may offer better performance due to reduced network latency and dedicated hardware resources.
  • Security: Some MSPs and clients may prefer the additional control and security measures offered by on-premises servers, especially in highly regulated industries.
  • Predictable costs: While on-premises servers involve upfront costs, they provide predictable ongoing expenses, as there are no variable costs based on resource usage.

Ultimately, the decision between cloud servers and on-premises servers depends on factors such as the MSP’s target market, client requirements, budget, scalability needs, data sensitivity, and compliance considerations. In some cases, a hybrid approach combining both cloud and on-premises infrastructure might be the best fit, allowing MSPs to leverage the benefits of both options. It’s essential to carefully evaluate the specific needs of the business and its clients before making a decision.

BT To End Landlines By 2025: Get Ready For The Future Of Telecomms

In a world rapidly advancing towards digital connectivity, traditional landline telephony has gradually taken a back seat. The era of copper-based phone lines that have served us faithfully for decades is coming to an end. BT has recently announced its decision to terminate normal phone lines by the year 2025. This monumental shift marks a significant milestone in the evolution of telecommunications, as the company embraces the future of communication technology. In this blog post, we will explore the reasons behind BT’s decision and the implications it has for both consumers and the telecommunications industry as a whole.

Why is BT ending traditional phone lines?

  • Technological Advancements: The advent of Voice over Internet Protocol (VoIP) and the proliferation of mobile networks have revolutionized communication methods. These newer technologies offer enhanced features, better call quality, and increased flexibility compared to traditional phone lines. By focusing on these advanced technologies, BT aims to provide more efficient and modern communications solutions to its customers.
  • Declining Demand for Landlines: With the widespread use of smartphones and the availability of affordable mobile plans, the demand for landline telephony has significantly diminished. Many households and businesses now rely solely on mobile or internet-based communication services, rendering traditional landlines redundant. BT’s decision to phase out normal phone lines aligns with the changing consumer preferences and usage patterns.

Implications for Landline Customers

  • Transition to VoIP and Mobile Communication: As BT discontinues traditional phone lines, consumers will need to adapt to alternative communication methods. VoIP services, which allow calls to be made over the internet, will become the primary choice for those who still require a landline-like experience. Additionally, the reliance on mobile phones for voice communication will continue to grow, reinforcing the importance of robust mobile network coverage.
  • Cost Savings and Bundled Services: The shift away from traditional landlines presents an opportunity for consumers to reassess their communication needs and potentially save money. Many internet service providers now offer bundled services that include VoIP, internet connectivity, and television packages. By opting for such bundles, consumers can consolidate their communication expenses and take advantage of additional features and services.

Implications for the Telecommunications Industry

  • Infrastructure Upgrades: The phasing out of normal phone lines will necessitate significant infrastructure upgrades. Telecommunications companies will need to invest in broadband networks and develop robust VoIP systems to accommodate the growing demand for internet-based communication. This transition will create new opportunities for infrastructure development and innovation within the industry.
  • Evolution of Service Offerings: The industry-wide shift away from traditional landlines will encourage telecommunications providers to focus on developing advanced communication solutions. This could include investing in artificial intelligence-powered virtual assistants, integrating unified communication platforms, and exploring emerging technologies such as 5G networks. The competition to provide cutting-edge communication services will likely intensify, benefiting consumers with a wider range of options.

In Summary

BT’s decision to end normal phone lines by 2025 represents a significant milestone in the telecommunications industry and it’s going to be more important than ever for businesses and large consumers to partner As technology advances and consumer preferences change, traditional landline telephony is giving way to more modern and flexible communication solutions. The transition to VoIP and mobile communication will provide consumers with improved features, greater cost savings, and increased convenience. Meanwhile, the telecommunications industry will experience a transformation, leading to infrastructure upgrades and the development of innovative services. As we bid farewell to traditional phone lines, we embrace a future where communication is more interconnected, efficient, and adaptable to the ever-evolving needs of individuals and businesses.

You might also be interested in reading this: Why is it beneficial to partner with an IT company for communications solutions?

phone system 2