Author: webadmin

NEC Quick Reference

NEC Quick Reference

Quick Reference Guide for the NEC SV8100 & SV9100



Lift handset or press SPEAKER key

Dial extension number

NOTE:  press 8 after dialing the extension to go straight the exts voicemail



With active call, press the TRANSFER key, dial extension number

Announce call (optional)

Hang up for call to be transferred

NOTE: press 8 after dialing the extension to transfer call directly to voicemail



With active call, press the HOLD key   (OR)

Press a PARK HOLD Button



Press the line key that was placed on HOLD from any phone. (OR)

Press the PARK HOLD button the call was placed on. (OR)

Press the RETRIEVE button and dial the HOLD Location number



Press pre-programmed PAGE button and speak



With the handset in the cradle…

Press REDIAL key

Press Up and Down arrows to review dialed numbers

Lift HANDSET or press the SPEAKER key



Press LIST soft key

Press CID soft key

Use the Up and Down arrows to review caller id numbers.

Lift the HANDSET or press the SPEAKER key to call the number



Make or receive call, then press CONF key

Make 2nd call (internal or external) and Press ADD key

Press BEGIN again to join all parties



Press CALL FRWD key or press SPEAKER and dial 7411

Enter number to forward to (Internal ext #, or Outside # starting with 9, or 3000 for Voicemail

Press SPEAKER key to end and set.



When you call a station and receive a busy tone, press the CAMP softkey.

Once the busy station is free, the system will call you.


DND (Do Not Disturb)

Press SPEAKER and dial 747 +

1 – for external calls only

2 – for internal calls only

3 – for all calls

Press SPEAKER end and set

Press SPEAKER and dial 7470 to cancel



While on a call, press the RECORD key.  The voicemail will immediately start recording your conversation into your mailbox

Press the RECORD key to stop recording or hang-up

The recorded conversation is stored a message in voicemail



Press SPEAKER key and enter 751

Press the “key” to program

Enter 01 then the extension # or dial 9 plus the outside number

Press HOLD to save

Press SPEAKER to end



Press SPEAKER key and enter 755

Enter a bin number between 1 and 9; 0 = bin 10

Enter 9 plus the number and press HOLD

Using the keypad, spell the name; ## for spaces and FEATURE to backup

Press HOLD to save

Press SPEAKER to end

To call speed dial number, Press SPEAKER key or Lift handset and dial #7 and the bin number 0-9



Press SPEAKER key and enter 729

Use the volume UP and Down arrows to adjust the volume

-or-      While the phone is ringing, use the volume UP and Down to adjust the volume



To turn on background music on your phone only, press SPEAKER 725 SPEAKER

Repeat to turn off



The Dangers of Phishing

The Dangers of Phishing

Phishing is an attempt to acquire sensitive information such as usernames, passwords and credit card details.Our newest publication will help explain the details of phishing, how it affects your business network, and how to best prevent it.

Download your copy today!

Data Backups & Recovery; What to Look For

Data Backups & Recovery; What to Look For

Local, On-site, Off-site, Cloud-based, Business Continuity….These are all terms for various types of data backups. And if you search online for data backups, the list becomes long and arduous. So how do you determine what is best for your business?

Local & On-site Data Backups

This is exactly what it sounds like.  Your data is being backed up at your location, possibly on your server as a Windows backup, on a magnetic tape, or on an external drive.  This is typically a more affordable method, internet is not required, and will give you immediate access to your data from your location. However, it does have its downfalls.  On the chance that disaster occurs at your location, your data could be inaccessible from a remote location or even worse, destroyed.

Off-site, Cloud-based Data Backups

This method of backup does require internet as your data is stored away from your location.  This can be seen as both a fault and an advantage.  Unlike local backups, if disaster was to occur at your location, you can rest assured that your data will be safe from fires and floods.  You also have the ability to gain access to your data from remote locations.  For some customers, this ability alone is a deciding factor. The disadvantage of course is cost.  Typically off-site backups are more expensive than on-site and are usually subscription based.

So What is Business Continuity?

Business Continuity is the relative “new kid on the block”.  The focus here is not on recovering data after a disaster, but continuing to access it during a disaster.  This method can be virtualized quickly both on and off-site, allowing your business to keep functioning and saving you costs by eliminating the normal down-time.

Again, the disadvantage might be seen as higher costs, but if you weigh it against the advantages, it may be worth considering for your business.

What Method is Best?

That really depends on your business.  Disasters are something we do not like to think about.  For us at CMS, it is always on our mind, especially with hurricane season less than a month away and the recent flooding in Texas.  It reminds us that things can go wrong, and it’s not always a natural disaster.  Ransomware has grown exponentially in the past few years, and with your network files encrypted, a secure backup may be the only thing to protect your business and your investment.

Find someone you trust, give us a call at CMS.  We will help you look at your data and determine your needs.  From there, we can assist you in finding the method to work best within your budget and still accomplish your goals.  If you would like a little more information on Business Continuity, you can visit our website to read more.

**For all our readers along the coast, June 1 begins Hurricane Season.  Visit to get ready.
Protecting Your Network from Ransomware

Protecting Your Network from Ransomware

What is Ransomware?

Ransomware is malware that holds the victim’s data ransom by preventing access to the computer by locking the desktop or by encrypting the user’s files where they cannot be read. The malware then displays a ransom note, possibly pretending to be from federal or local law enforcement of some sort.

The ransom note may even claim that the computer was used to look at illegal websites, videos, or images and will try to frighten the victim into paying up by threatening to bring them to court.

As we quickly approach 2016, researchers at Fox IT have successfully identified the “Big 3” Ransomware families, whose members have generated huge income in 2015:

  • CryptoWall
  • CTB-Locker
  • TorrentLocker

What are the Basic traits of Ransomware?

Although each ransomware variant is unique, they still work in similar ways. There are generic traits seen with these behaviors.

File-system behavior

Most ransomware will place payment instruction files in the directory of the files that it’s going to encrypt. These files are usually in the form of a text, image and/or URL. It may even include a popup window notifying the user that his files are being held ransom and require a ransom.

Network behavior

Ransomware will encrypt files on drives that are network mapped on the computer as a side effect. This can affect an entire business that relies on network shares for their data, potentially spreading from one computer, to the server, to all other computers that access that server. Having a proper backup solution in place may be the only solution to protecting your data.
As we find encrypted files on a network share, we can use that to determine which user was initially infected with the ransomware by checking the creator of the instruction files on the share. This tells us which computer to disconnect from the network. The goal is to disconnect the infected user as quickly as possible from the network to prevent any further damage.

So where did the Ransomware come from?

One method for installing ransomware is through certain websites. These may be malicious websites, set up by criminals for the sole purpose of infecting website visitors, or they may be legitimate websites that have been compromised by infected advertisements or links by the criminals and used to spread malware.
Another way ransomware can install on your computer is through the opening of email attachments in SPAM or infected emails. These malicious emails may have what looks like regular files attached, but once you open them, your computer is at risk of becoming infected with malware. You may not even see it happening.

Ransomware on Mobil Devices

Ransomware for mobile devices is becoming more common and now have the ability to lock your smartphone or tablet or even encrypt the files stored on these devices. Criminals have learned that we are more dependent upon our phones and tablets than ever before. In some instances, they are more frequently used than our computers, explaining the increase in “mobile malware”.

Follow these tips to stay protected from ransomware.

  • Make sure you have a quality, antivirus program installed on your network, and that it continues to be updated on a regular basis. This also includes installing a reputable security app on your phone and tablets.
  • Keep the operating system and all software on your computers & servers up-to-date by installing the latest security patches and updates.
  • Consider adding a mail-filtering service that not only protects your email from SPAM, but also adds manageability and virus protection. Some services, such as MailWatch from CMS, will continue to spool your email when your connectivity is down, protecting you from lost emails.
  • Avoid downloading software or mobile apps not necessary to your work and only download from trusted sources.
  • Most importantly, Backup! For your network, have a data backup solution in place that protects your critical data on your network so that if anything does happen, you have an untainted backup source to retrieve from and restore to your network. And don’t forget to back up your mobile device to a reliable cloud source that you can retrieve from and restore.