Phone / Fax / Email
Headquarters / Boston
- Street Address
4 Bellows Rd / 2nd Floor
Westborough, MA 01581 - Mailing Address
PO Box 1129
Westborough, MA 01581-6129
Regional Offices
- Southeast Office
120 W Trinity Pl
Decatur, GA 30030
4 Bellows Rd / 2nd Floor
Westborough, MA 01581
PO Box 1129
Westborough, MA 01581-6129
120 W Trinity Pl
Decatur, GA 30030
This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.
OK View Privacy PolicyWe may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.
Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.
These cookies are strictly necessary to provide you with services available through our website and to use some of its features.
Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.
We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.
We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.
These cookies collect information that is used either in aggregate form to help us understand how our website is being used or how effective our marketing campaigns are, or to help us customize our website and application for you in order to enhance your experience.
If you do not want that we track your visit to our site you can disable tracking in your browser here:
We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.
Google Webfont Settings:
Google Map Settings:
Google reCaptcha Settings:
Vimeo and Youtube video embeds:
The following cookies are also needed - You can choose if you want to allow them:
G Suite Security: Advanced Security for Modern Threats
/in GeneralIn multiple blog posts over the past 2+ years, we have covered the changing and growing nature of threats to your organization, systems, and people. G Suite security offers advanced measures to protect user data, including encryption, 2-step verification, phishing protection, and admin controls. For us the answer is CPR … Communicate and Educate; Prevent […]
Google+ Changes: What you need to know
/in Education, GeneralIn December 2018, Google announced that the consumer version of Google+ is shutting down in April 2019. As the usage lines between the consumer and business versions of Google+ have often been blurry, we want to clear up some of the confusion following the notices you may be getting from Google. What is happening? The […]
G Suite Price Hike: Your Next Steps
/in GeneralAnytime a vendor critical to your business changes their product and pricing, it is tempting to reassess. We may see the world differently than other IT providers, but we, the team at Cumulus Global, strongly agree. Now is a good time to examine your cloud services, as part of your full IT ecosystem, and determine […]
Managing the Impact of the G Suite Price Increase
/in GeneralTo help manage the impact of the pricing increase, we are able to offer renewal and upgrade discounts based on your current licensing. Converting from Monthly/Flex to Annual locks in the current pricing for a year. Upgrading your G Suite Version provides you a discount off the current upgrade pricing for 12 to 24 months. Convert […]
G Suite Price Increase
/in GeneralAs you are likely aware, Google announced a 20% price increase for G Suite Basic and G Suite Business Editions, along with a discontinuation of the discounted pricing for G Suite Basic when prepaid annually. The Basics Effective April 2, 2019, the pricing for G Suite Business and G Suite Basic will increase as noted […]
For 2019: Focus on Outcomes
/in Education, GeneralAs we close out 2018, we reflect on a year that has been a bit of a wild ride. For our customers, we clearly are leaving a period of sustained growth into more uncertain economic times. At the macro level, the economy shows competing signs of growth and contraction. Our political climate is less certain […]
Drive-by Downloads
/in Education, GeneralThis post is part of our Cyber Threat Series. The Challenge: Drive-by downloads are exploit kits that download invisibly from infected websites. These websites may be malicious sites built for malware distribution or trusted sites infected by hackers. Many of these attacks take advantage of weaknesses in popular software and tools, including video players, Java, and […]
Phishing and Spear Phishing
/in Education, GeneralThis post is part of our Cyber Threat Series. The Challenge: Cyber criminals prefer Phishing attacks. Phishing and Spear Phishing remain the primary vector for Malware attacks. Hackers evenly distribute attacks between two variants: Malicious Email Attachment (39.9%) and Malicious Link (37.4%). Leveraging human nature, phishing attacks look and feel like legitimate emails. Recipient often miss […]
Brute Force Attacks: What are They and How to Protect Against Them
/in Education, GeneralWhat is a brute-force attack? A brute-force attack is a method used by cybercriminals to crack passwords or encryption by trying all possible combinations of characters until the correct one is found. It involves using automated software that systematically tries different combinations of characters until the password or encryption key is discovered. Brute-force attacks can […]
Distributed Denial of Service Attacks and How to Prevent Them
/in Education, GeneralWhat is a Distributed Denial of Service Attack? A distributed denial of service (DDoS) attack is a malicious attempt to disrupt the normal functioning of a targeted website, server, or network by overwhelming it with a flood of internet traffic from multiple sources. An example of a distributed denial of service attack One well-known example […]
What are Hostile Network Probes and Scans
/in Education, GeneralThis post is part of our Cyber Threat Series. The Challenge of Hostile Network Probes and Scans: Hostile network probes and scans check your network devices and systems for security holes. Hackers and bots scan specific IP address for open and unsecured ports. While most scans come from the outside, hackers use malware to infect systems […]
Cyber Threat Series Overview
/in Education, GeneralProtecting your network, systems, apps, data, and people is no easy task as the scope and variety of attacks continues to multiply. You want and need to protection, but must make smart buying and decisions. Too little or too much means higher risk or unnecessary cost. We see your business as a target not because […]
Partnering for G Suite Productivity with Our Top 9 Tips
/in Education, GeneralGoogle Workspace (formerly G Suite) is more than an email, calendar, and simple file sharing service. G Suite is a productivity suite that serves as a platform for a range of tools that helps your team, and your business, work more effectively. It is a cloud-based productivity suite developed by Google that includes a range […]
What You Don’t Know Can’t Help You
/in GeneralI expect you have heard the old saying: “What you don’t know won’t hurt you.” — Anonymous In the cloud-y world of IT services and solutions, the lesson is better expressed as: “What you don’t know, can’t help you!” — Allen Falcon For a long time, small and midsize businesses (SMBs) moved to the cloud […]
When Your Identity is on the Dark Web
/in Education, GeneralAs a courtesy to our existing clients and prospective clients, we have been running complementary Dark Web Summary Scans of their domains. These summary scans let us know how many email addresses from each domain currently appear on dark web and identity theft websites. We can then perform a more detailed scan and analysis to […]
EFail Flaw: Encryption Alone Does Not Protect Your Email
/in Education, GeneralAs reported last week by eWeek and others, researched found two flaws that allow hackers with access to email accounts to read emails encrypted with OpenPGP and S/MIME. This is significant for two reasons: These standards are available for us in almost every email client Budget-conscious users often relay on public-domain or free tools to use […]
What is Slowing Down Your Internet? 5 Things Hurting Your Connection Speed
/in Education, GeneralBad WiFi service frustrates employees, hurts productivity, and can send customers to your competitors. Even if you use your wireless access point (AP) vendor’s management tool, there are still things that may be hurting your WiFi service quality or slowing down your internet speed without your knowledge. Read on below to learn about network connectivity, […]
WiFi Quality is About the User Experience
/in Education, GeneralAn ever increasing number of businesses are learning that WiFi is more than a convenient network connection. Restaurants, bars, and coffee shops that want patrons to linger and spend more lose business when customers can’t check the score, answer an email, or scan their social apps. When your mobile app doesn’t work in your establishment […]
Echo of Non-Compliance
/in Education, GeneralEveryday, we hear about new ways we can use our smart speakers. Retailers, radio stations, product companies, and others remind us that we can use our Amazon Echo or Google Home to buy, listen, or learn. The term “smart speaker”, however, is misleading. These are microphones and they are always listening. They are also likely […]
Inertia: The Science of Business Continuity
/in GeneralTo paraphrase Newton’s Laws of Motion (with credit to Galileo) … Absent an unbalanced force, an object in motion will stay in motion and an object at rest will stay at rest. While this holds true for objects in a friction-less environment, it holds true for our businesses as well. Our businesses are in motion, […]