Business email compromise is an emerging type of attack where someone who has control of or access to your email is able to send a convincing yet fraudulent email on your behalf...
Read, Comment, Share & Subscribe
How can I divert calls from one SIM to another SIM?
Diverting calls from one SIM to another is easy One of the most common questions we get asked at BenkoPhone is about how businesses can forward calls from one phone to another....
Can I make calls from a tablet with no SIM?
There are a whole range of apps that can be used to make phone calls from tablets and other devices without sim cards. As long as the tablet is connected to the internet (usually...
How to get my name to not show on caller ID?
Hiding your name from caller ID is easy It is pretty common nowadays to hear someone say “UGHHH! Don’t know that number, THAT CALL IS GETTING SCREENED!” For much of the history...
How to Receive SMS Without Access to My Phone/SIM?
Accessing SMS without access to your mobile is easy! From real estate agencies to doctor surgeries to car dealerships to tradies and builders, SMS management and tracking has...
How to Hide My Number When Sending a Text Message?
We often get asked how to hide a number when sending an SMS. There are ways to do this with a variety of bulk-messaging services. Businesses often want to hide their number or to...
Does Google Voice Work in Australia?
Google Voice is a pretty cool VoIP (voice over IP) system. Like most VoIP services, it can be used for sending messages and making calls as well as forwarding numbers to other...
Which is the best collaborative inbox for gmail?
There are a few different plugins for Gmail that allow you to create a shared/collaborative inbox from your Gmail account, and before we created BenkoDesk we looked at them and...
How to securely delegate Gmail access to a VA without giving them your password
Getting a virtual assistant to manage your email is more or less the holy grail of productivity, but doing it effectively and securely is devilishly difficult. The novice level...
Is it secure to use my mobile number for 2 factor authentication?
2 factor or multi-factor authentication (2fa for short) is a critical tool in maintaining your online security. Almost all web based services nowadays offer it, especially “high...
What are virtual mobile numbers and should I get one for my business?
Regular mobile numbers are attached to a SIM card, those little plastic things that go into a slot in your mobile phone. Even though an increasing number of modern phones support...
What is an eSIM and do I need one?
As the final holdouts of the CDMA mobile networks are switched off in the US in 2020/21, all mobile phones in the entire world will soon run on the “GSM network” (the rest of the...
Free 12 week email course:
Don't distribute your office
How to make your remote team more effective than any in person team could ever be