FAQs

//faqs

Need Help? Read Popular Questions

Cyber Security

Whilst it is practically impossible to know every malicious code and virus out there, we can review the main strategies used by hackers to implant viruses and give you tools and advice to prevent them. Below are Frequently Asked Questions relating to Cyber Security

Phishing attacks use electronic communications (most commonly emails) by posing as a ‘trusted source’ with the attempt to trick the victim into giving over confidential and personal information. For example, a person may receive an email that looks like it is from ‘Australia Post’ saying they have a new parcel and they need to ‘confirm their contact details.’ The hacker will then be able to gain any details entered including credit card details and passwords. Prevention strategies include employee training, Multi-Factor Authentication and password management.

Malware attacks are a cyber breach which installs malicious code/s onto a system without the user’s knowledge and consent. Once installed on a system, the code can instruct the computer to do its bidding; this may mean installing ransomware, stealing files, or stealing client confidential details (such as password and credit card details). Malware can enter a computer system in various ways; however, a common technique use by hackers is to leverage weaknesses in old and outdated software. This is why Patch Application Management and Controlling is vital for companies.

Ransomware attacks are designed to hold a company’s files and data at ransom in return for a financial fee. It works by encrypting files, folders, backups and hard drives across an entire company network so no work can be undertaken until the ransom is paid. System backups and Restricting Administration Privileges can alleviate the pain caused by ransomware attacks, and strong Cyber Security Management Systems can minimise the risk of attacks altogether. Ransomware is commonly installed into a system via malware.

A Macro-virus is a malicious computer program written in the macro language and designed to infect programs that use macros; primarily MS Excel and MS Word. The virus can enter the system via phishing emails, malicious online advertising, or via unsecured websites. Once installed, the virus will begin to run as soon the associated computer program (i.e. Excel or Word) is opened. Configuring MS Office Macro Settings dramatically reduces the likelihood of macro-viruses entering a system.

Password attacks aim to decrypt or steal a user’s password to undertake illegal activities. This could include accessing company bank accounts, networks, systems and/or confidential client information. Hackers leverage the fact that 61% of people use the same password for a wide range of logins. This means, once the hacker has the password, they can access both personal and business information. Multi-Factor Authentication can stop hackers from leveraging stolen passwords.

Drive-by attacks, or drive-by downloads, occur when victims visit compromised websites which have been infected by malicious codes. They are called ‘drive-by’ as there is usually no action required by the victim in order for malware to install. Application Control and Application Hardening are two of the best defences against drive-by attacks.

Trojan Horse is the term used to describe malware that is disguised as a trusted and legitimate piece of software. This convinces the user to proactively install the malicious code onto the computer without considering the consequences. Business protection against Trojan Horses comes from user awareness training and Restricting Administration Privileges.

Denial of service attacks aims to take a company offline by overwhelming or flooding a network to overload a system; resulting in users (or businesses) being unable to access files. Often, these attacks are aimed at large companies for the purpose of blackmail, revenge, to harm a competitor or to shut a system down to inject other malware. Ensuring strong Cyber Security Management Systems for your networking infrastructure can reduce the risk and impact of overloading systems.

SQL injection is a form of hacking which takes advantage of database vulnerabilities and thus enables the perpetrator to access, and sometimes manipulate, various databases. Website databases are the most common targets of SQL injection attacks and hackers often aim to steal credit card details, passwords and personal information. Ensuring website platform patches are up to date are two ways to prevent and minimise damage caused by these attacks.

Session hijacking refers to the instance when a hacker manages to substitute its own IP address for a client’s IP address, resulting in the hacker becoming the ‘middle-man’ between the client and the network server. This means, all data that is being sent and received from a trusted computer to a network is also going via an external hacker. This attack compromises a company’s data and leaves it open to ransomware and fraud. Implementing Next Generation Antivirus systems can reduce the likelihood of an attack.

Cross-site scripting leverages flaws in websites to inject malicious code (usually JavaScript) which consequentially causes harm to any website visitor that clicks on the attacked webpage. For businesses, a vulnerable website can result in their clients being hacked/attacked simply by clicking on the site. Businesses should ensure they eliminate potential attacks via Application Hardening and Patch Management.

Insider threats do happen. Unfortunately, 34% of all cyber-attacks are instigated by malicious insiders. These attack can range from lazy employees who ignore protocols and accidentally activate an attack, through to disgruntled employees stealing confidential data to give to competitors or sell on the black market. Ensuring Restrictive Administration Rights, as well as user awareness Training, are the best ways to protect against internal threats. Advanced tracking and auditing can assist with identification of emerging threats and assist with legal requirements after the fact.

AI-powered attacks are becoming a scary reality for businesses and governments. AI attacks undertake machine learning in order to automate attacks and increase the speed and damage of ‘traditional attacks’ such as identity theft (stealing credit cards etc.) and password hacking. Whilst these attacks are not commonplace currently, businesses can begin to prepare for such attacks with strong Cyber Security Management Systems and end user awareness training.

 

IP spoofing is the process of an attacker masquerading as a ‘trusted’ IP source and then manipulating the data which is sent to respective connected clients. This means the hacker is in control of the information being received by the victim. The aim of IP spoofing is most commonly to initiate a denial of services. For protection, companies should establish ensure they have Cybersecurity Management Systems in place to minimise potential damage.

APT’s are passive cyberattacks which often go undetected for long periods of time. The aim of APT’s is to gain access to a computer or network and simply gather information. The malicious purpose may be for exploitation, to sell the company’s data or to steal confidential information. Application Patch Management and Patching Operating Systems provide strong protection again these threats.

Droppers don’t directly cause harm themselves, however, they are malware installers. This means, when a dropper (often disguised or hidden in a file or directory) is installed on a computer or network system, it can initiate malicious codes and viruses to run havoc on systems. To avoid droppers installing on a system, ensure your business implements Restrictive Administration Rights and Application Hardening.

Adware is a more common term that many have heard of and experienced. However, these days, it has become much more advanced and specific unwanted ads will not only appear on your website and screens, but they can also contain malicious codes and macros which may automatically install if you open or click on the advert. Strong Next Generation Antivirus software can eliminate most adware, and Application Hardening can prevent malicious codes from installing.

Spyware, as the name suggests, is designed to spy on and steal information from its victims. Spyware can download itself via adware or other program vulnerabilities, which is why Patch Application Management is vital, as is Next Generation Antivirus. Spyware aims to primarily steal passwords and personal details from users and businesses for financial benefits. It is one of the oldest known cyber-threats and continues to cause major issues to those who don’t have Cybersecurity Management Systems in place.

Port scanning and sniffing have the core same objective which is to work out a system’s vulnerabilities. Port scanning analyses a system’s 65,000+ ports to assess if any ports are open and if the hacker can infiltrate a connection or malware via the opening. Sniffing is the act of analysing servers and networks with the aim to assess potential breach options. The best way to stop an attack is to prevent scanners and sniffers entering the system. Patching Operating Systems and Application Control are the first lines of defence.

Brute force attacks are a technique used by hackers to attempt to gain access to a company’s systems and files. The concept is simple: hackers work to calculate every possible password combination required to ‘crack’ a security code. Brute force attacks are more common for larger companies, as it can take a hacker a long time crack the code. In 2016, a brute force attack resulted in hackers gaining access to 21 million Alibaba accounts. Brute force attacks are best prevented with strong Password Management.

Managed IT Services

Frequently asked questions relating to our managed IT and hosting services

We have over 40 years combined experience in the Information Technology field. This is 40 years of hands on work, making our technicians fully qualified and fully prepared for any problem that comes their way. You can be assured of quality service every time. All our server engineers are either in possession of an MCP or MCSE degree or are in the process of sitting the relevant exams.

Yes, we manage interstate sites for many clients, including retail chains and consulting firms. With dedicated remote support resources, in most cases, we can replace expensive in-house IT staff and deliver massive cost savings with managed IT and cloud solutions.

We serve a wide range of businesses from Brisbane to Melbourne. Most IT needs are still very similar and, we can most certainly help you improve and or build on your IT systems. If you are using an industry-specific solution, we can function as an interface between you and your users and translate the tech talk into understandable English.

We service the entire Sydney, Melbourne and Brisbane area and can get a qualified JamCyber IT technician out to you usually the same day, but definitively within 48 hours. We have workshops in Sydney CBD (Surry Hills), Coogee, Blacktown and Merrylands. In most cases we can solve your issues remotely, which is faster and cheaper than to come onsite.

Yes! We offer all kinds of software and hardware solutions at competitive prices. We also supply OEM software with new goods, which is sometimes half of the retail pricing. For businesses, we work with Open Licensing or any licensing model of your choice

Simply call us on 1300 180 051 or 02 8188 7575 and our friendly representative will be happy to help you. Alternatively, you can lodge a ticket from the contact page.

We are happy to tailor a solution to your needs and you will find our service fees are competitive. Our hourly rates start from $180ex GST per hour for Small Businesses. Other businesses and consulting rates are based on the nature of the engagement.

Cloud Phones

Frequently asked questions relating to our cloud phone services

Yes! We recommend porting your (main) phone numbers into the Benchmarking VoIP system. This saves you from paying a forwarder fee with your current supplier for every call you receive. Transfer cost is $65 for a single number or $220 for a number range – once off. This means you keep your numbers, regardless of where you are or intend to move to!
And as always with us, you are the owner of the numbers, forever.

Yes, we manage interstate sites for many clients, including retail chains and consulting firms. With dedicated remote support resources, in most cases, we can replace expensive in-house IT staff and deliver massive cost savings with managed IT and cloud solutions.

VoIP stands for Voice over Internet Protocol and means that the voice call itself is converted into digital voice data and then sent over the internet. As such, VoIP technology enables you to drastically reduce your business infrastructure cost (i.e. line rentals) as you can simply use an (often existing) internet line to serve for your phone calls.

It is and it isn’t. Skype (and similar services) uses VoIP technology to make free calls between Skype users and cheap calls to landlines. JamCyber.com call rates are similar to Skype style call rates but you get much more: A complete phone system for your business with enterprise-grade features like a free conference call facility and international dial-in numbers. Or use it to forward to more than one phone, including multiple mobile phones at the same time. Never miss a call in a time where a voice mail alone loses you business!

Yes. IVR or interactive menus are part of our PBX offering. Our extensive feature list includes:

  • Fax to Email
  • Call Transfer without office / geographical boundaries
  • Voicemail (includes Voicemail to Email as sound file)
  • Ring Groups without office / geographical boundaries
  • Follow me
  • Call Queues and queue performance monitoring
  • Time Conditions to drive calls based on time
  • Interactive Voice Response (press 1 for support, 2 for sales, etc.)
  • Call Pickup (*98)
  • Busy Light Function (BLF) – see who is currently on the phone in your organization
  • Customizable hold music
  • Free conference call facility with Australian and New Zealand dial in nodes
  • Call recording (additional fees apply)
  • 1300 and 1800 number support

You name it, we can do it!

Yes. custom hold music is part of our PBX offering. Our extensive feature list includes:

  • Fax to Email
  • Call Transfer without office / geographical boundaries
  • Voicemail (includes Voicemail to Email as sound file)
  • Ring Groups without office / geographical boundaries
  • Follow me
  • Call Queues and queue performance monitoring
  • Time Conditions to drive calls based on time
  • Interactive Voice Response (press 1 for support, 2 for sales, etc.)
  • Call Pickup (*98)
  • Busy Light Function (BLF) – see who is currently on the phone in your organization
  • Customizable hold music
  • Free conference call facility with Australian and New Zealand dial in nodes
  • Call recording (additional fees apply)
  • 1300 and 1800 number support

You name it, we can do it

Yes. Queues are part of our PBX offering. Our extensive feature list includes:

  • Fax to Email
  • Call Transfer without office / geographical boundaries
  • Voicemail (includes Voicemail to Email as sound file)
  • Ring Groups without office / geographical boundaries
  • Follow me
  • Call Queues and queue performance monitoring
  • Time Conditions to drive calls based on time
  • Interactive Voice Response (press 1 for support, 2 for sales, etc)
  • Call Pickup (*98)
  • Busy Light Function (BLF) – see who is currently on the phone in your organization
  • Customizable hold music
  • Free conference call facility with Australian and New Zealand dial in nodes
  • Call recording (additional fees apply)
  • 1300 and 1800 number support

You name it, we can do it!

Yes, and it’s free! Use up to 5 “rooms” with free dial in points in Australia and New Zealand. International dial in points can be booked month to month from $11 per month (i.e. US and UK and many more!). Conference call dial in numbers can be found here.

Our extensive feature list includes:

  • Fax to Email
  • Call Transfer without office / geographical boundaries
  • Voicemail (includes Voicemail to Email as sound file)
  • Ring Groups without office / geographical boundaries
  • Follow me
  • Call Queues and queue performance monitoring
  • Time Conditions to drive calls based on time
  • Interactive Voice Response (press 1 for support, 2 for sales, etc.)
  • Call Pickup (*98)
  • Busy Light Function (BLF) – see who is currently on the phone in your organization
  • Customizable hold music
  • Free conference call facility with Australian and New Zealand dial in nodes
  • Call recording (additional fees apply)
  • 1300 and 1800 number support

You name it, we can do it!

Yes. Time Conditions are part of our PBX offering. Our extensive feature list includes:

  • Fax to Email
  • Call Transfer without office / geographical boundaries
  • Voicemail (includes Voicemail to Email as sound file)
  • Ring Groups without office / geographical boundaries
  • Follow me
  • Call Queues and queue performance monitoring
  • Time Conditions to drive calls based on time
  • Interactive Voice Response (press 1 for support, 2 for sales, etc.)
  • Call Pickup (*98)
  • Busy Light Function (BLF) – see who is currently on the phone in your organization
  • Customizable hold music
  • Free conference call facility with Australian and New Zealand dial in nodes
  • Call recording (additional fees apply)
  • 1300 and 1800 number support

You name it, we can do it!

Yes. Both email and voice mail can be directly delivered to you email and so be attended to while you are on the road (i.e. via iphone or ipad)

That’s not the case. VoIP and Hosted PBX reach the same call quality as conventional systems, if the underlying internet connection is capable of handling the traffic. As a guideline, the average call on a VoIP system with good quality is 0.1Mbit.

We can help you get this right by checking your speeds and lines and implementing Quality of Service (QoS) in your communication devices.

All part of our famous service!

This depends on your exact requirements. We can answer this question for you very quickly by running a speed test and or establishing what service you use and how big your company is.

We can help you with internet changes and the like.

Contact us today – It’s all part of our famous service!

Yes. Keep your current number regardless if you move into town, interstate or next door. Once a number is ported into our phone system, you can use it from where ever you want. No more reprinting of stationary and missing calls (and business!).

We can get you new numbers as well, regardless of your location. And international numbers too, from $11 per month. Handy if you have a international site office and want them to call you for the price of a local call (and free to you still!).

We can help you with internet changes and the like.

Contact us today – It’s all part of our famous service!

The numbers are listed below and are free to call from any jamcyber.com service. If calling from one of our phones, you can also dial 50011.

Australian Dial Ins:

New Zealand Dial Ins:

  • Hosted PBX is taking VoIP telephony to the business level.

    Hosted phone systems (or Virtual PBX) are designed to lower the cost of a phone system for your business whilst at the same time providing your business with previously unseen connectivity. Plug your extensions in anywhere in the world – you can expand your office to a different building, or your employees can work from home – or across the globe! It will work anywhere there’s broadband and has enterprise level features which would have cost you a lot until now!

  • An extension is the number your VoIP phone (or soft phone) is assigned when it connects to the JamCyber VoIP service. Each phone has a unique 3 digit extension within the phone system (i.e. 101) and calls in between extensions and other JamCyber VoIP phone systems are free.

    You can set the outgoing caller ID (CLIP) of each extension individually, or have it default to a value you select for all extensions on your phone system. You can also choose to divert your extension to a phone number or voicemail if it is busy or after a number of rings.

    Between all of the extensions on your account, the maximum number of simultaneous calls you can make or receive is governed by the number of lines that your account has.

  • The number of Lines you choose is the number of simultaneous calls you can have active at once, incoming and outgoing. Check our plans page to see how many lines you get with your plan.

  • A DID (Direct InDial), aka phone number, is one that exists on the PSTN (Public Switched Telephone Network) and can be connected to the JamCyber VoIP to PSTN gateway to allow you to receive calls through that number as you do on a conventional phone system.

    We can port your existing phone numbers as well, so you don’t have to worry about changing numbers and stationary!

    You can set the destination of your DID to an extension, a voicemail box, an external phone number, a fax inbox, a time conditions or a ring group. And you can do it yourself with our state of the art control panel.

    Currently we offer DID’s in all of the capital cities (plus some NZ ones), and in some regional locations. We also have international DID’s available from $11 per month, which allows you to facilitate cheap client and/ or contractor calls to your phone system or a conference call.

  • The following areas are available for new numbers (call us to check if that’s critical; this list changes often):

    • Adelaide
    • Brisbane
    • Bundaberg
    • Carins
    • Canberra
    • Dalby
    • Darwin
    • Geelong
    • Gladstone
    • Gold coast
    • Gosford
    • Hobart
    • Launceston
    • Melbourne
    • Newcastle
    • Penrith
    • Perth
    • Port Macquarie
    • Proserpine
    • Roma
    • Sunshine Coast
    • Sydney
    • Toowoomba
    • Townsville

    Remember that we can also port your existing numbers into the hosted PBX phone system!

An infoline simply plays a message and then hangs up. You can forwards DIDs to an infoline, as well as diverting extensions to an infoline. For example, you could have a message which says “We are currently re-locating our office. During this time we ask that you submit sales enquiries and support tickets directly through our website. Thank you.”. This message could be played when someone dials one of your DID numbers. Another example is if you have an extension going to your office PBX. You can Divert on Busy/Unavailable to an infoline, so that if your PBX declines a call, or if your PBX is unreachable at the time of the call, your caller could hear a message like “We are currently experiencing technical difficulties, please try calling again later.”

Our website has a high grade 256 bit SSL encryption engine using our certificate from RapidSSL. We use this encryption for access to the control panel, and payment pages to ensure your information is kept secure. All credit card payments are processed by St George Bank, using a proprietary encryption protocol designed by St George Bank.

The account setup process is done within an hour from order. After you sign up you must make a payment to initialize your prepaid balance. From there, you can choose a plan. The pro-rata plan fee will be deducted from your initial balance. After you have added funds to your account, you are all set to make calls.

We can help you configure the phone system, existing phones and / or soft phones. Let us know what your requirements are

Some local carriers require end user’s information for registration before purchasing a DID.

After completing the purchase you will need to provide some information to be transferred to the local carrier and will reviewed by it. Please note that your DID might not be activated until the local carrier approves the details.

The following areas require a
* Current Address (Anywhere in Australia)
* Proof of address (a copy of utility bill no older than of 6 months);
* Passport or ID copy (drivers license);
* Name, business name and contact phone numbers.

Areas:

  • China (2 proof of address required)
  • Costa Rica
  • France – National numbers
  • Hong Kong (2 proof of address required)
  • Japan
  • Luxembourg
  • Russia
  • Switzerland
  • Turkey
  • Ukraine – Geographic numbers only

In addition, the following areas require the current address to be located in the same area the DID is located:

  • Austria – Geographic numbers only
  • Belgium
  • France – Geographic numbers only
  • Georgia – Geographic numbers only (Must have Georgian passport or ID)
  • Germany – Geographic numbers only
  • Germany Toll-Free
  • Greece
  • Hungary
  • Ireland – Geographic numbers only
  • Italy
  • Malaysia
  • Netherlands

* NOTE: documents verification might take up to 5 days.

Codecs define the compression rate of the voice data to be sent over the internet. We support codecs G729, ulaw and G711, alaw.

Chose codec G729 because it offers the highest compression and works on all internet connections.

Chose codec G711 because it offers the highest quality speech but requires more upload bandwidth.

We can help you with your internet requirements and will ensure your phones are setup the right way, so you don’t really have to worry about codecs!

The minimum you need is a broadband ADSL or ADSL2+ connection. We recommend a business grade line with uploads higher than 1MBit if you use a mail server on the same line. We can assist you with checking and upgrading your internet service if required.

If you plan to use a software based phone on your computer, you will have to check that your PC meets the minimum requirements for that software.

Our control panel let’s you set it up in seconds. Just click on the Services link at the top centre of the page, and then click on the Voicemail Tab. Add a new voicemail mailbox and take note of its number.

Now click on the Hosted PBX extensions tab and select the mailbox. This will give your phone a Message Waiting Indicator or stutter dial tone when you have new messages. Now you must turn on Divert for Busy/30s (30s = 30 seconds, you can pick a different value if you wish). Then choose “Mailbox: x” for Divert to.

Now if your phone is busy, or it is unanswered for 30s, the caller will be sent to your voicemail box!

50001 – Check account balance
50002 – Check voicemail linked to your extension
50003 – Check a different voicemail account
50010 – Last unanswered call
50012 – Echo test

000 – Connects directly to emergency services. You are advised to call 000 from a real landline phone, and not your VoIP phone. Your bmkvoip.com.au service is a supplementary service. Due to the nature of the internet, there are many outside factors that can cause calls to go wrong or not connect at all. For this reason, you are strongly advised to dial emergency numbers only from your mobile phone or landline phone.

Go to the control panel login and click reset password. You have to remember and enter your username and your associated mobile phone number.
Otherwise, contact us during business hours AEST and we will ask a few questions, then reset your password on the spot.

Go to the control panel login and click reset password. You have to remember and enter your username and your associated mobile phone number.
Otherwise, contact us during business hours AEST and we will ask a few questions, then reset your password on the spot.

After setting up your Voice over IP Device, it is important to make sure it can access JamCyber VoIP. By default, your ADSL modem and/ or firewall will probably have all of the ports to your computer closed, except for the necessary ones for web access.

You may have to look up the method for your specific ADSL modem or firewall, but here are the general settings.

Note: Before proceeding, TRY your VoIP device. If incoming and outgoing calling works fine, then you’re all set, and you don’t need the manual configuration below!

You need to have a rule for Outbound UDP traffic on port 5060.

You need to have a rule for Inbound UDP traffic on port 5060 to be forwarded to your VoIP device. (Note: For each additional VoIP device on your network, you should set it to use a different port (eg: 5061) using its configuration web interface and then forward that port on your ADSL modem/firewall to that device.

RTP Forwarding

The above ports are for signaling only. If you have only forwarded these ports, you will most likely get silent calls or one-way audio. You should check the configuration of your device eg SPA 2000, 3000, 841, 941 in the web interface, click on the SIP Tab, find RTP MIN & RTP MAX and forward those series of ports from your ADSL modem/firewall to your VoIP device’s IP.

If there are a lot of ports that need forwarding, copy the RTP MIN to the RTP MAX field, then consider the number of concurrent calls your plan allows and add that onto the RTP MAX field. Now you only have n ports to forward to your VoIP device!

Or contact us for help 😉

Most modern routers support QoS, which allows you to preference specific traffic. In order to secure bmkvoip.com.au voice traffic, enable Qos for the ports 10,000 to 20,000. You only need to set this up if you use a limited line and run other services like a mail server through the same line.

Talk to us about your requirements and we can either help you setup QoS or assist with the right internet connection for your needs and your location.

Yes. We deliver and install the phones at your office as part of our service delivery. The following conditions apply for the free installation:

  1. PoE or 1 free power plug must be within 1.5 meters of the location of each phone
  2. The free install is available at the discretion of JamCyber.com
  3. We currently supply the free installation service in Sydney and Melbourne metro. Other areas are on request only.

We utilize the latest technology and partner with the best names to ensure our customers enjoy a reliable interruption free service. The main wholesale end is supplied by Symbio, Australia’s largest VoIP services carrier and our redundant HP servers are hosted at Equinix SY1 in Alexandria.

From the start, a Hosted PBX roll out can be done within a day if it’s urgent. We come onsite, install the phones and train you on the new system. With the DIY control panel, you never need to book a phone guy again – simply do it yourself! Or call us for free.

The risk free trial, once approved at the discretion of JamCyber.com, works as follows:

  1. You chose a plan and we establish your exact requirements
  2. We install the phones, configure the PBX and help you start to use the new phone system.
  3. You trial the system for up to 30 days and all you pay for are our low call rates! No other cost apply for the phone and / or the base PBX fee.
  4. If you are not happy within 30 days, we simply collect the (undamaged) equipment. In the worst case, you saved on your calls made during the trial, that’s it.
  5. If you are happy, the monthly base fee applies after 30 days and you need to pay for the phones installed as per previously issued quote (if applicable).
  6. We port the numbers. Additional once of charges apply ($65 for a single number, $220 for a range of numbers)
  7. You cancel the old services for good and live with a 30% to 60% saving ever after

A simple, honest and no-risk trial; contact us today!

If your business currently uses one of the main fixed line providers like Telstra or Optus, your average savings will range between 30% to 60% of your current phone bill. The exact savings can be calculated using our details calculations page or simply upload your existing invoice and we will do the math for you!

And check our call rates and plans to see how much you can save while gaining new features like free conference call facilities!

No. We don’t have any contracts and will never have them. If you are not happy with our products and services, we will not tie you down and force you to stay with us or charge ridiculous exit fees. We pride ourselves to:

  • Not have lock-in contracts – everything is month to month
  • Guarantee you own all your ported and newly ordered Australian phone numbers and can port them away from JamCyber PBX & VoIP whenever you want
  • Supply only SIP compatible and unlocked equipment and phones, so it can be used with any SIP provider should you chose to leave JamCyber PBX & VoIP

You pay nothing upfront to test it and only for the calls made during the trial.

In more detail, the risk free trial, once approved at the discretion of JamCyber.com, works as follows:

  1. You chose a plan and we establish your exact requirements
  2. We install the phones, configure the PBX and help you start to use the new phone system.
  3. You trial the system for up to 30 days and all you pay for are our low call rates! No other cost apply for the phone and / or the base PBX fee.
  4. If you are not happy within 30 days, we simply collect the (undamaged) equipment. In the worst case, you saved on your calls made during the trial, that’s it.
  5. If you are happy, the monthly base fee applies after 30 days and you need to pay for the phones installed as per previously issued quote (if applicable).

A simple, honest and no-risk trial; contact us today!

Postpaid is currently not available. You do have full cost control via the control panel, which gives you up to the second exact call and billing details 24/7.

Monthly detail statements are emailed out also to ensure you know what’s going on.

Nothing, zip, completely free! With any PBX offering, you gain access to a state of the art conference call facility with Australia wide dial-ins for your clients / contractors, etc.

Conference call dial in numbers can be found in a separate support article.

The service requires a credit card on file (VISA and Mastercard, no surcharge) which works on a top-up system. If the account falls below an amount you nominate (i.e. $1) a top-up amount (of your choice) is automatically charged to your credit card.

The monthly plan fee is charged to your credit card 7 days before the next 1st of them month to ensure an on going service.

A full and detailed statement is issued on the first of the month via email and at any stage do you have access to a full call log on your control panel.

The numbers are listed below and are free to call from any JamCyber.com service. If calling from one of our phones, you can also dial 50011.

Australian Dial Ins:

New Zealand Dial Ins:

Either log on to the control panel or dial 50001 from any phone connected to the JamCyber VoIP service and the balance will be read out to you.

Jam Cyber contact form
// Get In Touch

Let's Work to Protect Your Business!



    Google Rating
    5.0
    Based on 57 reviews
    ×
    js_loader