So much more than a business phone system

Great business phone service is just the beginning. J & J Communications gives you far more than traditional PBX systems, at a fraction of the cost.

FIND OUT MORE

Easy-to-use communications

J & J Communications' services are easy to use, manage and deploy. All you need is a high-speed Internet connection and a phone of your choice.

FIND OUT MORE

We are responsive to our clients needs

J & J Communications focuses on communication, attention to detail and timeliness.

FIND OUT MORE

WELCOME TO
J&J COMMUNICATIONS

We are Florida's leading provider of
Business Grade Communication & Network Service Solutions.

Whether you're a small business or a corporate enterprise, we have a broad range of voice and data solutions designed to reduce your telecommunications costs and simplify your business operations.

Substantial savings in the Cloud

Save up to 80% on your monthly phone expenses. There’s none of the capital equipment or hardware costs associated with legacy phone systems. All-inclusive pricing includes a rich feature set with low, predictable costs.

Find Out More!

Phone service shouldn't be one size fits all

...JJCOM.COM isn't. Crystal clear call quality and significant cost savings are just the beginning. Widening the gap between JJCOM.COM's service and the rest of the field is the ability to tailor our service features to your actual needs. Instead of "off the rack" service, you control your communications service to fit your needs.

Find Out More!

We built our reputation by exceeding customer expectations

Unlike other service providers, we don't abandon you after the sale. Rather, we work with you to ensure our service meets your needs. Really, it's more than that: we don't feel like we've done our job until you tell us we've gone beyond the expectations you have of us. We're with you. Customer care is in our DNA.

Find Out More!

It's easy and saves time and resources

Your cloud phone solution doesn’t require costly and complicated technical specialists. Admins can quickly and easily manage users, locations, and devices—anywhere, anytime. Users are empowered to control many of their own settings.

Find Out More!

Latest Blog Posts

A blog on the latest advice, best practices and tips for making the most of technology.

  • Official Links to Download Google Chrome Full Standalone Offline Installer

    We all know about Google's web browser, Chrome. which has become very popular among all Internet users. You can download it using this link. Once you start downloading, it downloads a very small installer which again downloads the required setup files from Google server.

    Read more...
  • How to set up 9to5Google for easier two-factor authentication

    Google has made it even easier to use two-factor authentication. With 9to5Google, there are no more excuses for not adding an extra layer of security. We will show you how to make use of this new feature.

    Quick, a show of hands. How many are using two-factor authentication for your Google accounts? Those of you who didn't raise your hands, head back to Security 101 and pay attention this time around. Those of you who are using two-factor authentication for your Google accounts, you're in for a surprise. Google has made it even easier for you to work with that extra layer of security. It's called 9to5Google and it's really simple. Here's how it works:

    Read more...
  • How to Use Google Authenticator on a Windows PC

    For the past few years, two-step authentication has become one of the most common methods to secure our online accounts as it adds an additional layer of security in the form of TOTP (Time-based One-time Password). One of the most well-known apps for two-factor authentication is the Google Authenticator app by Google itself. In order to use the Google Authenticator to secure an account, you need to have a compatible mobile device like Android, iOS, etc. Since the official Google Authenticator app only supports the mobile devices, you cannot use it on your PC.

    But the good thing is the Google Authenticator app is built on a well-documented algorithm. This simply means that any developer can create their own apps on any platform that can generate time-based one-time passwords just like the Google Authenticator. And WinAuth is one such application for Windows PC.

    Read more...
  • Stop Letting Microsoft Use Your PC for File Sharing

    Microsoft is all about Windows Updates lately. Between forcing Windows 10 updates on everyone, and generally doing a lot to make its users mad with the way updates are handled, it seems like we need to spend more time figuring out to fight updates than using our PC.

    One place Microsoft is attempting to make Windows Update more streamlined is by having users share their connection with others to speed updating through P2P.

    For most users, this isn’t anything they’ll notice or have a problem with, but for anyone with limited Internet where they pay for their bandwidth, it can be a real problem! Fortunately, you can turn it off! Here’s how it’s done.

    Read more...
  • Why you can’t trust things you copy and paste from web pages...

    Put away your wget and curl, your SOAP clients and WSDLs, WebDAV servers, REST APIs and JSON callbacks; when it comes to moving data off websites and on to your computer the sticky stuff that greases the wheels is copy and paste.

    This side of haptic gloves, Ctrl+C and Ctrl+V is as close as we can get to reaching out and grabbing something off the web. It’s the cyber-grab you cyber-learn in your cyber-infancy and never cyber-forget because you endlessly cyber-repeat it.

    Repetition teaches us that what goes in to our hand when we Ctrl+C (grab something) comes out of our hand when we Ctrl+V (let it go).

    But what if it didn’t?

    What if you reached out to grab one apple but when you opened your hand you had a pear? Or a piranha?

    Read more...
  • Beware of fake FileZilla FTP client!!!

    FileZilla has an evil twin that steals FTP logins.

    Maliciously modified versions of the popular FTP application FileZilla look and act just like the real thing, but include extra code that steals the login data typed in by users and sends it to an unauthorized server using the same FTP operation launched by the user without going through a firewall that might spot what it's doing


    Learn more:

    http://it.slashdot.org/story/14/01/28/0332253/filezilla-has-an-evil-twin-that-steals-ftp-logins
    http://blog.avast.com/2014/01/27/malformed-filezilla-ftp-client-with-login-stealer/#.UuZqGNJBae8.twitter

    Protect yourself by downloading from a trusted source.

    https://filezilla-project.org

Highly Qualified And Friendly Support

We provide 24/7 service and support through a combination of online help, live operators, and our On-Call Technicians that come to your site when you need us.

Look at what we do for you!

  • Manage and maintain everything
  • Unlimited local and long distance
  • Easily add remote offices and mobile workers
  • Make moves and changes online
  • Free moves, adds, changes

Tons Of Useful Built-In Features

  • Toll Free Numbers
  • Call Forwarding
  • Call Screening
  • Caller ID
  • Voicemail to Email
  • Voicemail
  • Music-on-hold
  • Conference Calls
  • Cloud based
  • Many more features...