Our fibre internet and network infrastructures covers all cities and provinces throughout the Kingdom of Cambodia.
Our FTTX infrastructure offers high-speed gigabit transit performance. Please contact our sales team if you have specific inquiries. Call us at 023 23 81 81 or 085 888 181, or email us at firstname.lastname@example.org!
Depending on where your office is and availabilities of the installation team, our new customer connection shall be activated within 3 to 7 business days after payment has been received.
Virtualized hardware environment of EZECOM ibizCloud adopts fully redundant design:
EZECOM ibizCloud only offers VMs running CentOS or Windows OS (IaaS), Internet connections (BaaS) and dedicated connections (DBaaS, ODVLL) to customers at this stage. Software-as-a-Service may be developed in the future when we see potential market in particular software industry.
In order to ensure the computing resources can be fairly used among the subscribers, EZECOM had developed an Acceptable Use Policy to provide guidelines to end users; the guideline is attached in the service order form and can be sent to users upon request.
Subscribed resources are not on shared basis. Each VM’s capacity is independent to each other and cannot be transferred.
For technical support, a 7x24x365 Call Center had been set up by EZECOM and International
Network Operation Centre to response customers by email (email@example.com) and phone call (023 238 181).
Customers may subscribe backup service for their VM, which is a value-added service for quick recovery. Daily rates are applied. Customer is responsible for the backup and restoring of Customer Content* under any circumstances. * Customer Content means the Third Party Software that Client installs and hosts on the Services, and any other content, materials or data that Client uses, installs, uploads or hosts on the Services.
Cloud system controls all I/O and components as well as tunnels through the network. A zero-trust security model has been implemented to automatically restrict incoming and outgoing traffic only to the assigned IP addresses, drop and ignore any packets launched outside a VM
Yes, customers may subscribe backup service for their VM, which is a value-added service for quick recovery. Daily rates are applied.
EZECOM provides a built-in high availability platform, which is equipped with full hardware redundancy that single point of failure is protected. For BaaS, DBaaS and ODVLL service, connectivity is provisioned via fully redundant EZECOM-MPLS network and local Internet with SLA.
Monthly Uptime Percentage - 99.9%. Please refer to EZECOM ibizCloud Service Level Agreement for more detail.
Slow Internet access can be the result of several factors, for example:
When installing a wireless/WiFi access-point/router it is important to check below recommendations:
We highly recommend our customers to assess their office network setup and business needs. Monitor and measure the usage so you will get you an idea on how to improve your network and internet setup. There are several technical tools online that can be used to shape netflow traffic graph. In addition, implementing a Firewall policy is a good routine. The most important aspect to improving internet access is user’s education. Encourage users to use the Internet responsibly, productively and safely.
Many people are mostly using laptop or smartphone to access their email. However, there are times when you need to quickly access your email on a temporary computer. For instance, your devices ran out of battery and you forgot your charger. That’s when a webmail will be useful.Here is the link to access your email. http://webmail.ezecom.com.kh Once you have signed in to your webmail, you can also manage Autoreply, forwarding to another address and change password.
Here are recommendations to ensure delivery of your business email communication. Due to increasing problems with spam and malicious email developed by hackers attempting to exploit access to computer systems, today’s email server system are equipped with sophisticated tools and rules (sender policies) to counter malicious attacks. Occasionally, an email cannot be delivered to a recipient because the sender server does not meet the receiver’s sender policy framework (SPF). Here are the dos and don’ts.
If you are using webmail to read and send emails following the URL http://webmail.ezecom.com.kh, ensure that your username (email address) and password are correct.
If you forgot your password, contact our call center number 023 23 81 81 and be sure to have your EZECOM customer ID details and your national ID card/international passport to verify your ownership of the account. If the email account is registered with your company, ensure relevant documents are present. The other way to resolve this issue is to contact our sales personnel assigned to your account directly.
First of all you should check with your colleagues to see if they are experiencing the same issue or not. Most people from a user point of view would try to send a test email from their personal email to verify. This is not a bad approach because you can quickly receive a bounce message, which will include a clue to the problem why your address cannot be reached. A few things could lead to unreachable email:
Find out more on Sender Policy Framework (openspf.org) and Domain Keys Identified Mail (dkim.org) for more information about how to improve your email delivery policies.
Follow this link to check the EZECOM email server status. Most web and email hosting companies provide backend login to cPanel and WHM interface as a good window to monitor and troubleshoot you email services.
Assuming that your colleagues are receiving emails but you cannot, here are a few scenarios could lead to identifying the issues.
To quickly proof above prediction of the problem, you could simply try to send a test email from your personal email to further escalate the troubleshooting steps to system administrator level.
Spammers steal user accounts and compromise mail servers exploiting security gaps. Once an account or server has been compromised, large amounts of spam can be sent – all without your knowledge. When email receivers see spam coming from your account or server, they may block you temporarily.
You can check your IP against many search tools available for free online. For example:
You need to delist your IP from the blacklist using the following methods:
Many reasons might cause this issue:
You can know this by using a software tool to scan which device is accessing to port 25 continuously. Some examples of tools for this are Scanport, Wiresharkand Microtek.
There are several things you may need to do to protect your LAN from spam:
To set Auto Forward:
To set Auto Reply:
There are a few reasons that cause this:
EZECOM has multiple layers of SPAM filtering gateway, it prevents spam from leaving the network.
If the mails you are sending out look like spam, then they will be blocked by our SpamFilter.
Please contact IT Support team if you think your mails have been blocked by Ezecom SpamFilter.
|1||451 Not currently accepting mail from your ip – psmtp|
|2||421 STRING (STRING) Unfortunately, some messages from 220.127.116.11 weren't sent. Please try again. We have limits for how many messages can be sent per hour and per day. You can also refer to http://mail.live.com/mail/troubleshooting.aspx#errors.|
|3||421 STRING.r1000.mx.aol.com Service unavailable – try again later|
|4||554 (RTR:BL) http://postmaster.info.aol.com/errors/554rtrbl.html|
|5||475 access from your network is restricted, try later|
|6||550 Rejected: 18.104.22.168, listed at http://csi.cloudmark.com/STRING for remediation.|
|7||421 STRING cox 22.214.171.124 blocked – Error Code: CDRBL – Refer to Error Codes section at http://postmaster.cox.net/confluence/display/postmaster/Error+Codes for more information.|
|8||571 Email from 126.96.36.199 is currently blocked by Verizon Online's STRING system. The email sender or Email Service Provider may visit http://www.verizon.net/whitelist and request removal of the block. NUMBER|
|9||554 5.7.1 – ERROR: Mail refused – <188.8.131.52> – See http://postmaster.rr.com/amIBlockedByRR?ip=184.108.40.206|
|10||421 4.4.2 service timed out.|
Safe internet access for children is critical. Therefore, we highly recommend our customers to explore continuous education about how to avoid abusive content, exploitation, stolen identity and other cyber-crimes. There are also technical solutions in order to protect your computer and devices from such potential issues listed below.
A phishing email is created to target a specific group of people with a malicious intention to gather information like username ID and password of a computer user, and escalate access to sensitive sites like online banking, email account, social media account and company’s internal system.
Being aware of such unethical intentions, one can predict a phishing email by looking for specific valid details often not included by the spammer. Credible information like your full name and account detail are usually revealed by your bank, organization or system providers in an email regarding the announcement or campaign. It is also important for you to always verify with the bank about such changes or action needed from your end.
Technically, you can have your devices protected by implementing endpoint security software like antivirus suite and email protection system. Last but not least, you should report such suspicious activity by forwarding the email to firstname.lastname@example.org future investigations and contribution to fighting against cyber-fraud in Cambodia.
ICT security threats are real so it is important to keep up with the latest information both at work and personally. Keep your devices, passwords safe and under control
Get familiar with trusted sources when it comes to installing or accepting a new application onto your devices. Implement more layers of security by using Antivirus or Anti-malware protection system on your devices.
Learn more about information security through the news and how to counter measure against new cyber threads like system vulnerabilities, man-in-the-middle attacks and needs for system patches.
When the stakes are high, your sensitive information and business can be at risk because of targeted breach attempts. Understanding how your system is structured and its weaknesses will give you a good chance in protecting your system during inconvenient time.
Work with your IT personnel to keep a close watch on the system access logs. Ensure the access history is secured for future review and analysis. Contact our representatives once you have substantial information about the upstream attempts. Our technical team will be happy to assist you on specific cases. We also work closely with CamCERT (Cambodia Computer Emergency Response Team) to assist in incident response procedure.
Most websites including login and sensitive information protect the transactions by using SSL (Secure Socket Layer) or HTTPS certificate to encrypt information between the users’ computers and server systems. Previously organizations use VPN (Virtual Private Network) to protect access to information using a public Internet. However, with the growing need for mobile workforce, the shift to HTTPS was adopted widely.
Unfortunately, a sophisticated hacker will try to go around the secure line by trying to perform a man-in-the-middle attack, usually at the network provider where you connect your wireless device to at the time. The hacker’s machine will operate a counterfeit self-signed certificate to confuse the user. Therefore, an up-to-date browser will alert the danger of potential threats by generating a certificate error message. You should contact your system administrator to report the incident for better analysis. Your system administrator might suggest a traditional VPN connection as an alternative solution.
help desk number (24/7)
+855(0)23 238 181
+855(0)85 888 181
help desk number
(Mon - Fri: 8:00am 5:30pm)
(Sat: 8:00am - 12.00am)
+855(0)89 777 696