Blog
Managed Detection and Response Providers Comparison: Recording Network Activity
Your company is evaluating your cybersecurity needs, and you’re thinking of procuring a Managed Detection and Response (MDR) solution. But there are a ton to choose from… how do you compare them? In this video, Mike explains that one of…
Cloud PBX Checklist for Large Companies: Pricing
Where does pricing and cost fit inside the ultimate cloud PBX shopping checklist for large companies? In the video below, Mike explains the different pricing structures available with various cloud PBX service providers, and what type of structure you should…
Cybersecurity Risk Assessment Common Findings: Account Management
What are the most common gaps found within companies, when performing a formal cybersecurity risk assessment? In the video below, Mike explains the most common findings within CIS Control #5 – Account Management. Want Mike’s recommendations on the best vendors…
Which Cloud PBX providers are HIPAA compliant? BAA & Automatic Deletion
Which HIPAA compliant cloud PBX providers are the best for our company? You’d better ask about a BAA & automatic deletion! In the video below, Mike explains both of these items and why not every cloud phone system provider offers…
Managed Detection and Response (MDR) Providers Comparison: Free Forensic Assessment
Your company is researching Managed Detection and Response Providers. But how do you compare the options? One way is to ask about a Free Forensic Assessment. In the video below, Mike explains what this entails and why it might need…
Microsoft Teams Operator Connect Partners: Which is best for our company?
Which Microsoft Teams Operator Connect Partners are best for our company? If you’re asking that question, Mike is here to help. In the video below, Mike tells you the questions you can ask about your organization, that will help you…
Cloud PBX Checklist for Large Companies: SMS & MMS Messaging
SMS & MMS messaging is an important feature to include in your cloud PBX shopping checklist, for your large company. In the video below, Mike explains the benefits this feature can bring to your employee’s productivity, and also discusses how…
Cybersecurity Risk Assessment Common Findings: Configuration of Enterprise Assets and Software
What are the most common findings of a cybersecurity risk assessment, in regards to the configuration of enterprise assets and software? In the video below, Mike explains why IoT devices and USB drives are the most common gaps found in…
Cloud PBX Checklist for Large Companies: Call Flow
Your company’s “Call Flow” is very important for you to document include on your cloud PBX shopping list. Especially if you work for a large company. In the video below, Mike details a handful of “call flow” items that you…
Penetration Testing Services Comparison: What should your report look like?
When you’re comparing penetration testing services for your organization, what should the final report include? In the video below, Mike gives you several things that you should consider as “must-haves” in your deliverable, from a pen testing service. Want Mike’s…










