Blog

Cybersecurity Risk Assessment Common Findings: Data Protection

What are the most common findings, when a 3rd party performs a cybersecurity risk assessment for a company, specifically in regards to data protection? In the video below, Mike explains a few easy things your company can implement for data

Read more ›

How to integrate your call center software with Microsoft Teams

Where do you start, if you want to know how to integrate your company’s call center software with Microsoft Teams? In the video below, Mike Smith explains the two different types of teams integration, and then details several questions you

Read more ›

Microsoft Teams Phone System: Why use Teams Handsets?

Why does your company need to use the fancy Teams Handsets for Microsoft Teams Phone System? In the video below, Mike Smith explains the benefits of using the (more expensive) Teams handsets vs. just using a standard IP phone from

Read more ›

Cloud PBX Checklist for Large Companies: Contracts

This next installment of the ultimate cloud PBX shopping checklist for large companies, addresses possible snags with your existing contracts. In the video below, Mike explains why it’s important to check your current vendors’ contract status before spending a lot

Read more ›

Cybersecurity Risk Assessment Common Findings: Software Inventory and Controls

What are the most common findings in a formal cybersecurity risk assessment, in regards to software inventory and controls? In the video below, Mike Smith explains how simply a lack of inventory is the obvious, yet most common finding, in

Read more ›

Which cloud call center software providers are HIPAA compliant? 3rd Party Validation

Why is 3rd party validation important, if you’re searching for which cloud call center software providers are HIPAA compliant? In the video below, Mike Smith tells you why all HIPAA compliance is not the same, and that in order to

Read more ›

Microsoft Teams Phone System: Do you need an E5 license?

Does your company need a 365 E5 license, for Microsoft Teams Phone System? In the video below, Mike explains why your company doesn’t need an E5 license for Teams Phone System, (but might want to upgrade anyway), because sometimes the

Read more ›

Penetration Test vs. Vulnerability Scan: What is the difference?

What is the difference between a penetration test and vulnerability scan, for cybersecurity? In the video below, Mike explains the main differentiators, including how a vulnerability scan is often part of a good penetration test. He also discusses how a

Read more ›

The Best SASE SD-WAN Vendors: Secure Remote Access

The best SASE (Secure Access Service Edge), SD-WAN vendors all have this in common: Secure Remote Access. In the video below, Mike details the benefits that Secure Remote Access, delivers to companies, when included with a SASE SD-WAN solution. He

Read more ›

Cloud PBX Checklist for Large Companies: Call Center

Mike continues his series on the ultimate cloud PBX shopping checklist for large companies, with today’s video covering call center. Mike explains the difference between ring groups, call center, and contact center, and tells you why it’s important for you

Read more ›