Blog
Cybersecurity Risk Assessment Common Findings: Data Protection
What are the most common findings, when a 3rd party performs a cybersecurity risk assessment for a company, specifically in regards to data protection? In the video below, Mike explains a few easy things your company can implement for data…
How to integrate your call center software with Microsoft Teams
Where do you start, if you want to know how to integrate your company’s call center software with Microsoft Teams? In the video below, Mike Smith explains the two different types of teams integration, and then details several questions you…
Microsoft Teams Phone System: Why use Teams Handsets?
Why does your company need to use the fancy Teams Handsets for Microsoft Teams Phone System? In the video below, Mike Smith explains the benefits of using the (more expensive) Teams handsets vs. just using a standard IP phone from…
Cloud PBX Checklist for Large Companies: Contracts
This next installment of the ultimate cloud PBX shopping checklist for large companies, addresses possible snags with your existing contracts. In the video below, Mike explains why it’s important to check your current vendors’ contract status before spending a lot…
Cybersecurity Risk Assessment Common Findings: Software Inventory and Controls
What are the most common findings in a formal cybersecurity risk assessment, in regards to software inventory and controls? In the video below, Mike Smith explains how simply a lack of inventory is the obvious, yet most common finding, in…
Which cloud call center software providers are HIPAA compliant? 3rd Party Validation
Why is 3rd party validation important, if you’re searching for which cloud call center software providers are HIPAA compliant? In the video below, Mike Smith tells you why all HIPAA compliance is not the same, and that in order to…
Microsoft Teams Phone System: Do you need an E5 license?
Does your company need a 365 E5 license, for Microsoft Teams Phone System? In the video below, Mike explains why your company doesn’t need an E5 license for Teams Phone System, (but might want to upgrade anyway), because sometimes the…
Penetration Test vs. Vulnerability Scan: What is the difference?
What is the difference between a penetration test and vulnerability scan, for cybersecurity? In the video below, Mike explains the main differentiators, including how a vulnerability scan is often part of a good penetration test. He also discusses how a…
The Best SASE SD-WAN Vendors: Secure Remote Access
The best SASE (Secure Access Service Edge), SD-WAN vendors all have this in common: Secure Remote Access. In the video below, Mike details the benefits that Secure Remote Access, delivers to companies, when included with a SASE SD-WAN solution. He…
Cloud PBX Checklist for Large Companies: Call Center
Mike continues his series on the ultimate cloud PBX shopping checklist for large companies, with today’s video covering call center. Mike explains the difference between ring groups, call center, and contact center, and tells you why it’s important for you…