Blog
Cybersecurity Risk Assessment Common Findings: Asset Inventory and Control
When you’re performing a cybersecurity risk assessment for your company, what are some of the most common findings, pertaining to asset inventory and control? In the video below, Mike explains that lack of inventory is the obvious one here, but…
Cloud PBX Checklist for Large Companies: Remote Users
Continuing our cloud PBX shopping checklist for large companies, today Mike discusses Remote Users. In the video below, Mike gives you several items to address, which will help you assess your company’s PBX requirements for remote users. Want Mike’s recommendations…
Which cloud call center software providers are HIPAA compliant? MFA & Metadata Recording
Which cloud call center software providers are HIPAA compliant, and what does that mean? Let’s talk about Multi-Factor Authentication (MFA), and Metadata Recording. In the video below, Mike addresses two items that might not be included with all “HIPAA compliant”…
Cloud PBX Checklist for Large Companies: Network Footprint
This is the first installment of the Cloud PBX Checklist for Large Companies, and today Mike is talking Network Footprint. In the video below, Mike tells you the questions you need to ask internally (and of service providers), about “network…
Microsoft Teams Phone System: Operator Connect vs. Direct Routing as a Service
What is the difference between Operator Connect and Direct Routing as a Service, for Microsoft Teams Phone System? In the video below, Mike explains the key differentiators you need to know, when you are evaluating Teams Phone System, to replace…
Penetration Testing Services Comparison: What is Physical Security pen testing methodology?
What is physical security penetration testing methodology? In the video below, Mike continues his video series, comparing pen testing services, by explaining physical security penetration testing, and contrasting it to the other three types. Want Mike’s recommendations on which pen…
Penetration Testing Services Comparison: What is Social Engineering Pen Testing Methodology?
What is “social engineering” penetration testing methodology? In his latest video, Mike continues his series on comparing penetration testing services, by explaining social engineering methodology. He defines this pen testing method and gives several examples of what vendors can do…
Penetration Testing Services Comparison: What is Internal Penetration Testing?
What is “Internal” Penetration Testing? In the video below, Mike continues his video series on penetration testing services comparisons, and defines Internal Penetration testing. He also compares it to the other types (i.e. external pen testing, social engineering, and physical…
Penetration Testing Services Comparison: What is an External Pen Test?
What is an external pen test? In the video below, Mike continues his video series on penetration testing services comparisons… this time explaining an external pen test, and how it compares to the other 3 types. Want Mike’s recommendations on…
Which Cloud PBX providers integrate with Salesforce?
Which Cloud PBX providers integrate with Salesforce? In the video below, Mike explains that an even better question is “what features should “integration” include?” He details those critical features, and tells you why they’re important. Want Mike’s recommendations on the…