Blog

Cybersecurity Risk Assessment Common Findings: Asset Inventory and Control

When you’re performing a cybersecurity risk assessment for your company, what are some of the most common findings, pertaining to asset inventory and control? In the video below, Mike explains that lack of inventory is the obvious one here, but

Read more ›

Cloud PBX Checklist for Large Companies: Remote Users

Continuing our cloud PBX shopping checklist for large companies, today Mike discusses Remote Users. In the video below, Mike gives you several items to address, which will help you assess your company’s PBX requirements for remote users. Want Mike’s recommendations

Read more ›

Which cloud call center software providers are HIPAA compliant? MFA & Metadata Recording

Which cloud call center software providers are HIPAA compliant, and what does that mean? Let’s talk about Multi-Factor Authentication (MFA), and Metadata Recording. In the video below, Mike addresses two items that might not be included with all “HIPAA compliant”

Read more ›

Cloud PBX Checklist for Large Companies: Network Footprint

This is the first installment of the Cloud PBX Checklist for Large Companies, and today Mike is talking Network Footprint. In the video below, Mike tells you the questions you need to ask internally (and of service providers), about “network

Read more ›

Microsoft Teams Phone System: Operator Connect vs. Direct Routing as a Service

What is the difference between Operator Connect and Direct Routing as a Service, for Microsoft Teams Phone System? In the video below, Mike explains the key differentiators you need to know, when you are evaluating Teams Phone System, to replace

Read more ›

Penetration Testing Services Comparison: What is Physical Security pen testing methodology?

What is physical security penetration testing methodology? In the video below, Mike continues his video series, comparing pen testing services, by explaining physical security penetration testing, and contrasting it to the other three types. Want Mike’s recommendations on which pen

Read more ›

Penetration Testing Services Comparison: What is Social Engineering Pen Testing Methodology?

What is “social engineering” penetration testing methodology? In his latest video, Mike continues his series on comparing penetration testing services, by explaining social engineering methodology. He defines this pen testing method and gives several examples of what vendors can do

Read more ›

Penetration Testing Services Comparison: What is Internal Penetration Testing?

What is “Internal” Penetration Testing? In the video below, Mike continues his video series on penetration testing services comparisons, and defines Internal Penetration testing. He also compares it to the other types (i.e. external pen testing, social engineering, and physical

Read more ›

Penetration Testing Services Comparison: What is an External Pen Test?

What is an external pen test? In the video below, Mike continues his video series on penetration testing services comparisons… this time explaining an external pen test, and how it compares to the other 3 types. Want Mike’s recommendations on

Read more ›

Which Cloud PBX providers integrate with Salesforce?

Which Cloud PBX providers integrate with Salesforce? In the video below, Mike explains that an even better question is “what features should “integration” include?” He details those critical features, and tells you why they’re important. Want Mike’s recommendations on the

Read more ›