Mike Smith's Brain

Cybersecurity Risk Assessment Common Findings: Continuous Vulnerability Management

What are the most common findings of a cybersecurity risk assessment, within the CIS Framework, Control 7: Continuous Vulnerability Management In this video, I explain the 3 most common findings within this control: 1. Continuous Monitoring; 2. Automatic analysis; and

Read more ›

The Best Cloud Call Center Software: Don’t Duplicate Old Tech

If your company is looking for the best call center software, the first thing you need to think about is avoiding duplicating your company’s current, old technology. In this video, I will explain why using your current tech, as a

Read more ›

Microsoft Teams Phone System – The Ideal Fit

Are you interested in Microsoft Teams Phone System but you’re not sure your company is an ideal fit? In this video, I talk about why the ideal fit for Teams Phone is a large company with an E5 license, high

Read more ›

Is SD-WAN secure?

Is SD-WAN secure? Is it more secure than other wide area network technologies, such as MPLS? In the video below, I explain that SD-WAN actually has nothing to do with security. But don’t fear! I also explain ways your company

Read more ›

Cloud Phone System Checklist for Large Companies: Free Proof of Concept

A free “proof of concept” (PoC), should be on your large company’s checklist, when shopping for a new cloud phone system. In the video below, I explain what a free PoC is, the parameters, and the benefits to your company.

Read more ›

What is a Virtual CISO?

What is a Virtual Chief Information Security Officer (vCISO)? In the video below, Mike details the attributes of a good Virtual CISO, and also tells you the various services that they offer. He also compares this to other cybersecurity services,

Read more ›

The Best Call Center Software with Built-In CRM

You’re looking for the best cloud call center software for your company, but you need it to come with a built-in CRM to disposition calls. Does that exist? In the video below, Mike explains the features you can expect to

Read more ›

Cloud Phone System Checklist for Large Companies: Security & Compliance

You work for a large company, that is in the market for a secure and compliant cloud phone system. But security and compliance are defined differently by the various cloud PBX vendors out there. But not to fear! In the

Read more ›

Managed Detection and Response Providers Comparison: Endpoint Tools

Your company is comparing Managed Detection and Response (MDR) providers for cybersecurity. But what if your company already owns some of it’s own tools, such as Microsoft Defender for Endpoint, Crowdstrike, or Carbon Black? In the video below, Mike explains

Read more ›

The Best Call Center Software with HubSpot, Salesforce or other CRM Integration: Screen POPs

Your company is in the market for a call center software, that integrates with your CRM, such as HubSpot or Salesforce. But what are “Screen POPs” and how do you know which solution is the best? In the video below,

Read more ›