Blog

Cloud PBX Checklist for Large Companies: Contracts

This next installment of the ultimate cloud PBX shopping checklist for large companies, addresses possible snags with your existing contracts. In the video below, Mike explains why it’s important to check your current vendors’ contract status before spending a lot

Read more ›

Cybersecurity Risk Assessment Common Findings: Software Inventory and Controls

What are the most common findings in a formal cybersecurity risk assessment, in regards to software inventory and controls? In the video below, Mike Smith explains how simply a lack of inventory is the obvious, yet most common finding, in

Read more ›

Microsoft Teams Phone System: Do you need an E5 license?

Does your company need a 365 E5 license, for Microsoft Teams Phone System? In the video below, Mike explains why your company doesn’t need an E5 license for Teams Phone System, (but might want to upgrade anyway), because sometimes the

Read more ›

Penetration Test vs. Vulnerability Scan: What is the difference?

What is the difference between a penetration test and vulnerability scan, for cybersecurity? In the video below, Mike explains the main differentiators, including how a vulnerability scan is often part of a good penetration test. He also discusses how a

Read more ›

The Best SASE SD-WAN Vendors: Secure Remote Access

The best SASE (Secure Access Service Edge), SD-WAN vendors all have this in common: Secure Remote Access. In the video below, Mike details the benefits that Secure Remote Access, delivers to companies, when included with a SASE SD-WAN solution. He

Read more ›

Cloud PBX Checklist for Large Companies: Call Center

Mike continues his series on the ultimate cloud PBX shopping checklist for large companies, with today’s video covering call center. Mike explains the difference between ring groups, call center, and contact center, and tells you why it’s important for you

Read more ›

Cybersecurity Risk Assessment Common Findings: Asset Inventory and Control

When you’re performing a cybersecurity risk assessment for your company, what are some of the most common findings, pertaining to asset inventory and control? In the video below, Mike explains that lack of inventory is the obvious one here, but

Read more ›

Cloud PBX Checklist for Large Companies: Remote Users

Continuing our cloud PBX shopping checklist for large companies, today Mike discusses Remote Users. In the video below, Mike gives you several items to address, which will help you assess your company’s PBX requirements for remote users. Want Mike’s recommendations

Read more ›

Which cloud call center software providers are HIPAA compliant? MFA & Metadata Recording

Which cloud call center software providers are HIPAA compliant, and what does that mean? Let’s talk about Multi-Factor Authentication (MFA), and Metadata Recording. In the video below, Mike addresses two items that might not be included with all “HIPAA compliant”

Read more ›

Cloud PBX Checklist for Large Companies: Network Footprint

This is the first installment of the Cloud PBX Checklist for Large Companies, and today Mike is talking Network Footprint. In the video below, Mike tells you the questions you need to ask internally (and of service providers), about “network

Read more ›