Robocalls – The Good & the Bad

September 9, 2020
Author: Nayana Reddy | Network Telephony Engineer Have you received a call today where someone is trying to sell you an extended car warranty on your 10- year-old car or an agency trying to give you a last courtesy call on your deferred student loan payment/tax payment that you never owed, or any calls that […]

Using Empathy to Drive Business Intelligence

August 26, 2020
Author: Afraa Jasim | Business Analyst Data conscious companies are becoming more common in today’s ever changing world. Data integrity, Data Warehouse, and Data Governance all work towards gathering, cleansing, and modeling data for use. Business Intelligence (BI) comes into play after the data has been gathered and organized. BI is the art of extracting […]

VoIP Communications Services – A Cloud Above the Rest

August 20, 2020
Author: Dino Dziljaj | Manager, Activations Engineering As business leaders navigate through the COVID-19 pandemic, they are learning a variety of new processes, systems and approaches to keep their businesses as normal and stable as possible. This ranges from managing and supporting employees working remotely to the bandwidth and security of their infrastructure. For some, […]

How Data Stewardship and Data Governance Fit Together

August 12, 2020
Author: Amit Bhatnagar | Senior Solutions Architect Companies are getting serious about managing the availability, usability, integrity, and security of the data in their enterprise systems, including improving data quality, understanding the meaning of the data, and leveraging the data for competitive advantage. Managing data requires accountability. The formal need for business units to take […]

When Scanning Just Isn’t Enough: Why All Businesses Need a Full-Scope Pen Test

August 5, 2020
Author: Evan Branstner | Security Engineer Many companies confuse the important but separate roles that vulnerability scanning and penetration testing play in their security posture. Some companies, especially in the PCI compliance world, rely too heavily on automated scanning. However, vuln scanning is still a requirement for anyone as even the best pen test will […]
1 2 3 35