Call Centers: Get CPaaS in Your Corner

Posted by Natalie DeCario on August 6, 2018 at 6:00 AM

These days, call centers have no shortage of tools to put to work to get the most out of everyday operations. From analytics platforms to chatbots and even text messaging platforms, the tools that provide call centers with great new advantages abound. One new tool that's changing the way call centers operate is Communications Platform as a Service (CPaaS).

Read More

Tags: Cyber Security, APIs, cpaas

Introducing an Extended DID Inventory!

Posted by Cody M. Ferenchak on April 18, 2017 at 9:42 AM

We are introducing hundreds of thousands of DIDs within our extended inventory! Haven’t been able to purchase that number you’ve been looking for? Don’t be sad; we’re now able to open the door that leads to our “back room” where those DIDs you’ve been looking for may be hiding! Through our fully redundant BackOffice platform, you will now be able to choose DIDs from areas you may not have had access to before.

Read More

Tags: Back Office, DID, Cyber Security, VI News

Cyber Monday: Our Top Blogs on Cyber Security

Posted by Allison Boccamazzo on November 28, 2016 at 8:46 AM

It’s the most wonderful time of the year…before the gift wrapping, ornament hanging, and tree trimming. Once again, we’re approaching Cyber Monday. This day is the holy grail of the holiday shopping season, and it’s also a holiday of sorts for cyber criminals. Widely touted as “hacker heaven,” Cyber Monday can pose some serious threats to consumers and businesses alike if necessary precautions aren’t taken.

Read More

Tags: Telecom, Cyber Security

3 Terrifying Ways That Network Security Affects Business

Posted by Allison Boccamazzo on October 31, 2016 at 9:07 AM

Network security (or lack thereof) is no light matter. If you ask us, the risks of network vulnerability and exposure are far more frightening than any monster you’d see on Halloween night.

Read More

Tags: Telecom, Cyber Security

Exploring the Deadly Rise of Extortion Hacking

Posted by Allison Boccamazzo on June 7, 2016 at 9:30 AM

It’s no surprise that the act of hacking has grown increasingly sophisticated over the years. Today, there are multiple advanced forms of hacking (i.e. jailbreaking, chip and pin hacks, IoT botnets) but perhaps one of today’s most innovative forms of hacking is extortion hacking, or cyber extortion.

Read More

Tags: VoIP, Cyber Security

Jailbreaking: What It Is and How It Can Affect Your Business

Posted by Allison Boccamazzo on June 1, 2016 at 9:30 AM

At the consumer-level, jailbreaking— the process of gaining root access to a mobile device’s core operating system—offers some unique benefits. For example, users can strip their device of its original manufacturer restrictions in order to install third-party applications that may be unavailable in the app store.

Read More

Tags: Cyber Security, Jailbreaking, Entrepreneurship

Cyber Insurance is Finally Gaining Traction

Posted by Allison Boccamazzo on May 24, 2016 at 9:30 AM

Today, cyber security has become a fact of life. It’s no longer an ambiguous concept or a trendy buzzword but rather a very real (and exponentially costly) threat to organizations across the board. In fact, according to IBM’s 10th annual “Cost of Data Breach Study,” the average total cost of a data breach reached an all-time high of $3.8 million in 2015—a 23 percent increase from 2013.

Read More

Tags: VoIP, Cyber Security

Four Ways Hackers Are Attacking in 2016

Posted by Allison Boccamazzo on May 16, 2016 at 9:30 AM

Today, hacking has an entirely different meaning than it did 20, 15, or even 10 years ago. Today’s criminals, for example, may launch an attack as a form of protest or as a way to blackmail an organization into paying them money.

Read More

Tags: VoIP, Cyber Security

Top Four Cyber Security Threats Every Organization Must Consider

Posted by Allison Boccamazzo on May 10, 2016 at 8:44 AM

In today’s advanced, digital world, cyber security has become a top-of-mind concern for business leaders across virtually every industry. It’s understandable why; due to the proliferation of the Internet of Things (IoT)—industry pundits predict that the IoT will consist of over 34 billion connected devices by 2020—the number of cyber security threats are greater than ever, and they’re only growing more innovative in nature.

Read More

Tags: Cyber Security, Entrepreneurship

6 Common Ways to Suffer a VoIP Attack

Posted by Cherie L. Steffen on February 3, 2015 at 9:45 AM

As Halloween season is far behind us, we don't mean to scare you. But we do mean to keep you on your toes and aware as possible. So beware--VoIP networks are vulnerable to many forms of common network attacks and devices that support these infrastructures are also vulnerable to similar issues. So go ahead and grab someone you feel safe with and turn on all the lights; this can get scary as we present to you the 6 most common ways to suffer a VoIP attack. 

Read More

Tags: VoIP, Cyber Security

New Call-to-action
Back to Blog Home >>

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all