How You Can Combat Call Center Scams

Posted by Jan Ritter on Nov 30, 2016 9:30:00 AM

Protect Yourself from Becoming a Victim of Fraud Calling

Fraud calling is more than an annoying and unwanted phone call at supper time. It has become an international multi-million dollar industry which the U.S. Department of Justice is working to fight.

Read More

Topics: VoIP, voip security

API 103: Voice and Messaging API Functions

Posted by Mike Woellert on Nov 23, 2016 9:30:00 AM

In our previous posts, we provided an introduction to APIs and discussed manynumber commandsand functions associated with communications APIs. In this post, we’ll outline some basic voice and messaging API commands. Using these commands, you can set up or change voice and messaging configuration for the numbers on your account.

Read More

Topics: VoIP, VoIP Business Service, API

API 102: API Number Command Functionality

Posted by Mike Woellert on Nov 16, 2016 10:00:00 AM

In our last post, we discussed what an API is and defined parameters. In this post, we’ll look at the different functions of a powerful API and what they are able to accomplish. APIs are evolving from a competitive advantage to a business requirement. With a good API, the commands perform tasks allowing you to be more productive and action on real-time information that’s available at your fingertips, like who’s on your website and where people are in relation to your location.

Communications enabling APIs programmatically perform tasks that have historically been manual, such as ordering and provisioning of numbers and associated services. Let’s explore some functions of communications enabling API groups.

Read More

Topics: VoIP Business Service, VoIP Service Carriers, API

API 101: Introduction to APIs

Posted by Mike Woellert on Nov 2, 2016 9:30:00 AM

You may have heard the term API, but are unsure exactly what it means or more importantly, what it is. Even if you don’t know what an API is, chances are that you have interacted with an API at some point via the Internet or your mobile device. This will be the first in a series of posts where we discuss what APIs are, specifically communications APIs, what purpose they serve and the different types of functions that they can accomplish. Welcome to your API crash course…let’s jump right in.

Read More

Topics: VoIP, VoIP Business Service, Integrated VoIP Services, API

Enhancing Interoffice Dialogue with UCaaS

Posted by William Balvanz on Oct 26, 2016 9:30:00 AM

Despite the constant barrage of emails you receive on a daily basis, businesses still need telephones. The ability to provide instant contact with a human voice in a two-way manner that telephones offer is still unbeatable by other communication forms.

As phone systems evolve, more and more features become part of the package. How does a small to medium sized business fully utilize these Unified Communications features in a way that facilitates inter office communication to increase productivity and efficiency? Let’s explore some of the UC features and what they can do for your business and your customers.

Read More

Topics: VoIP, hosted voip providers, Unified Communications, UCaaS

These Functionalities Should Be Top Priorities When Implementing UCaaS

Posted by Mike Woellert on Oct 19, 2016 9:30:00 AM

The Unified Communications as a Service (UCaaS) market is projected to explode and be worth nearly $29 billion by 2021. Businesses are moving their communications from traditional telecommunications services to VoIP and cloud-based Unified Communications (UC) solutions. As businesses make the transition, it’s important to understand what functionality is needed and which should be prioritized. Implementing IP communications from legacy telecom is compelling, so here are the four functionalities that should be considered for first roll out in a UCaaS implementation.

Read More

Topics: VoIP, Unified Communications, UCaaS

Time To Consider Dropping VPN for Session Border Controllers

Posted by Mike Woellert on Oct 12, 2016 9:00:00 AM

“How do I access the VPN? I’m working from home this week.” Sound familiar? Until recently, the only way to access enterprise networks remotely was through a Virtual Private Network (VPN). With the evolution of VoIP and Unified Communications, traffic is SIP-based and session border controllers (SBC) are replacing VPNs as the ideal way to provide secure communications. Here’s why.

 

Read More

Topics: VoIP, VoIP Business Service, Unified Communications, SIP Trunking, Session Border Controllers

SIP Trunking: Implementation Considerations

Posted by Mike Woellert on Oct 5, 2016 9:30:00 AM

In a recent post, we discussed what SIP trunking is and what it can do for your business. In this post, we’re going to look at what you need to consider when implementing this product. What do you need to know to ensure a smooth integration and what can you expect? We’ll provide an overview of the basics of SIP implementation in a practical way.

 

Read More

Topics: VoIP, hosted voip providers, VoIP Business Service, SIP Trunking

The Myths About Working Remote

Posted by William Balvanz on Sep 26, 2016 9:30:00 AM

Some companies, typically larger ones such as IBM and State Farm, have moved some of their workforce off of the central work sites, either by having employees work from home or by placing them in co-working spaces, such as collaboration rooms. This is becoming a more attractive option for small and medium businesses who can use cloud-based technologies to expand their footprint and allow workers to utilize different surroundings.

Read More

Topics: VoIP, Unified Communications

Two-Factor Authentication: Increasing Information Security

Posted by Mike Woellert on Sep 21, 2016 9:00:00 AM

Information security is on everyone’s mind, from the IT manager of a large business to the individual that manages life online and through mobile devices. However, information is only as secure as the passwords you’ve used to protect it. Data breaches in this connected world seem to start at the same place: passwords. They are still guessable and hacker’s tools have advanced, whether it’s a key logger or malware that’s been unknowingly installed on your network, machine or device.

Read More

Topics: VoIP, VoIP Service Carriers, voip security