How to Use Call Detail Records to Detect Fraud

How to Use Call Detail Records to Detect Fraud

If you’ve ever checked your phone’s call history to see when someone last rang, you’ve probably seen information such as the caller’s name, the call time, and the call duration. These are just a few of the fields that phone services capture in call detail records (CDRs). Complete call detail records store much more data, such as the route the call traveled, which device it came from, and any errors encountered during the call. This…

Read More

Setting Up Your Network Security? Avoid These 4 Mistakes

Setting Up Your Network Security? Avoid These 4 Mistakes

Before you go and spend a ton of money on some “next-gen” network security solution, make sure you have the fundamentals locked down. Nearly one-third of businesses suffered a data breach in the last year, many of which were caused by common mistakes like: Weak passwords. Outdated software. Poor training. Excessive privileges. If you can avoid these mistakes, you make your organization a much less enticing target for hackers. In this post, we’ll walk through…

Read More

How to Use a Conference Bridge to Run a Smooth Meeting

How to Use a Conference Bridge to Run a Smooth Meeting

A conference bridge is a perfect solution for businesses that need to convene a lot of people on the same call. Most modern phone systems can set up this type of call with very little effort. Participants dial a single phone number from anywhere worldwide to join your conference bridge. These calls can be secured with conference ID code that prevents unauthorized people from joining. Even if you have never set up a conference bridge…

Read More