Security is a top-of-mind concern these days and for good reason. The costs of a data breach can be significant — and in some cases enormous. For example, the Target breach in 2013 ultimately ended up costing the company a cool $162 million. And who can forget the Epsilon breach back in 2011? The price tag for that incident? Four (cue Dr. Evil voice) BILLION dollars.Of course, most data breaches aren’t as staggeringly expensive as these notorious cases. However, all breaches are costly and can take several weeks, months, or even years to investigate and clean up. And we haven’t...

The good news is that more and more businesses, schools and government agencies are switching to a hosted VoIP phone system, so they can take advantage of key benefits like:Dramatic up-front and ongoing cost savingsSeamless scalability in both directionsTotal mobilityAdvanced calling featuresUnified communicationsBusiness continuityIntegration with other systems in the environment (e.g. CRM, billing, etc.)However, the bad news is that the popularity of VoIP phone systems has attracted the attention of hackers who are trying to steal private data and commit identity theft. Here are four major types of VoIP fraud:Call Transfer FraudCall transfer fraud happens when hackers break into a...

Subscribe to Our Newsletter

From inspiring stories, to breaking news, and everything between, you don’t want to miss out!