Quick Links to CCC...
Solutions
|
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.
|
NPS® Update
Current NPS®: 83.38% Surveys Completed: 815
Click here to learn more about Net Promoter Score. |
Trivia
Trivia Answer
"We've got a gorilla for sale... won't you buy him, take him home and try him... see in the window... full of charm and appeal, handsome, elegant, intelligent, sweet, he's really ideal."
ANSWER: Magilla Gorilla
WINNERS: Ann Lehman Marta Rinaldi Dan Kurkiewicz Jim Poull
______________ New Trivia We are sticking to TV Themes this month - good luck!
"Your friends will be there when your back is to the wall; you'll find you need us 'cause there's no one else to call... You better be ready to, be ready to jump..." |
|
|
|
Ask the Expert "Disabling a Mailbox in Voicemail Pro"
Yesenia Villagran, Project Manager
 By default, Voicemail Pro automatically creates a voicemail mailbox for each user and hunt group in the IP Office configuration. It is also defaulted to use voicemail to record a message if a user or hunt group call is not answered. There are a number of ways that use of voicemail to record messages can be disabled if it is not required for a particular user or hunt group. Read more...
|
Data is the Lifeblood of Any Business, Protect, Nurture, and Discover its Power
Juan Soto, Access Experts
This month's guest article comes from Juan Soto, Microsoft Access MVP and founder of IT Impact, Inc. Juan travels the U.S. speaking on the subject of data integrity, reporting, and security. His firm helps clients with custom database software and you can learn more by visiting their website at www.AccessExperts.net or Juan's blog for more tips: www.AccessExperts.net/blog.
What does your business produce? Is it a manufacturing plant pumping out goods? A security firm providing services? No matter what business you're in, you produce data as well: Customer lists, Invoices, Orders, Inventory, the list of data can go on forever. Have you ever stopped to consider how important your data is to your business? It's just as valuable as your customers, products, and employees, if not more. That's why it's important that you protect, nurture, and "Discover the power of your data™"
Read more...
|
Register for CCC Training "Safe Surfing: Browsing Best Practices"
Wednesday, August 1, 2012, 12:00pm-1:00pm CST
 The CCC Training Center is holding the next session in our 2012 training series on Wednesday, August 1, 2012 from 12pm-1pm CST. This course will be lead by CCC ConvergeSecure® Engineer, Grigore Marchis.
Everyone is invited to attend the live classroom session or the online webinar portion. This course is available free of charge to CCC customers with ConvergeAssure® Voice Managed Services (phone system maintenance), and ConvergeSecure® Managed Services (data, security, backup & recovery, data vaulting, and/or cloud services).
Course Overview
We will be focusing on the best practices that a user can follow to ensure that they are browsing the internet safely. We will start at the core, with the computer itself, and move outward toward the user's actions and the Internet. It will not focus so much on network security, but, instead, we will outline the steps a user should take as they browse the Internet to avoid falling for phishing scams, social engineering, and how to avoid malware. The session will also include tips for maintaining and updating PCs so that potential attacks have less of a chance of being effective.
Click here for course details and registration info...
|
Shake What Your Mama Gave You!
Kay Phelps, Avaya
What?!! Stick with me for a moment - it's relevant. A colleague used this subheading in an article he had written. Once I stopped laughing and read further, the point he was making was that often we already have much of what we need to deliver an exemplary customer experience. Rather than looking up at the mountain top, it's worth a quick glance back to see how far we've already climbed.
It's very likely this topic is applicable if your company is still considering using at-home agents, but hasn't actually launched the program. Yes, you, standing there listening to the music but not dancing yet. And it's also pertinent if you've sent a few agents home but months later are still barely swaying, frozen in the piloting-a-few-agents stage. In the May 2012 issue of Contact Center Pipeline, the front page article "Making Work-at-Home Work" states that 42% of contact centers are now using home agents. Seems like it's time to move with the music!
The good news is that you already have a boatload of what you need. You've already invested in the contact center infrastructure and applications, including routing, reporting, and recording solutions. There may be a few more things on your wish list, but chances are you already have most of what it takes. Likely your biggest remaining expenditure is remote agent softphone licenses and perhaps PCs and/or some cable or DSL costs if you choose to cover them. And these costs pale in comparison to the investments you've already made.
Read more...
|
Learn More About Mitel UC360
|
Learn More about ESI Personal Greeting Keys
|
It's no secret that Android malware is starting to run rampant on users' phones with no immediate signs of slowdown. And numerous reports indicate that the numbers continue to climb exponentially upward.
To give you a taste of what's lurking out there, the following link points to a list of mobile malware variants that the FortiGuard Labs team has uncovered.
And the reason mobile malware authors are enjoying an extended field day on Android is overwhelmingly attributed to the open nature of the platform. Google's Android has found its niche by providing an open forum that presents a logical antithesis to its Cupertino-based counterpart, known for locking down app development and distribution. However, while Android developers are allowed to flex their creative muscle and distribute apps that are often restricted from Apple's store, malware authors simultaneously enjoy the same kind of freedom.
That said, here are a few security tips, provided by Axelle Apvrille, Fortinet senior antivirus analyst and researcher, aimed at keeping your data safe while perusing the mobile Web.Read more... Threat Reports June 13-27, 2012Click here to learn more about Unified Threat Management solutions from CCC Technologies, Inc.
|
New Unitrends Release 6.3 features that operate on the Unitrends Enterprise Backup™ software-only virtual appliance platform for Hyper-V and VMware include:
- Smaller footprint. Unlike other data protection products, Unitrends all-in-one virtual appliances handles the details of storage administration. The minimum amount of metadata necessary to support a terabyte of raw backup space has been significantly reduced to a mere 27GB. Note that this will grow as more data is protected and/or more metadata is needed; an example is document management systems with millions of files per terabyte that will require more than this minimum.
- Smaller download size. The download size has been reduced from approximately 1.4GB to approximately 1GB for both the Hyper-V and VMware virtual appliances.
- Checksum-based download process. A new checksum-based download process is offered for all editions of Unitrends Enterprise Backup™.
- Support for tape archiving under VMware. Support for tape archiving (D2D2T, or Disk-to-Disk-to-Tape), which is a key feature on our Recovery-series of physical appliances, is now available for our VMware-based Unitrends Enterprise Backup™ product. (Note: This feature is not available on Windows 2008 R2 Hyper-V role or Hyper-V server at this time due to a lack of interface information being available in the Hyper-V hypervisor.)
Read more... Click here to learn about Backup & Recovery solutions from CCC Technologies, Inc.Click here to learn about onsite managed backup and offsite vaulting services from CCC Technologies, Inc.
|
10 Crazy IT Security Tricks That Actually Work
Network and endpoint security may not strike you as the first place to scratch an experimental itch. After all, protecting the company's systems and data should call into question any action that may introduce risk. But IT security threats constantly evolve, and sometimes you have to think outside the box to keep ahead of the more ingenious evildoers.
And sometimes you have to get a little crazy. Charles Babbage, the father of the modern computer, once said, "Propose to a man any principle, or an instrument, however admirable, and you will observe the whole effort is directed to find a difficulty, a defect, or an impossibility in it. If you speak to him of a machine for peeling a potato, he will pronounce it impossible: If you peel a potato with it before his eyes, he will declare it useless, because it will not slice a pineapple." The world of network security is no different. Offer a new means for IT defense, and expect to meet resistance. Yet, sometimes going against the wave of traditional thinking is the surest path to success. In that vein, we offer 10 security ideas that have been -- and in many cases still are -- shunned as too offbeat to work but that function quite effectively in helping secure the company's IT assets. The companies employing these methods don't care about arguing or placating the naysayers. They see the results and know these methods work, and they work well. Read more... |
|
|
|