Are you experiencing dropped calls or missing calls that people insist they’ve made to you? Tune in to our latest episode of Technology Simplified to uncover potential reasons behind these issues. In this episode Will Slappey, CEO of IT Voice, and resident telecom expert, James Lansford, explore the dynamic landscape of telecom regulations. In this episode, we unravel the FCC’s role in combating spam calls and the industry’s transition to self-regulation.
(more…)Category: Uncategorized
-
Life is a Dance at The Texas Bankers Association Annual Convention
Life is a Dance at The Texas Bankers Association Annual Convention at the Kalahari Resort in Round Rock. It was great seeing the bankers, clients, partners, the TBA, and John Michael Montgomery!
(more…) -
The Log4J JINDl Attack
As you know the Log4Shell/ Log4J event has been on the cybersecurity radar for the past 7 days. Overall, to the cyber landscape, this is a massive event. HOWEVER, networks in which no services are hosted for external (consumer, enterprise logins or large employee access), the risk is low.
(more…) -
Ransomware Preparedness
Ransomware has significantly evolved over the years. There have been many high-profile cases that have been reported in the news recently but also there are many that are not well known. A plethora of small businesses have fallen victim to ransomware attacks as well as industrial companies that rely on SCADA (software and hardware for industrial companies) networks.
(more…) -
Four Key Components of a Robust Security Plan Every SMB Must Know
Four Key Components of a Robust Security Plan Every SMB Must KnowMost businesses are now technology dependent. This means security concerns aren’t just worrisome to large corporate enterprises anymore, but also the neighborhood sandwich shop, the main street tax advisor, and the local non-profit. Regardless of size or type, practically any organization has valuable digital assets and data that should not be breached under any circumstances.This makes it the responsibility of every business, especially those collecting and storing customer/client information, to implement a multipronged approach to safeguard such information.Yes, we’re looking at you, Mr. Pizza Shop Owner who has our names, addresses, phone numbers, and credit card information stored to make future ordering easier and hassle free.Today’s SMB Needs a Robust Security Plan
Protecting your business and its reputation comes down to developing, implementing, and monitoring a robust security plan that adequately addresses everything from physical access and theft to the threat of compromised technology security. This involves defining and outlining acceptable uses of your network and business resources to deter inappropriate use. Here are four key components to consider.Network Security Policy : Limitations must be defined when it comes to acceptable use of the network. Passwords should be strong, frequently updated, and never shared. Policies regarding the installation and use of external software must be communicated.Lastly, if personal devices such as laptops, tablets, or smartphones are accessing the network, they should be configured to do it safely, which can be done easily with a reliable Mobile Device Management (MDM) solution.Communications Policy : Use of company email and Internet resources must be outlined for legal and security reasons. Restricting data transfers and setting requirements for the sharing or transfer of digital files within and outside of the network is recommended. Specific guidelines regarding personal Internet use, social media, and instant messaging should also be clearly outlined. If the company reserves the right to monitor all communication sent through the network, or any information stored on company-owed systems, it must be stated herePrivacy Policy : Restrictions should be set on the distribution of proprietary company information or the copying of data.Inappropriate Use : Obviously, any use of the network or company-owned system or device to distribute viruses, hack systems, or engage in criminal activity must be prohibited with the consequences clearly noted. Any website that employees cannot visit should be identified if not altogether blocked and restricted. For instance, downloading an entire season of True Blood from a Bit Torrent site isn’t an acceptable use of company Internet resources.Every employee must know these policies and understand the business and legal implications behind them. Companies must also make sure these policies are clear and understood by all, and most importantly, strictly enforced.Contact us at Slappey Communications
-
IS YOUR COMMUNICATION TECHNOLOGY MILLENNIAL READY?
With Millennials making up the largest cross-section of the working world these days, and many younger Millennials coming of age right now, expectations for technology and quality service have taken a big turn in recent years. Some companies have taken the time to survey the newest communication technologies for business purposes to determine what Millennials want most when it comes to communications. Now it’s up to you to take advantage of this information and do your very best to keep your customers happy.
NO MORE WAITING
If there’s one thing that really irritates the Millennial generation, it is having to wait on hold for customer service. Waiting on hold generally means not getting other things taken care of, and we are all too busy to be sitting around waiting for answers anyway. Instead, more than 40% of Millennials say they would rather text than wait on hold, and of the companies that currently use text for customer service, more than 80% of their texts are opened within 3 minutes of delivery. Even if it is only automated responses, such as account balances or simple directions, customers love having the option to get instant answers.
LIVE CHAT IS WINNING
Since 2010, companies have also seen a drastic change in the way customers rely on live chat. Currently, 26% of all customer service is handled through web chat applications, and 57% of customers report that this is one feature they are definitely looking for on your website when they need help. Live chat support currently has more than a 70% positive experience rating, as compared to a 40% positive score for phone calls.
BEING SOCIAL
Millennials are the most social generation ever. We know that Millennials make many of their most important purchasing decisions based on their social interactions with friends and how those purchases will appear online. We also know that Millennials spend the vast majority of the time on their phones using social media sites rather than making phone calls. The good news is that most chat and social media tools are compatible with phone technology for business already, and these sites provide a handful of useful tools for customer relations.
So why is all of this so important to your business? Because more than 40% of Millennials are willing to abandon a transaction if they are unable to get quick responses to their questions. Having communication technology for business in place and ready to take on this “instant results” mindset is imperative to keeping the loyalty and trust of your customers. Millennials are happy to have plenty of options as long as those options are efficient and effective.
-
4 BENEFITS OF UPGRADING YOUR BUSINESS TELEPHONE
Upgrading your business phone system is a great way to overhaul your customer service experience and provide a better infrastructure to all of your employees. By making the jump to modern phone technology for business, you can integrate text and chat-based customer support and make your operation more efficient overall. Here are just a few of the ways you stand to gain from a phone system upgrade:
MORE COST-EFFECTIVE
If you have been relying on traditional landline phone technology for business all this time, you are probably paying a premium for every phone call you make. It is estimated that every telephone contact made with a customer costs an average of $9 to your company. By contrast, chat contacts cost only $5, email costs roughly $2.50, and a simple FAQ page on your website costs only 10 cents. Upgrading your phone system will allow you to take advantage of these alternate streams of contact, saving you money on each and every customer.
INCREASE CUSTOMER RETENTION
Typically, when a customer is calling your business, it is because they have a problem. The longer they sit on hold, the more irate they become and the harder it is to salvage their business. In fact, it takes as many as twelve positive experiences to make up for a single negative experience. By using today’s phone technology for business, you can drastically reduce wait times, make it easier for customers to get problems resolved immediately, and mitigate the damage from from a negative experience.
BOOST REVENUE
Overall, as many as 55% of consumers say they are willing to pay more for great customer service. Companies who are proactive about customer service have been shown to earn more than twice as much in revenue each year compared to companies who are not actively improving their customer service experience. A phone system upgrade is just one of the ways you can provide greater value to consumers and assure them that you are available when they need you, not just over the phone but online as well.
EASIER TROUBLESHOOTING
One of the greatest advancements in phone technology for business is the integration of Customer Relationship Management (CRM) software. Your employees will have a far better ability to solve problems when your computer software is handling all of the heavy lifting. Cross-departmental support will allow your agents to see detailed information about account histories, current statuses, and more without having to transfer customers all over the office.
Your company’s phones are not just simple devices any longer; now they are a portal to your customer’s every need. It is your job to make sure that your technology can keep up with their expectations. Fortunately, companies who make an effort to upgrade their phones with the customer in mind see amazing returns in both revenue and customer retention while also improving their employee workflow.
-
BYOD=Bring your own disaster?
BYOD=Bring your own disaster?
Workplaces today have changed. They extend beyond the working hours, beyond the cubicles. Whether you are commuting to work or even vacationing, chances are you or your employees take a break from the break to reply to those important emails that require ‘immediate action’. Plus, there may even be employees who are not even on the same continent as you. What does all this mean for your business in terms of IT security? Does BYOD translate to bring your own disaster to work? This blog explores the risks of BYOD culture and offers tips on how you can avoid them.
When you adopt a BYOD culture at your business, you are opening the virtual floodgates to all kind of malwares and phishing attacks. Your employee may be storing work-related data on their personal devices and then clicking a malicious link they received on their personal email or (even whatsapp in case of tablets or smartphones) and put your entire network at risk. Secondly, you cannot control how your employees use their personal devices. They may connect to unauthorized networks, download unauthorized software programs, use outdated antivirus programs etc,. Even something as simple and harmless as the free wifi at the mall can spell danger for your data.
What you can do?
First of all, if you have decided to adopt the BYOD culture in your organization, ensure you have a strong BYOD policy in place. It should cover the dos and don’ts and define boundaries and responsibilities related to the BYOD environment.
It also makes sense for you to invest in strong antivirus software and mandate those employees following the BYOD model to install it. You can also conduct device audits to ensure your employee’s personal devices are up-to-date in terms of software, security and firewall requirements to the extent that they are safe to be used for work purpose.
And one of the most important aspects–train your employees on the best practices related to basic data security, access and BYOD environments. This will ensure that they don’t make mistakes that prove costly to you. You can conduct mock drills, tests and certifications and provide the BYOD privilege to only those who clear your tests. You could also use positive and negative reinforcements to ensure everyone takes it seriously.
BYOD is great in terms of the flexibility it lends to both–the employer and the employee, and the trend is here to stay. It is up to businesses to ensure it helps more than it can hurt. -
VISUALIZING THE SLAPPEY PLEDGE: HAVE FUN [VIDEO]
I WILL HAVE FUN. I will use creativity to make the work we do fun and interesting. I will use fun to help others learn more, be more productive, and live healthier lives. I will not take myself too seriously; instead, I will smile and promote an abundant life.
WATCH THE VIDEO HERE:
A litmus test is a quick indicator that gives you insight into a situation, and having fun is one of the most important litmus tests that we have. It tells us if we are operating in confidence or out of fear. It is impossible to have fun and live in fear at the same time.
The beautiful thing is that fear is a choice. It is not driven by our circumstances, but rather by the perspective we choose to have about our circumstances (which is why many billionaires are miserable and people in African tribes can be happy). It means that our priorities are in order and we are enjoying what we are doing.
In the spring of 1996 I was faced with the choice between fear and fun. I was up to bat in the last inning and the score was tied 8 to 8. The first two pitches, I choose fear. I feared missing the pitch; I feared grounding out; I feared looking stupid in front of my friends. I watched as two decent pitches flew by me.
Somewhere between the second and third pitch, I made a choice.
I chose to stop worrying about the potential bad options and instead made the conscious decision to enjoy the game and try my best despite what happened. On the third pitch I swung and made an awful hit. To my luck, the second basement missed the ball and we won the game, but I will never forget that bridge that I crossed. Even if we had lost the game, I would have gone home knowing I did my best and had fun. I’m glad I chose fun over fear.
A baseball game, although a huge deal for a 10-year-old, is minor compared to what many of us deal with each day. But when we are able to trust God has things under control, it is amazing how much fun we can have.
If you are struggling with having fun, that’s okay—use that indicator as an opportunity to adjust your perspective. Perhaps talking with someone else may help you readjust back to a healthy state. If you are having fun, stay aware of those around you who are not and find ways to share your joy with them.
-
3 Things to consider before you sign-up with a cloud services provider
3 Things to consider before you sign-up with a cloud services provider
More and more SMBs are migrating to the cloud and that is not a surprise considering the numerous benefits the cloud can offer them. For a SMB, the cloud is a cost efficient and secure answer to their growing data needs and IT security requirements. The cloud grows with them and lets them scale their business without worrying about a corresponding rise in IT costs. Plus, with the cloud, the important aspects of security and backups are mostly taken care of by the cloud service provider. And then, there’s the convenience of any-time-anywhere data access. With all these benefits that the cloud brings, what’s there to think about before signing up with a cloud service provider? While are a lot of benefits of storing your data on the cloud, but your data is still yours, so there are a few things you need to know and be comfortable with before you jump onto the cloud.Data storage location
Ask your cloud services provider where, (as in the location of the data center) your data will be stored. Ask them if they have multiple data centers and if yes, then, will they be backing up your data and storing them at different places. It is great if your cloud services provider does that, since that ensures higher safety of your data.How secure will your data be?
Yes. When you hire a cloud services provider, a major chunk of your data’s security responsibility is passed onto them. You don’t have to really worry about your data security, but, you still need to know how they plan to keep your data safe. Ask your cloud services provider for details regarding their data security procedure. Have them share all policies, SOPs and data security frameworks that they claim to have in place.Past performance/data loss history
Everyone talks about their best projects in a sales meeting. What you really need to know are the worst ones. Ask your cloud services provider to share with you their data loss/downtime trends for the past one year. Observe the trend. How often does their system give way and how long does it last? This is important for you to understand, because this metric translates into loss of business for you.
And finally, don’t forget to ask for a client list. Like we said before, everyone highlights the good things about themselves in a sales meeting. If you really want to know how good your cloud service provider is, ask them for a client list–both current and past. Check how many of them are from your industry vertical. Try reaching out to those who are willing to talk. Find out what they like the most about your cloud service provider and what aspects they find negative. Find out why their former customers left them. Usually customers are pretty good indicators of the quality of service a business provides. Hope these tips help you finding a cloud service provider who fits in well with your needs.







