If you think protecting your organization against the constant barrage of cyberattacks is already a Herculean task, that job got a whole lot harder thanks to the rapid increase in availability of Generative AI (GenAI) applications.
"It's because I'm green, isn't it?” "Holiday Hooby Whatty?" If you're looking for a last-minute baked good this holiday, treat your family, friends or coworkers with this delightful cake. Each slice ensures your baked good comes from the heart. Simply starting with a...
Recent High-Profile Voice-Based Cyberattacks have increased attention on defending Voice as a Threat Vector. Many Cybersecurity Experts have turned to MFA as the answer. Is this the correct cyber protection strategy?
Successful cyber-attacks on data-rich organizations like MGM continue to escalate at an alarming pace. So, too, is the frequency and price tag related to….
MGM Resorts and Caesars Entertainment are latest victims of Voice-Based Cyberattacks…why are sophisticated, security savvy organizations losing the cyber battle?
An examination of two different, yet uniquely synergetic, technologies that assure the highest level of voice call integrity and security in the contact center.
With over 300 responses from IT and Security industry experts, the second annual Voice Network Threat Survey was created to shine a light on the industry’s perception of a burgeoning threat vector – Voice
Mutare’s Marketing Manager Victoria Elliott speaks candidly about her experiences as the Survey field administrator for the 2023 Voice Network Threat Survey at each of the three live shows, RSA, Cisco Live and CCW.
Robocalls, voice spam, phone fraud, spoofers, and vishers (voice phishers) are inflicting significant damage on businesses through lost productivity, degraded customer experience (CX), missed sales opportunities, and cybersecurity threats.
There is a seismic shift underway in the Contact Center business model as organizations are accelerating the transition away from centralized, on-premise technical infrastructure to cloud-based platforms (CCaaS).
What is Vishing? Background, Definitions, High Profile Attacks & How to Protect the EnterpriseVoice Phishing (Vishing) is an escalating attack vector that highlights the dire need for awareness and protection for our most critical communication channel, the...
Who would have guessed that, in 2022, the humble phone would emerge as the weapon of choice for sophisticated cybercriminals through Vishing?
Enterprise Voice Network Security Myths Organizations are wide-open to cyber attacks via the voice channel largely because of misunderstandings and a lack of attention on this expanding threat vector. This Article has been crafted to educate business, IT and security...
The Voice Network Threat Survey reveals serious shortcomings in enterprise security protections against voice network attacks.This Report is intended to shine a light on one of the most universal infrastructure systems,…
The following is an expert of a Q&A with our CTO Roger Northrop that was on collaboration platforms expanding the threat surface and introduce new security vulnerabilities
The #1 priority for new IT spending in 2022: Cybersecurity. This should come as no great surprise considering the acceleration of cyber-threats, including numerous damaging attacks perpetrated on high-profile organizations over the past few years.
The emotional impact, economic fallout, and social disruption of this violent geo-political earthquake is likely to send shockwaves reverberating around the globe for weeks, months, maybe even years. And it has created the perfect environment for opportunistic cyber criminals to make their move.
In the third part of this series, we will take a closer look at real-time threats to the voice network and discuss how current events are rife with the things that all thieves wait for: opportunity.
In the second part of this series, we look specifically at the financial and operational impact of the ever-ubiquitous “nuisance” calls.
The first in a series of posts that attempts to make sense of the multi-dimensional role of risk in business as seen through the lens of the FAIR™ modeling system.
Still reeling from the effects of the Pandemic, Contact Centers are losing precious time, and money, while CSAT plummets and Cybersecurity Risk escalates.
With the disrupting force of an international pandemic, organizations and employees alike have been forced to reevaluate how to communicate in an altered landscape.
Mutare recently led a webinar for members of the AHA featuring key architects of the FCC’s Hospital Robocall Protection Group around actions healthcare organizations can take to protect themselves from the growing threat of robocalls.
In 1999, Mutare revolutionized enterprise voicemail, launching the first commercial application capable of delivering business system voicemail messages to employees through email.
How Financial Institutions are being targeted by sophisticated cybercriminals who are taking advantage of economic upheaval with a powerful weapon…the telephone.
When colleges and universities reopen their doors for on-campus learning this fall, it’s not just students who will be happy to greet their educators.
Mutare has built one of the greatest weapons of defense against the bad actors who have been targeting organizations with robocalls, spoof calls and vishing calls, known as the Mutare Voice Spam Filter.
Every month, billions of robocalls are placed. In this article, we will examine just how harmful they can be to Healthcare Communications.
Looking to add some color to your holiday dinner table? No matter what Thanksgiving looks like to you this year, try this easy and comforting purple sweet potato pie.
This article examines the roots of spam and also examines the shift of digital spam and related scam activity from email spam to voice.
In this article we examine the impact of Political Robocalls, and how some organizations are defending their voice networks from it.
by Chuck French on Aug 5, 2020
Enterprise Voice Traffic Analysis and Voice Spam Filter solutions can help you regain control over the security and integrity of their voice networks …..
by Chuck French on July 29, 2020
Tips to help you manage your remote workforce, reduce stress, and maximize the productivity-enhancing, unifying benefits of the new normal. …..
by Chuck French on July 22, 2020
Examine the impact of digital transformation on enterprise collaboration technologies and how to safely bring SMS text into your …..
by Chuck French on July 15, 2020
Advancements in communication tech has transformed the way people work. Learn tips on creating an effective device management policy for …..
by Chuck French on July 8, 2020
As business adapts to remote offices, so, too must attitudes about the virtual office. Like it or not, working from home on a global scale is here to stay…..
by Chuck French on June 24, 2020
This article provides an in-depth look at the hard impact and future implications of working from home for business operations nationwide resulting from…..
by Chuck French on April 28, 2020
If you use a telephone, there’s high probability you’ve been spoofed – that is, received a spoof call from a phone number that looks similar to your area…
by Chuck French on April 17, 2020
In December 2019, Senate passed the TRACED Act (Telephone Robocall Abuse Criminal…
By Richard Quattrocchi on 11/18/19
Over the past year, voice spam calls, particularly robocalls, have received a great deal of…
by Chuck French on 5/13/19
One of the guiding principles at Mutare is developing deep and long-term partnerships with…
By Roger Northrop on 3/11/19
Mutare CTO Roger Northrop discusses the importance of speech analytics for improving organizational…
Written by Richard Quattrocchi on 1/14/19
Robocalls are not just for your cell phone anymore and are targeting your enterprise…
by Chuck French on 1.13.19
I joined Mutare about a year ago. There were a lot of draws to joining the firm, but I couldn’t help…
Released on 4.23.18
I was at a conference where Mutare was promoting SAM as a superior alternative…