by Chandler Millstone | Dec 8, 2023 | Articles
Seasonal Grinch Cake “It’s because I’m green, isn’t it?” “Holiday Hooby Whatty?” If you’re looking for a last-minute baked good this holiday, treat your family, friends or coworkers with this delightful cake. Each slice...
by Chandler Millstone | Nov 13, 2023 | Articles
Voice Security: is Multi-Factor Authentication (MFA) the Answer? Recent High-Profile Voice-Based Cyberattacks have increased attention on defending Voice as a Threat Vector. Many Cybersecurity Experts have turned to MFA as the answer. Is this the correct cyber...
by Chandler Millstone | Oct 16, 2023 | Articles, Cyber Incidents
MGM, Caesars Lawsuits Elevate Critical Need for “Reasonable” Voice Channel Cyber Defense More on the MGM / Caesars Cyberattacks EXECUTIVE SUMMARY Successful cyber-attacks on data-rich organizations like MGM continue to escalate at an alarming pace. So, too, is the...
by Chandler Millstone | Oct 2, 2023 | Articles, Cyber Incidents
Voice-Based Cyberattacks, why are they so effective? More on the MGM / Caesars Cyberattacks MGM Resorts and Caesars Entertainment are latest victims of Voice-Based Cyberattacks…why are sophisticated, security savvy organizations losing the cyber battle? Vishing is a...
by Chandler Millstone | Sep 11, 2023 | Articles, Cyber Incidents
Caller Authentication vs. Voice Traffic Filtering: Better Together? An examination of two different, yet uniquely synergetic, technologies that assure the highest level of voice call integrity and security in the contact center. Despite the growing popularity of text,...
by Chandler Millstone | Jul 19, 2023 | Articles, Cyber Incidents, Voice Spam
Executive Report Voice Network Threat Survey 2023 survey Background The cybersecurity landscape is one that is constantly morphing in ways that enterprises have but two choices: get up to par, or get left behind. In last year’s survey, we highlighted how nefarious and...
Recent Comments