Month: September 2020


The Ultimate Guide to BYOD Security: Overcoming Challenges, Creating  Effective Policies, and Mitigating Risks to Maximize Benefits | Digital  Guardian

Tyler Ward of IGI, an award-winning cybersecurity organization specializing in services and software, joins us in this post to discuss the very real problem now magnified with the Work from Home (WFH) reality enterprises are facing today. WFH has introduced the real challenge of balancing employee productivity and access to resources with good cybersecurity hygiene. The challenge is amplified on many levels, a loose perimeter, larger Attack Surface, endpoint security, Data Protection, and many other realms compelling Leaders to think about a new Cybersecurity strategy, well beyond traditional tactical techniques.

Integrating BYOD—where employees access corporate data on untrusted, unknown devices to continue to be productive—means Data Privacy needs to be thoroughly re-evaluated, from policy to technical practice. Here we evaluate this real-world problem with solutions and guidance from the front lines where IGI fights the good fight every hour of every day.


Dominique: What challenges does BYOD & Data Privacy bring to Organizations?  Is this industry-specific?

Tyler: Bring Your Own Device (BYOD) is a not-so-new concept we are now looking at through a different lens. Fifteen years ago, when you brought your flip phone to work, things were rather simple and clear for the business. However, mobile devices are no longer a static and predictable object, rather they are a conduit for anything and everything and are constantly evolving. The devices of 2020 are mere portals into the wide world of technological creationism and can bring unwanted guests into the company. In the eyes of those who manage risk, this can be equated to leaving the front door open in our homes. We just don’t do it anymore.

Let’s look at a 2020 scenario: Someone is sitting in the conference room at a private board meeting for a public company, and the discussion is around stock pricing and a new merger. The chief revenue officer has their smartphone sitting on the table. The problem is this: we no longer know who may be activating that microphone, recording with their smartphone camera, or what kinds of malicious applications are running on that smartphone. Goodbye, flip phones. Hello, 2020 spy tools. This is the reality now, and we have to accept, mitigate, or transfer the risks.

On the side of privacy, we have privacy laws for different states, all 50 states have their own data breach notification laws, and we now have international regulations such as the GDPR (Europe), Data Protection Act (U.K.), LGPD (Brazil), and many more. Now, we couple these regulatory obligations with the fact that nearly all businesses are running global operations with customers everywhere and are sharing data with many other companies. The vast majority of businesses are out of compliance with some privacy or security regulation, and they don’t realize it (yet).

While different industries have their own governing set of privacy regulations such as HIPAA (Healthcare), privacy is touching nearly every single entity now. From sole proprietorships to multinational organizations, this is something that we all have to consider, assess, and act on.

Dominique: How do Policies map to and why do they matter for Data Privacy and BYOD?

Tyler: Policies are the guides for organizations and how they conduct operations. However, these are also significant catalysts for legal backing when the time comes to show good faith efforts to govern privacy and BYOD. One of the most significant impacts that I have personally witnessed was when a client was hit with a data breach, and their cyber insurance provider refused to pay because the company did not have a governing set of documentation surrounding information security. When companies apply for insurance policies, they must answer a series of questions. They will never see those questions again until they have a data breach in some cases. When they come back looking for evidence of those artifacts, they play a direct role in insurance payouts. This can be equated to not having an inspected vehicle and getting into an accident. Insurance companies may not be there to help in your time of need.

Dominique: What are the key considerations for Organizations when allowing Corporate Data on BYOD?  What is the ideal vs. practical guidance?

Tyler: Ideally, organizations should buy, own, and issue devices to each employee. Additionally, they should have a policy on how employees can use that device and what they cannot do—that is BYOD management in it’s simplest form. However, being a realist, I understand that this is not so economically feasible for some businesses. Therefore, we must determine how we will manage the data that the company owns on a device that the company does not own. Mobile Device Management (MDM) solutions are great at the containerization of data and sandboxing of applications. Still, we must also realize that those devices can be carriers for some, particularly malicious content. Be wary of allowing unowned or unmanaged devices connecting to the corporate networks and applications.

Dominique: What about data destruction?  Who has the right to destroy data, is it limited to just the corporate data or the entire data on the device, if the device ends up lost or posing a risk to the Org?

Tyler: In short, if the organization does not own the device, destroying data is a very nebulous area, to say the least. If they do not own the device, my recommendation is to get an MDM solution that containerizes the data and also have the employees sign a policy that grants the organization the right to destroy corporate data when required. If the organization does not own the device, then the destruction is limited to that of the data owned by the organization. We have many clients where employees lose their corporate and non-corporate devices. For both types of devices, you want to have the capability and policy-driven authorization to;

  1. Encrypt the contents of the device
  2. Set security policies on the device and data
  3. Remotely wipe the device or wipe all corporate data

Also, remember that if you implement an MDM solution on devices that are not owned by the organization, be very careful of GPS tracking. Tracking employee movements on their personal device is most certainly not a conversation that you want to have after the fact.

Dominique: What about control over the device becoming a surveillance device?  Are there good security practices around installing 3rd party apps, guidance on devices that are more “trustworthy” than others, etc.?

Tyler: As we talked about earlier, these devices are being used to surveil organizations daily. When we have no control over the devices and software installed, it would be naïve to think that the malicious parties could not leverage the microphones and cameras. We must gain control over the applications installed on corporate devices and also follow a process for how we approve applications. This should be predicated on performing security reviews. In trusting applications, we simply have to do our homework. Believe it or not, malicious applications make it into the Google Play Store and Apple App Store. We have to do the research prior and follow the criteria for authorization.

We recently learned about TikTok’s ability to do some tricks with the iPhone. As stewards of security, we must come together and recognize that there are people out there that have alternative motivations when creating applications and software. Data is a valuable commodity, and we have to recognize that we are bringing risks into our organizations and exercise vigilance.



JULY 22, 2020



We have transitioned into the age of the customer, where buyers have more choice and control in how they interact with brands than ever before. Today it’s all about the experience. Your customers demand real-time service, either via self-service or direct to an agent. They expect seamless service across channels, and they expect intelligent service, meaning you need to know who they are and have a basic understanding of their problem.

The reason Talkdesk exploded onto the CCaaS scene is because of their speed of innovation:

  • They were born in the cloud! They’re not trying to replace any old systems.
  • They’ve got native AI baked right into their platform.
  • They’ve built the first App Ecosystem for Contact Centers with Appconnect, allowing you to extend capabilities with a single click.
  • Their agile development rolls out new capabilities daily, instead of the traditional three releases a year. They’ve delivered over 600 features in the past 24 months. In fact, Talkdesk filed for 200 patents in the last 100 days of 2019.

Talkdesk has followed all of this up with rolling out twenty new products in the first twenty days of 2020! Because of all this, they have the most review and highest scores on all major review sites.


At the beginning of the pandemic, approximately five percent of the U.S. workforce was employed by contact centers. A study done in April found that in January 2020, forty-three percent of agents said they could work remotely if they needed to. Of course, that number increased drastically by the end of March, and it is expected to remain around sixty percent going forward. This means companies need to be prepared to continue supporting hundreds or thousands of agents to work remotely, with the same level of security and customer service. Supporting this requires having the right support and strategies in place to enable this new contact center model.

Some questions you should be asking your customers may include:

  • How do you ensure your agents are set up to take calls from home, with no impact to service quality?
  • With users now accessing your systems remotely, how do you ensure optimal security and compliance?
  • How do you ensure that your CX team’s communications tools continue to perform in a WFH environment?
  • How do we ensure that team members still have access to knowledge, without their peers sitting next to them?


Employbridge is a great customer that was brought to Talkdesk by a great Telarus Partner! The EmployBridge company mission is simple: find great jobs for great people. What started many years ago as a vision to connect job-seekers to the right employer for their skillset, has grown into a best-in-class stang enterprise. EmployBridge matches more than 400,000 employees in over 12,000 companies annually.

EmployBridge needed an agile contact center solution that could support high interaction volume and complement its culture of rapid innovation. Lagging technology and poor support from its first-generation cloud contact center provider were getting in the way of accomplishing their goals. EmployBridge chose Talkdesk for its continuous product innovation, deep integration to Microsoft Dynamics, and its unique flexibility to integrate with other key business applications–both now and in the future.

Their Talkdesk solution includes:

  • Talkdesk Agent Assist will be at the forefront of their customer satisfaction strategy. Giving agents real-time suggested actions and removing the burden of tedious data entry will allow them to stay focused on the customer, instead of worrying about the technology.
  • Integrations with Microsoft Dynamics and the EmployBridge knowledge base utilize AI-driven data to segment high-value interactions, route them to the best available agent, and present helpful information in real-time.

Since implementing Talkdesk:

  • 20% reduction in human-assisted contacts
  • Talkdesk Agent Assist will help drive higher CSAT, lower handle times and improved customer experience

Talkdesk’s mission is to end bad customer service for the world; they are here to help customers use CX as their competitive advantage!



AUGUST 31, 2020



Whether you’re a big enterprise business or a small shop, the way you interact with your customers is vital to your business success and customer loyalty. Find the right contact center solution for your needs.

Call Centers are a special breed. End-Users calling into a call center typically over-analyse everything that happens with their call and translate that over to the quality of the business it represents. So having a reliable, robust, and redundant solution should go without saying.

SIP Trunks are the current go-to for Call Centers Voice and Data Needs. Businesses typically have a 4/1 ratio because not everyone will be using the phones at the same time. Call centers are different because everyone might be using the phones at the same time and a 1to1 ratio is needed.


Work closely with an expert Network Engineer to ensure capable and reliable circuits are used.


Cost can shoot up even higher and thus, you will want to get a good rate locked in.


Some of the larger call centers are using millions of minutes per month. So negotiating a reasonable and affordable cost per minute.


Can you afford to let your call center go experience downtime? Make certain you are considering a Disaster Recovery plan.



APRIL 9, 2018


What is SD-WAN?

A wide are network (WAN) might be used to connect branch offices to a central corporate network, or to connect data centers separated by distance. In the past these WAN connections often used tech that required special proprietary hardware. The SD-WAN movement seeks to move more of the network control into the cloud using a software approach.

Offers Clients:

  • Cost reduction
  • Bandwidth management
  • Network flexibility
  • Centralized management


Sdwan demo


At a high-level, the image below shows what an SDN WAN looks like.  Instead of bringing in an MPLS network into a branch location, customers can bring in two diverse internet connections. One is delivered on a cable modem with 50 megs of bandwidth, and the secondary a 4G router. In an SDN environment, a router is placed on the edge to provide a couple of features:

  • Brings together the two connections
  • Load balancing
  • Proactive analysis of what is happening on that network
  • Creates the ability to do a VPN for office Internet connectivity to connect branches to headquarters
  • Because it is internet based, traffic that is destined for the internet can hop off right there

By application and by destination, this software can make intelligent routing decisions.  Thus, if you have traffic destined for Office 365, it will decide if the cable or the 4G path is best, based on who has the best peering and who is the closest. Voice and video can be prioritized whether is outgoing or incoming.  You can create a quality of service policy on both sides giving you end to end performance control that you would expect.  So yes, you can get the performance of an MPLS solution with an SDN WAN solution even though it’s over an internet connection. Internet service is readily available and very cost effective as opposed to MPLS environments.  The graphic from Freewire illustrates the flow:


The image below reflects data collected with some intentional testing. In this example environment, we see two internet sources with high latency detected on one of the links.  Seeing this, the application reroutes the traffic across the secondary link, and it doesn’t skip a beat. As things change over time, the traffic comes back and becomes more normal, and switches back and forth across the two solutions. That’s a peek into the magic.


Some folks have turned to Internet as a solution with VPN over the top of that. This solution does solve some of the bandwidth constraint problems, as you can bring in more internet access and have additional bandwidth and layer on VPN to securely get traffic from one location to another. The challenges are the inability to protect certain types of traffic over anything else when it is Internet based. Firewall, router, VPN configuration, branch heavy equipment, and configuration are also required. Still, the benefit is a low-cost high-bandwidth, albeit you can’t prioritize traffic over the top of it.


The industry is shifting towards software defined networking.  It is also known by several other buzz words like just SDN or Hybrid WAN.  SDN gives you the look and feel of what an MPLS solution brings to the table, with the ability to prioritize certain traffic over another. It’s configuration adjustment is more simplified than a traditional router switch.  You can also bring significantly more bandwidth for about the same money you would spend on a traditional network.  Here are the main benefits at a glance:

  • Enterprise-grade Performance
  • Rapid Branch Deployment
  • Cost-Effective Delivery Model


With voice or IP communications, the ability to prioritize traffic is important. An SDN router keeps calls up and functioning in the event of any congestion, even Internet-based congestion. The router will duplicate the voice traffic and keep a secondary stream ready to go, so if it degrades while flowing on the primary connection, it will instantaneously flow over to the secondary connection and keep the call alive.

  • Application Recognition and Quality of Service Policy
  • Dynamic Application Steering
  • On Demand Link Conditioning


One of the other challenges in the industry with firewalled and traditional environments is the difficulty in creating the configuration in the equipment. If you have ever unboxed a Cisco firewall and wanted to create a VPN tunnel, it is a very complex setup which might require outside resources and other heavy lifting. In an SDN, it’s more of a cloud driven application where these devices put out on the edge are configured in a portal with a simple configuration that is easy to manage and adjust real time performance.


Because these solutions are driven from cloud interface, the administration of devices can be done anywhere and are simple enough that anyone can take a look and see how the network is performing.  Below is another image from Freewire-VeloCloud Orchestrator.


Q: What happens if you have Internet connection on both links?
A: Performance would suffer and I would recommend to look at two different diverse mediums where the chances of both having issues would be slim to none.  Examples would be fiber Internet backed up with coax, a coax backed up with a DSL, or a DSL backed up with a 4G.

Q: Is there room for innovation with this technology?
A: An SDN solution gives great flexibility in your organization to bump up Salesforce in priority over youtube during the end of the month and adjust it back during the beginning of the month.  Its portal driven and simple to administer.

Q: What are some of the providers that partners with?
A: Freewire brings this in as an overlay to any service you have. They use a back end solution from VeloCloud and I would encourage you to visit their website to see how they explain how it works.  Vonage now also has VeloCloud instances as well.  There are other negotiations being finalized currently to offer more providers. Cisco and their iWan product do this type of concept.

Q: Do we know what bandwith  cutoff point would be?
A: The VeloCloud solution from Freewire scales up to a gig of throughput.  The edges adjust as more bandwidth is added.

Q: How does OpenFlow differ from SDN?
A: OpenFlow is the same technology that enables SDN at the core.

Q: From a hardware standpoint, is there much latency that’s introduced by the SD WAN controller?
A: The performance is tied to the bandwidth.  If you’re getting a tier-1 providers internet, you will have less latency than a tier-4.

Q: Is it accurate to say that SDN is a poor-man’s MPLS?  Or do the other benefits really make it another flavor altogether?
A: It can be considered an MPLS replacement.

Q: Does the VeloCloud solution support the generation of netflow records?
A: Netflow is a way that Cisco routers and switches use to take a look at traffic flow. This information has to be interpreted by something like our VX solution.   An SDN router inherently has the software to show you how traffic is being marked as a high-low priority without the information interpretation processing.

APRIL 10, 2018