Posted on June 29, 2018 by Charlie Galaviz
If you were to design the perfect receptionist for your enterprise business, which qualities would be the most important? A bright personality to greet callers, the ability to handle multiple calls simultaneously, or the skill to perform complex call routing tasks? Or how about someone who is consistent and available round-the-clock? A Virtual Receptionist is the automated equivalent of your best receptionist, with the ability to deliver professional pre-recorded greetings and direct callers to their desired extension, informational message, or departmental group. Best of all – a virtual receptionist is included on all Dash Business Phone Plans and with our user-friendly interface, it can be set up in less than five minutes. Take a look at this Virtual Receptionist Infographic below to learn more.
Posted on June 26, 2018 by Dan Quick
Every four years, the most important global sporting event is staged. I’m not talking about the Olympics, but rather the World Cup. This weeks-long tournament is preceded by months, and even years, of qualifications where countries all over the world hope to punch their ticket to the biggest stage in sports. Unfortunately, you may not be aware of this because, like the majority of our audience, you may happen to find yourself somewhere in the United States of America at the moment. That’s an issue for our national awareness of the tournament (as evidenced by the 40% decrease in Americans who watch soccer compared to 2014) mostly credited to the fact that the United States failed to qualify for the first time since 1986. That’s even longer than we’ve been in business, which as you know, is a really long time. As lamentable of a result as the US’s failure to qualify really is, it would be disingenuous to say we aren’t still pretty ravenous about the tournament over here at VirtualPBX. And why shouldn’t we be? Not only are we people who like to travel the world and experience new places and cultures, we’re also a truly global company with team members and customers scattered across the planet. In that sense, we really couldn’t miss the event if we tried. For many other organizations, though, following the excitement from halfway around the world can cause complications with their work schedules. That’s why we’ve compiled the best ways to use VoIP to make sure you can stay plugged into the action all while staying employed along the way.
Use VoIP, Watch Soccer
The reality is that we’ve got a lot of freedom with our days because, as a distributed workforce, the responsibility is on us to make sure we’re producing at the levels we need to get the job done. When that’s the case, we can prioritize our time to include family responsibilities, personal needs, community involvement, and when the time is suitable, even a little world-class soccer. For those who aren’t as accustomed to this permissive scenario, we’ve offer the following tips on how to watch soccer using VoIP for the remainder of the tournament.
- Follow Me Calling Follow Me Calling is the intelligent call forwarding system that allows employees to include a series of telephone numbers that will ring to find you wherever you go. So setting the cascade of numbers from your desk phone, cell phone, favorite sports bar, and soccer club hangout is, in this instance, totally acceptable.
- Mobile for Business VirtualPBX Mobile for Business allows VoIP customers to access a nationwide 4G LTE network designated purely for your business operations. This means that if you’re in a more remote area and you don’t have an ultra fan base for your Moroccan or Senegalese viewing needs immediately available, you can take your work phone and road trip it to wherever you can watch with friends.
- Auto Attendant Adding an Auto Attendant is the best way to keep operations working smoothly during any heighted period of activity, be it during a busy project or a non-stop soccer watching marathon. Auto Attendants act as a virtual receptionist that can take incoming calls, play recorded messages, and route them through to their desired parties or voice mailboxes. Basically, this is the person who is going to cover for you when you’re not at your desk because you’re away watching a game.
- Business Hours Automating the business hours, lunch periods, and corporate holidays for your business is a great idea because nobody wants to have the sense of dread that they may have forgotten to turn on voicemail and out of office reminders once they’ve already left for vacation. Setting office hours also comes in handy when all the above suggestions just aren’t good enough so you have to make a new holiday to get away to watch your favorite team. We haven’t done that, yet, but we reserve the right to do so.
Watch Soccer, Even if it’s on Tape Delay
We’re normally not too likely to prescribe behavior to anyone, anywhere. We figure that whoever you are, whatever you do, is enough. However, one thing that is difficult to overstate is the importance of having shared experiences, especially when those experiences are shared with our neighbors not just next door, but also across the world. That’s what the World Cup is and that’s what it means to us. Hopefully, you can use some of these tips to get away from the desk for a few minutes to watch a game, but even if you want to watch the tape-delayed events later on in the evening after work is over with, chances are good you’ll walk away having been entertained, impressed, and a little more connected with the world than you may have started. Also, if you have any other suggestions on how watch the games, or if you just want to shoot the breeze about your favorite players and teams, hit us up on Twitter or Facebook, because we’re always more than happy to do that, too!
Posted on June 21, 2018 by Dan Quick
For our Partner Blog Series we like to highlight the relationships we have with our peers and business partners from across all areas of the telecommunications industry. We know that when it comes to relationships, the whole really is greater than the sum of the parts. That’s why we want to share with you the wisdom, experience, and perspective of the companies we work with.
For this edition of the VirtualPBX Partner Blog Series, we tap into the decades of network security experience of Sorell Slaymaker from Unified IT Systems. Sorell is an expert in the areas of risk assessment, network configuration, and general data security best practices in the cloud communications space. He has written extensively on these topics and today contributes the following guidelines for securing unified communications.
Best Practices In Securing Unified Communications
Unifed Communications (UC) applications can be the hardest to secure within an enterprise. UC clients, APIs, and services need a full security suite to ensure an enterprise stays secure. Too many enterprises attempt to apply standard application security measures to UC applications, which limit what users can do and still leaves enterprises exposed to the complex UC security challenges. Security managers and architects understand standard web applications, but not all the nuances of UC, and UC managers and architects lack the sophisticated security understanding.
Framing the Challenges of UC Security
One example is when Cisco’s Webex reported a critical security vulnerability that needed an immediate patch. An authenticated, remote attacker could execute arbitrary code on a targeted system due to insufficient input validation by the Cisco WebEx clients. The risks to a company if their UC system(s) is not secure include:
- Loss of Data – UC is more than voice and video, there is a lot of data associated with Web conferencing and file sharing.
- Back Doors – Bad actors can bypass standard security controls to gain access to private networks.
- User Tracking – Using Meta-data regarding the communication to track who is talking to whom, when, and where, even if the media is encrypted.
- Blackmail – Recording private conversations and threating to make the information public.
Increasingly Common Risks
UC combines telephony, video, chat, email, and presence together into one unified communications system. As the technology has become more complex and more accessible from the public internet, the security threat has increased. In many ways, it’s easier than ever to attack business communications. Companies must be diligent to protect their communications as they are vital to business operations.
Companies formerly relied on their internal network being secure and required external users to use a VPN solution to get in. This strategy may no longer work for all businesses because:
- No network is secure – It is been proven that the top vector for attacks come from inside the enterprise network.
- BYOD – (Bring Your Own Device) UC from personally owned devices including employees, contractors, partners who do not have a VPN or MDM client software protections.
- Speed – Users want to immediately start communicating versus having to wait for a VPN tunnel to be established.
- Public UCaaS – Hosting UC externally at a 3rd party using internet network connectivity is common, especially with the rise of freemium solutions.
- WebRTC – Supporting standardized clientless UC anywhere and everywhere.
Overcoming Common Challenges
While large businesses can often dedicate substantial resources toward securing their communications, SMB’s need simple and cost-effective solutions. Failure to secure UC can lead to information and data theft. UC is hard to secure for the following reasons:
- Peer-to-peer – WebRTC and proprietary UC stacks allow one device to talk directly to another without going through a centralized service and security stack. All other applications are client/server based, where a security stack can reside at the server.
- Bi-Directional – Sessions can be established in both directions due to the call/calling nature of UC versus a web application where a user establishes the session request. A home router, for instance, has a simple firewall rule that states all TCP & UDP sessions must be initiated from within the home network and why to get a Skype call, the home user first must be logged into Skype.
- UDP Transport – Unlike TCP that has sequence numbers and specific ports for different types of applications, UDP has neither. Different vendors open up a range of UDP ports and UC sessions cycle through the range of ports. The range of ports must be bigger than the peak number of concurrent UC users.
- Multiple services – Voice, video, chat, data – UC uses a range of services, each with their own TCP/UDP port. With conferencing, there can be hundreds of users interacting both inside and external to the organization.
- Jitter Sensitivity – Jitter is the variation in latency, and jitter above 20ms will result in the effective loss of real-time voice/video traffic. With video conferencing, there can be instantaneous spikes in network traffic that are 100x the norm. Firewalls and other security appliances have trouble processing a lot of UC traffic without causing jitter. The primary reason why UC was the last major application to use virtualized infrastructure at scale is due to this.
- Remote control – Co-browsing and taking remote control of an end-device are some of the enhanced features of UC suites. Many vendors use this to circumvent VPN and other types of supported enterprise remote access.
- APIs – The digital world is about getting and sharing data through APIs. Set up a secure, encrypted session and information goes in and out of an organization. The challenge is that some of this data can be private, confidential, and/or regulated data that require enterprise governance and compliance.
- Too Many Proprietary Appliances – Legacy PBX, voice mail, conferencing systems use proprietary hardware with non-common operating systems. These appliances are subject to known security vulnerabilities.
Finding the Solutions for Every System
While this list can be overwhelming, there are best practices to follow regarding security UC. These include:
- Encrypt Everything – It is no longer good enough to just encrypt data at rest, data and communication in motion must be encrypted because users and applications can be anywhere and everywhere. Use 256-bit encryption on sensitive data and communications. For instance, using 128-bit encryption still allows someone to understand if it is a male or female talking, what language, how long the conversation is and the interaction amount between users.
- Adopt Zero Trust Architecture – Zero Trust means that nothing on the network, resource, or application is trusted. A deny all policy, with a whitelist that is integrated with the identity and access management systems. Use anomaly detection to alert when something abnormal is occurring.
- Ensure Identity – Great security starts with great identity and access management. Multi-factor authentication, least privilege access, and good logs to account for who accessed what are industry best practices that are not always applied to UC. Password management for voice mail and other services should be multi-factor and require 2-factor tokens for system administrators. The password reset process should also be rigorous.
Really all proxy services need to be examined, as well. While web and email proxies are common and SBCs act, as one of their functions, as a voice proxy. Be sure to add chat/presence and video proxies. Unfortunately, these proxies are proprietary. A few examples Microsoft has their Edge & Reverse proxies, Cisco uses Expressway. These proxies provide the following features:
- Packet Inspection – Unencrypt each session and inspect the signaling packets and scan each packet and stream.
- Secure Firewall Transversal – Set up specific TCP ports to go through a firewall and handle the NAT required at both layer 3 and layer 5.
- Log & Alarm – Gather a log of all sessions and generate real-time alerts when there are anomalies such as a spike in traffic, malware detection, multiple session failed attempts, etcetera.
- DLP – When required, record the session – Important for screen share logging.
For WebRTC, a WebRTC Gateway with ICE, STUN and TURN services used as appropriate. To add to this list, with the use the Communication Platform as a Service (CPaaS), all API’s should also have a proxy so an enterprise can enforce governance and compliance of all data going in and out of the organization.
- Securing the UC appliances – Scanning on a regular basis and applying vendor security patches immediately, plus turning off unused services. While this may seem obvious, many enterprises fail to do this as their UC infrastructure does not always reside in the security managed part of the data center.
- Log & event monitoring – Every large enterprise has Security Information and Event Management system. The UC systems should tie into this.
- Audit – While all large enterprises and government agencies get 3rd party audits of their critical or sensitive transactions, this is rarely done for interactions. Getting a 3rd party to audit UC security and interactions is an emerging best practice.
- Training – No matter how secure your systems are, users can be lazy and not take security seriously. If they or the people they are talking to are on an unsecured session, confidential, private, or regulated information should not be shared.
Hackers are becoming like spies and getting more sophisticated and targeting employees, contractors, and partners to help them infiltrate an organization. Everything in an organization needs to be locked down tightly, including UC applications. And for IT security professionals, a security breach into systems that you are responsible for will more than likely result in you updating your resume.
So what do you think? Does your enterprise already conduct all of these steps to protect itself from bad actors and security breaches? Do you think there are other critical steps that we didn’t cover here? Let us know by joining the conversation on Facebook or Twitter, and we’ll make sure to include it in future editions of the VirtualPBX Partner Blog Series!
Posted on June 19, 2018 by Dan Quick
An automated phone tree is a menu-based telephone system that routes callers to individuals, departments, or even to recorded messages or additional menus. This inbound call direction tool is essential for businesses with high call traffic or large departmental organization. The phone tree got its name in part because there is a multitude of options for a caller to be directed towards even though they all come in from the same telephone number. This “many from one” design resemble the branches of a tree and the trunk is the single pathway that all inbound call traffic originates from. Traditionally, the phone tree was something that didn’t exist as an automated system at all. Live receptionists had to be staffed by the dozen to accommodate the complex call routing needs of some organizations and that persisted well into the late 20th century until the advent of new, digital telephone technology like an Auto Attendant.
Putting the Auto into Automated Phone Tree
An Auto Attendant is a popular feature on some feature-rich hosted VoIP plans that has taken most of the point-of-contact requirements out of the hands of humans. However, more than just fielding calls, an automated phone tree’s core function is to direct them to the appropriate party or parties, as well. This is accomplished by combining the infinitely scalable capacity thresholds of an Auto Attendant with a few advanced telephony tools, as well. Specifically, these tools are designed to handle the complex routing requirements of modern organizations without the costs associated with older, traditional phone systems.
- ACD Queues ACD (Automatic Call Distribution Cues) are highly customizable call routing systems that can designate more than just the group or party an inbound call should be directed to. Additionally, ACD Queues can also throttle the pace of distribution, designate the sequence of agents who will answer calls, plus any one of several skills-based and overflow oriented call routing logics.
- Hunt Groups Hunt Groups are similar in function to ACD Queues and also help to complement the function of an automated phone tree, but are less sophisticated in their adjustability. Also, whereas an ACD Queues can be added to a Dash Business VoIP Plan for a fee, Hunt Groups are included with every available Dash Plan, including basic.
Getting Started With an Automated Phone Tree
Even though the combination of an Auto Attendant and either ACD Queues or Hunt Groups make for a formidable inbound call strategy, using them does not preclude an organization from having a live receptionist. In fact, the opportunities to use these technologies to enhance and improve the impact that having a live receptionist has on an organization are greater than the using them on their own. Plus, getting started is easy considering that all VirtualPBX VoIP Plans come with a 30-day money back guarantee. So what are you waiting for? Get automated phone trees for your office and see how they can help your business, today!
Posted on June 15, 2018 by Dan Quick
We recently launched the all-new and totally free to acquire VirtualPBX Web Phone for all of our Dash Service Plan account holders to use. This was a big deal for our customers and us because it was the first time that open-source WebRTC (Web-Based Real-Time Communications) software was used to create such a powerful telecommunications device that was being made freely available to the hosted PBX community. We’re rather proud of the Web Phone for both its formidable performance and durable reliability as much as we are for the fact that we’re literally giving it away to anyone who wants to use it. Since its debut earlier this year, however, we’ve been getting lots of questions about how it was made, how we can offer it for free, and general questions about what features users would be losing out on by using it. The short answer to that is that anyone on a VirtualPBX VoIP plan will get 100% parity on the feature set on the VirtualPBX Web Phone as they would on even the highest quality VoIP Desk Phone. We understand the skepticism, though, honestly. We have so many people who make the switch to VirtualPBX from other services that promise a lot and deliver a little that it’s entirely understandable why some people may be wary to accept something that is promised to be so impressive, much less that it’s being offered for free. To address some of the apprehension, we’ve tapped one of our engineering rockstars to explain WebRTC and Open-Source Software but still we’ve decided to make it even more approachable with a new analogy. And it’s one that I think is close to almost everyone’s heart; cake.
Open Source Software As a Cookbook
First of all, who doesn’t love cakes, right? There’s a reason cake is ubiquitous at birthday celebrations and that’s because, while we may have disagreements about the flavors or icing, it’s pretty tough to go wrong with a fat slice of cake. And how is our new Web Phone like a birthday cake? Well, just like the spongy goodness of a cake, the VirtualPBX Web Phone shares a variety of similarities.
- Our new web phone is comprised of a balanced apportionment of carefully selected ingredients. Too much tech and not enough UX design can leave a similarly bad taste to a cake baked with too much rising agent that may have a lot of volume to it, but the aftertaste is something that people may not care for.
- Choosing the right platforms to be compatible with (ie, being immediately optimized for all modern web browsers) is also a lot like picking the style of cake layers. A multi-tiered and festooned piece of bakery may look good, but is it something that works for everyone? Not likely. From a reliability standpoint, a simple sheet cake is what you’d need to make sure that anyone, anywhere would be able to, sink their teeth into, a new web phone.
- And, of course, one of the most obvious of similarities between cakes and the VirtualPBX Web Phone is that they each can be universally popular assuming the recipe is followed to the tee. This is great for our users because we host and manage all of the necessary technology behind the web phone in the cloud which means that they can rest assured that the recipe is right 100% of the time. Because you know the secret to making perfect Tollhouse Chocolate Chip cookies, don’t you? It’s following the recipe perfectly.
Use Our Open Source Software as Much as You Want
Here’s another similarity between great cooking and great open source software; when people make something incredible, they want to share it with everyone else. Just like you can find recipes from amateur and professional chefs being freely given away across the web, we’re also happy to provide our web phone totally free of charge. That means that you can have as many of these as you want on as many devices and for all of your employees and the cost will always be zero dollars and no cents. The VirtualPBX Web Phone operates reliably on any modern web browser on any web-enabled device, phone, tablet, or computer. The only thing you pay for is the use of your Dash Service Plan, and your pooled minutes are drawn from each user in the exact same way they always had been. Now, the only thing that changes is you get the industry’s best and, ahem, freshest web phone technology for all of your employees totally free. No more buying and provisioning VoIP phones, no more paying licensing fees for softphone applications, and way more budget left over for, if we have anything to say about it, cake. You can’t always eat as much cake as you’d like, but with the VirtualPBX Web Phone and a Dash Service Plan you can at least have your cake and eat it, too!