Hanging on the Telephone: Antivirus Cold-calling Support Scams

Service support scammers rely on the naiveté of their victims in order to persuade them to grant access to their computers and credit card details. There’s very little a security company can do directly to prevent this activity, apart from keeping its own software up to date so as to detect malware and block as many threats as possible. Read this white paper to find out about different types of scams that threaten your data security.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

Five Must Have Features for Business VoIP

A growing number of businesses are now grappling with the decision to implement new telephone systems based on voice over IP (VoIP) technology. However, while the primary goal is generally saving money, there are a wide variety of features and functions that must also be considered. This report provides a quick guide to the top five most common services that you should expect from a VoIP-based business phone system.
  • Written By:
  • Published On:

VoIP Introduction

VoIP uses internet protocol data packets to transfer voice, fax, and other data over the shared network, rather than the traditional public switched telephone network (PSTN), which is based on copper wires carrying analog voice data over the dedicated circuits. VoIP, in contrast to PSTN, uses what is called packet-switched telephony, whereby the voice information travels to its destination in individual network packets across the Internet that are assembled and then converted to voice. Learn the basics of VoIP by reading this white paper, which includes explanations of coding and protocol for VoIP, and a look at quality and myths about VoIP.
  • Written By:
  • Published On:

PBX to VoIP Migration Checklist

A migration from T1/PBX (public branch exchanges) to voice over IP (VoIP) takes some planning and IT support, but the savings can be substantial. This short checklist can help get you started to make the switch to VoIP.
  • Written By:
  • Published On:

You may also be interested in these related documents:

10 Golden Rules for Choosing a Telephony System

Now that phone systems can be delivered over a network, even smaller companies can have access to enterprise-grade calling features. Like any business-critical system, a telephony system is a major deployment that should be undertaken only after a thorough discovery of both your existing infrastructure and users’ needs. This checklist offers 10 rules to help you choose a new telephony system for your organization.
  • Written By:
  • Published On:

The Tangled Web: Silent Threats and Invisible Enemies

When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks.
  • Written By:
  • Published On:

Accelerate Your Sales Performance: Seven Tips to Success

Cold calling is one of the best prospecting tools you can have in your arsenal. In this paper, you’ll learn best practices to prepare for a call, how to efficiently organize your sales team, tips on how to make a connection every time, and why the phone beats e-mail. You’ll also get great tools to measure yourself and stay organized and a list of external resources for further study.
  • Written By:
  • Published On: