How Secure Is Your Call Center? Part II, Network Device Security In our previous entry on this topic, we dove into the world of endpoint device security. In many cases, malware and attacker entry points can be traced back to a compromised endpoint device. In this day and age, however, malware Continue reading → Kathy Rizzo September 26, 2013December 4, 2013 Marketing Blog Read More