How Secure Is Your Call Center? Part II, Network Device SecurityIn our previous entry on this topic, we dove into the world of endpoint device security. In many cases, malware and attacker entry points can be traced back to a compromised endpoint device. In this day and age, however, malware Continue reading → Chris Brock September 26, 2013December 4, 2013 Marketing Blog Read More