- Home
- Resources
-
Articles
-
Articles
- Recognition
- Vidder
- Events
- Learn the Basics
- Stay Informed
- Solutions Briefs
- Latest Business News Articles
- Coronavirus (COVID-19) Response for Businesses
- Whitepapers
- Free Enterprise Webinars and Registration
- Mobility
- 5G
- Business Communications
- Internet of Things
- Security
- Customer Experience Services
- Network
- Energy and Utilities
- Healthcare
- Financial Services
- Manufacturing
- Media and Entertainment
- Public Safety
- Public Sector
- Retail
- Technology
- Transportation and Distribution
- Travel and Hospitality
- Education
- Federal Government
- State and Local Government
- Business Continuity
- Customer Success Stories
- Home
- Resources
-
Articles
- Recognition
- Vidder
- Events
- Learn the Basics
- Stay Informed
- Solutions Briefs
- Latest Business News Articles
- Coronavirus (COVID-19) Response for Businesses
- Whitepapers
- Free Enterprise Webinars and Registration
- Mobility
- 5G
- Business Communications
- Internet of Things
- Security
- Customer Experience Services
- Network
- Energy and Utilities
- Healthcare
- Financial Services
- Manufacturing
- Media and Entertainment
- Public Safety
- Public Sector
- Retail
- Technology
- Transportation and Distribution
- Travel and Hospitality
- Education
- Federal Government
- State and Local Government
- Business Continuity
- Customer Success Stories
-
Impact of Communication in Cybersecurity
- 2019 LinkedIn Phishing Threat
- Five best practices for managing your network security in the age of digital transformation
- Cybersecurity Benchmarking: Do you out-secure the competition?
- Six ways to strengthen network security and maintain a competitive edge
- Cybersecurity and 5G
- Small Business Webinar: Leading Through Uncertainty
- Navigating the CARES Act process
- How Tools That Leverage Blockchain Can Address Escalating Security Concerns
- Contact Center Workforce Management
- IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
- What is UCaaS and is it right for my organization?
- Zero trust security framework: benefits and downsides
- 5G network slicing: Do you have the team you need?
- How to Run a Public Meeting Online
- Why You Need Managed Detection And Response Services
- The golden age of voice communications
- Worried about fraudulent calls? Build a strong voice security strategy
- Why 56 % of large business are turning to SDN for cybersecurity
- What are successful CX leaders doing differently?
- Three ways technology can enhance your contact center performance
- Five CIO Strategies to Create a CX Roadmap
- Three reasons why the role of the CMO is now a technology job
- Retail Apocalypse? We don’t think so.
- Five technologies helping brand and CPG manufacturers survive disruption
- Digital transformation is everywhere. But did you forget to transform your security program?
- What is an ounce of cybersecurity prevention worth?
- Three Energy and Utility Trends to Watch in 2019
- Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
- How 5G Impacts Your CX Strategy
- IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
- Why your digital transformation strategy requires a risk management plan
- Overcoming the challenges to digital transformation
- Three reasons why SD WAN is essential for cloud migration
- SD WAN vs. MPLS: Understanding the Difference
- Four ways AI can help build an omnichannel customer experience
- Though behind the scenes, cybersecurity is a star in the media and entertainment industries
- Why connectivity is key to digital transformation
- How Digital Transformation Impacts CX
- How technology is driving the transformation of content
- Security in the public cloud: Get peace of mind
- The Challenges and Benefits of Securing Hybrid Clouds
- Private cloud security: What’s the difference?
- When self-service is done right
- Smart City 3.0
- Why rethinking your software culture can be a competitive advantage
- Six reasons you can’t afford to go cheap on network
- A thought experiment about shared credentials
- Acceptable use policies: Keeping your workplace secure
- Advanced threat detection – Adapting to change
- Anatomy of well-managed malware incident
- Briefing the board: Directing security evolvement
- Can you explain IoT without saying IoT?
- CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
- Creating the city of the future today
- CX Day 2017: Celebrating customer experience
- Data breaches: how long does the damage last?
- Darknet: The shady underbelly of the iceberg
- Data Breach Digest Update Data ransomware the Catch 22
- Delivering smart, sustainable energy solutions
- Data breaches in industrial environments: Safety comes first
- Error detecting data visualizations
- Help Me, Help You. Sincerely, Your Customer.
- Make sure the bad guys don’t get what they’re hoping for this Christmas
- Man vs machine, which delivers the best customer experience?
- My experience with the Kano Model
- Insider Threat: One pattern, four scenarios, thirteen countermeasures
- My superb Go-To-Gemba customer experience
- Powering the digital economy with modern utilities
- Preparing for GDPR? PCI DSS could help
- Smart cities are the wave of the future
- Smart traffic helps improve quality of life
- Social engineering: Strengthening the weakest link
- Where SMBs have the upper hand
- What to consider when planning your future digital network
- This framework ain't big enough for the both of us
- What does IoT really mean for the enterprise
- Verizons Data Breach Digest - Perspective is reality
- Retail’s Digital Roadmap
- Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
- Mobile Customer Experience: Savvy shoppers Ready associates
- Incident Management Focus: Two Approaches to Incident Response Plans
- I Admit It: I’m Biased
- How to retain viewers with your online video services
- Virtual Network Security Services
- Announcing VERIS Community
- Are we reaching the limits of technology?
- Virtual Network Services- WAN Optimization
- Find the Right Construction Management Tools
- Usage-Based Car Insurance Solutions
- Enable Banking Virtually Anywhere with Wireless ATMS
- Verizon Intelligent Video and Smart Surveillance
- Ethernet Services & Ethernet Architecture Solutions
- VGo Mobile Telepresence Robot Case Study
- Fleet Maintenance and Performance Case Study
- Auto Dealer Solutions for Courtesy Cars Case Study
- Car Rental Solutions Streamline Rental Operations to Create New Business Models
- Smart Fleet Management Basics
- ICS Security Services
- Adaptive CX Means Liquid Personalization
- Verizon Wireless Private Network Connections
- Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
- Wireless Backup Solutions
- Are you living in a glass house?
- Utilities and Energy Management Technologies
- When it comes to CX, don’t get hung up on the jargon
- Tough Love and the Customer Experience Culture
- “Retail is Dead” — and Other Rumors with no Validity
- Are your vendors the weak link in your cybersecurity?
- Banks—It’s Time To Start Talking To Each Other, Say UK Police
- Cloud storming: You need more than an umbrella to stay secure
- M2M Transportation Solutions Brief
- Network Security Solutions
- Fact Sheet: Verizon Network Analytics
- Customer Experience and the Security Paradox
- Customer Experience Mystification
- Cybersecurity In 2017: It’s Not All Doom And Gloom
- Digital Convergence: The Perfect Storm
- Does connected working kill innovation?
- Don’t make a fish climb a tree: customer preferences matter.
- EESI as Pie: Essential Elements of a Successful Intrusion
- Federal Government Modernization: Priorities for the Federal IT Executive
- Five Ways Tech Can Supercharge Your CX Team
- Get a new perspective on cybersecurity
- Have Your Metrics Become Your Master?
- How to move from product first to customer first
- IoT: from theory to practice
- Is automation your golden ticket to great CX?
- To Sell Or To Serve?
- Just because you can, doesn’t mean you should
- Keep the "personal" in personalized customer experience
- Make the right cybersecurity investments
- The four pillars of digital transformation
- Stop feeding your customers air sandwiches
- Dedicated IP Internet Services
- Retail Industry Solutions
- Connected working: think outside the box
- Travel and Hospitality Industry Solutions
- Virtual Network Services
- M2M Solutions for Government Brief
- State of the Market: Internet of Things 2017
- Grid Intelligence Water Case Study
- Private IP: Get a network that grows with your business.
- United Security Services
- Business Connections- Business Communication Solutions
- Verizon Cypher Encryption Software
- Achieve Operational Transformation with Dynamic IT Services
- Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
- Workplace Mobility Strategies
- Espionage Health Check
- E-Discovery Support
- Push to Talk Plus Phones & Technology
- Security Incident Response Analytics
- Visual Interactive Calling
- Fleet management service helps improve performance and cut costs
- A Foundation for Growth with Data Center Consolidation and More
- Assessing Intrusion Detection
- Digital Advisory Services - Software Defined Networking Strategic Assessment
- Network Threat Monitoring
- Virtual Network Services-Security
- Drive Business with Fleet Telematics Solutions
- Business Smartphones Jump-Start Productivity
- Mobile Device Management
- Fleet Management Solutions Factsheet
- A better way to get the latest CPE technology
- Rapid Response Services
- Verizon Rapid Delivery Platform
- Advanced Network Experts Retainer
- Cyber Risk Management Program
- Internet Dedicated Services
- Express Connect WAN Services
- Intelligent Cloud Control
- MDM Software Management with OTA Distribution
- Managed Security Services
- Computer Emergency Response Team
- Network discovery service: Discover your network’s potential
- IP Contact Center
- Network Management Solutions Brief
- Mobile Technology for Retailers
- Threat Intel and Response Services
- Business VoIP & Business Phone System Solutions
- Security Health Checks
- Law Enforcement and Public Safety Solutions Brief
- M2M Finance Solutions Brief
- Choosing a Wireless Network Provider
- 4G LTE Enables Business
- Wireless ATMs & Kiosks Factsheet
- Simplify Your Grid Solution
- Take Control of Infrastructure Security with Intelligent Video Surveillance
- Smart Lighting Technology Brief
- Grow your business with leading-edge proof of concept testing
- Managed Security Services – Analytics
- ThingSpace IoT Management
- SD WAN Services
- DDoS Protection Service: DDoS Shield
- Smart Communities Solutions
- Enterprise Mobility Management Solution from MobileIron
- Custom Apps and eForms for Mobile Devices
- Making the Case for MPLS VPNs in the Modern Enterprise
- Diary of a cybercriminal
- HP Elite x2 Business PC on the Verizon 4G LTE Network
- Private Network Traffic Management
- Retail M2M solutions
- SD WAN Service with Application Aware Routing
- Virtual Network Services Solutions Brief
- The Verizon Fleet Management System
- Verizon Condition-Based Maintenance Solutions
- Private Network Traffic and Bandwidth Management
- Verizon ThingsSpace IoT Development Platform
- The Verizon Network-Backed Asset Tracking System
- The resonant theme of RSA 2016
- Optimize Fleet Operations With Verizon Autoshare
- Unified Communications and Collaboration as a Service Factsheet
- Networkfleet Fleet Management Case Study
- Leading the way for vision zero
- How SDN can help your business transform and grow
- Helping your workers get the most out of your new cloud based communications solution
- Implementing automation in your contact center read this first
- How to keep your business communications secure
- Five reasons why your business needs software-defined networking
- The Delicate Nature of Trust
- Will SDN replace MPLS? Not so fast.
- The future of connected vehicles hinges on today’s investments.
- Disclosing cyber risk? New SEC guidance requires it.
- Revolutionize your communications: Migrating to a cloud-based platform
- The role human touch plays in the digital customer experience.
- The importance of public-private partnerships to make smart cities a reality
- Staying Ahead of the Curve
- Why network visibility is important for your business
- Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
- How to break down the barriers to SDN adoption
- Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
- The four key steps to improving customer experience with artificial intelligence
- Staying safe online: Observing good digital hygiene
- 2017 Data Breach Digest: Half Year Anniversary
- Better living through parking
- Your Endpoint Security Strategy Needs a Hug
- 5G and autonomous vehicles: turning fiction into reality
- Making cities safer for everyone
- Be a better bot boss: 3 tips for CX chatbot success
- Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
- For insurers, failure is learning—and you need to learn fast.
- Network Orchestration Enhances Digital Transformation
- It’s real: Digital transformation is already delivering results
- The Humanability of Smart Cities
- How DevOps can turn IT into the leaders of your business
- Knowledge is power: How an intelligent knowledge base powers CX
- Light the way to futureproof your smart city investment
- Why DevOps is critical for improving the customer experience
- Operation "Surprise and Delight"
- Get the SD WAN facts before you buy
- Are you "over-sharing" your customer feedback data?
- Why risk scoring is critical for your business (and your career)
- Changing consumer demands are forcing entire business models to be rethought
- Cyber security posture FAQ: know your cyber risk
- Deception Technology: A strategic imperative for detection and response
- Voice Security Strategy Best Practices
- CX Improvement: The need to put consumer data protection and privacy first
- The Digital Transformation of the NFL Stadium and the 5G Fan Experience
- How to Improve Customer Experience
- Customer Personalization: The time is now for customized experiences
- Why Cyber Risk Visibility is the Key to Security
- 2019 LinkedIn Phishing Threat
- Minimize Your Attack Surface
- How Velocity Can Impact Cyber Security Strategy
- The top 10 criteria for selecting an SD WAN vendor
- How to implement SD WAN architecture the right way
- The Power of SD WAN and 5G
- Creating an Effective Cyber Security Incident Response Plan
- Embedded Universal Integrated Circuit Card
- How digital transformation is impacting the utilities sector
- How to promote teamwork among remote employees
- Three keys to managing remote employees
- Business Impact of Coronavirus: Ready in the Face of Uncertainty
- Tips to promote connectivity in digital workplace
- Accelerate Your Digital Workplace with 5G Mobility
- How to Prevent Phishing & Malware Attacks
- Tips and strategies to improve virtual meeting performance
- PCI Compliance: What to Know About Digital Payment Security
- Getting Calls When Working Remotely
- Keep your business open when your location is closed
- How to improve the customer service experience in crisis situations
- Methods & Types of Business Communication Services that Businesses Rely On
- How to Work Remotely Using Collaboration Tools
- How Mobile Hotspots Can Help When Working Remotely
- Teamwork and Collaboration Best Practices
- Remote Work Security Policy & Best Practices
- Streamline CX with Better Tech Integration
- Creating a Personalized Customer Experience
- Does your school have these five critical security features?
- Telehealth Relief for COVID-19
- Transform Your Network with Edge Computing
- Five ways the cloud can help improve your school's security
- How to enhance distance learning and remote employee training sessions
- What is Zero Trust Architecture
- Remote Work Tips for the Public Sector
- Five top mobile security threats
- Strategic Outsourcing
- Tips for Small Businesses in a Tough Economy
- The Future of Telehealth Starts Today
- Considering Remote IT Support Solutions
- Four tips to strengthen your digital marketing strategy
- User Experience Checklist
- BYOD Security for Remote Employees
- Building a 30/60/90 Day Business Plan
- Create an Acceptable Use Policy
- Strategize with Small Business Cyber Security Plan
- Small Business Cyber Security and Data Breaches
- Five productivity tips for your newly remote team
- Corporate Network Enhancements
- In cybersecurity, integrity matters.
- Creating the New Normal for Your Small Business
- Connectivity best practices for distance learning
- Scalable Network Solutions During Critical Events
- Ways to Find New Customers Now
- How to Protect Data Security
- Small Business Innovation for Big Impact
- Finding Alternative Small Business Funding
- Tips to Transition to Working from Home
- Five best practices for choosing the right security provider
- Three next-gen technologies that will define cybersecurity in the next decade
- IoT security: Why you need to encrypt your data
- Analyzing the COVID-19 data breach landscape
- Design considerations for a 5G network architecture
- Five security blind spots you might not realize you have
- How to drive business agility with remote collaboration tools
- Mapping the 5G impact in the retail industry
- 5G and IoT: The future of efficiency
- The 5G evolution: Exploring the journey from 2G to 5G
- Funding Safe and Secure Elections During the COVID-19 Pandemic
- Low-latency 5G and the opportunities it can create
- Three 5G application scenarios and how they could change your workforce
- Optimizing business communications networks by combining SD WANs and MPLS
- A guide to unified communications solutions: beyond VoIP and video
- Improving customer experience with a contact center provider
- Strategies to Get 5G Ready
- The industries that will benefit from 5G
- Optimize fleet operations through smarter supply chain disaster management
- Six design principles to help mitigate latency
- Understanding the five C’s of Latency
- Where 5G and MEC work together
- Securing your 5G edge computing architecture for business success
- Unpacking the “5G” in Verizon’s 5G edge
- Cloud computing security: Is it safer than on-premises?
- How AI improves the customer experience
- The human element in cyber security: When user error is the problem
- Security threats in e-commerce: Protecting data while maintaining customer experience
- How a power grid attack threatens the energy industry
- Mobile device security in the workplace: five policies you must have
- Cloud contact center technology: empowering your employees
- How IIoT in manufacturing is made possible with MEC and 5G
- How to cultivate customer relationships through social engagement
- Supply chain communication strategies for successful management
- What is edge computing and where is it being used?
- 5G and edge computing: configuring the edge topology
- Collaboration tools: focus on interoperability to avoid tool fatigue
- How intelligent routing can improve the contact center experience
- Securing the smart city of the future
- Building a successful digital transformation strategy
- Video conferencing network requirements: delivering the best user experience
- Solving common remote work endpoint security challenges
- Real-time crime centers and law enforcement technology
- 5G and IoT edge computing: driving future business value
- Smart cities and cyber security: protecting citizens from malicious attacks
- Mapping the digital customer experience for optimal growth
- 5G and AI: creating a connected global business
- The power of AI: artificial intelligence examples for a modern world
- Edge computing vs. cloud computing: What are the benefits in higher education?
- A guide to IT/OT convergence
- IoT in retail can help improve the customer experience
- The benefits of contact and call center speech analytics software
- New collaboration tools: rolling out an enterprise application
- How cloud contact center solutions help workforce productivity
- Diversify the contact center experience to better serve your customers
- Benefits of unified communications services and platforms
- IoT risk management in the mining industry
- How virtual hold technology can boost customer satisfaction
- How cloud-based call center solutions can boost customer satisfaction
- Effective communication strategies in business for 2021 and beyond
- Vehicle tracking solutions that can help protect drivers and customers
- IoT and healthcare: near real-time health monitoring on hospital floors
- How IoT and big data are transforming the construction industry
- Nation-state cyber attacks aren't like your average cyber adversary
- AI hacking: How IT security leaders can mitigate emerging cyber risks
- What is a zero-day attack? How to prepare and respond
- Social engineering attacks to watch out for
- Four enterprise communications trends for 2021 and beyond
- Edge computing examples: what is your edge?
- 5G and telemedicine: Hospitals should take an individualized approach
- Why deepfake video is a real threat to businesses
- Fostering smart construction site solutions with a temporary network
- Learning from cyber espionage attacks like Operation Soft Cell
- User behavior analytics and the technology you need to realize its value
- The next wave of telehealth services is coming, and 5G will power it
- Secure fleet vehicle management is increasingly critical
- Construction cyber security: protecting the worksite against threats
- Professional and Managed Services Vendor: 4 Factors to Consider
- Big data security and privacy concerns in healthcare
- Is a cloud-based phone system right for your business?
- AI-powered customer engagement: Is it worth the investment?
- How pairing UCaaS and CCaaS transforms the customer experience
- The future of education technology
- Improving patient experience through on-premises telemedicine
- Innovations in healthcare technology see boost from pandemic
- Methods of communication on a construction site for a staggered team
- Lessons from the RobbinHood ransomware attack on Baltimore
- 2021 Resolutions for CISO & Security Leaders
- Condition-based monitoring is crucial for preventative maintenance
- A customer engagement strategy for insurance includes virtual call centers
- Will hosted VoIP solve your mobile communications woes?
- Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
- How to budget for cyber security costs—and why it's crucial
- Session hijacking attacks: understanding and preventing them
- Can the cloud be hacked?
- How a local government IT strategy can benefit from managed services
- Cloud contact center solutions empower exceptional customer experiences
- What is 5G Network Architecture?
- How Businesses Should Prepare for 5G
- How will 5G Affect Business?
- The Future of 5G: 5G-Powered Technologies
- What is 5G Beamforming?
- The digital transformation challenges confronting retailers in 2020
- Finding the future of IoT in municipal government
- Enabling manufacturing automation and factory cost controls with IIoT
- From intelligent lighting to smart metering: how energy and utilities are transforming
- How to Build a Smart City from the Ground Up
- How to solve public sector technology and government IT challenges
- Extending the lifespan of IoT sensors in industrial devices
- The future of healthcare technology—faster access and better information through 5G
- Virtual contact centers for small businesses: how cloud-based options help
- 5G and connected cars: the next-generation automotive industry
- Learning from a backdoor attack: the takeaways of Operation ShadowHammer
- Cyber security threats to schools and how to protect against them
- Security vulnerability scanning on an ever-expanding attack surface
- Is your organization's incident response plan up to par?
- How camera hacking threatens remote workers—and their organizations
- How data encryption protects patients
- Exceed customer expectations with these five technologies
- How cloud security best practices keep hospitals healthy
- Social media phishing is on the rise
- Considerations for a new small business network
- A work-from-home security policy is essential for businesses
- Financial services cyber security and edge computing
- How user experience testing can detect customer experience friction in e-commerce
- How the media and entertainment industry is using mobile edge computing
- Disaster recovery after a hotel data breach
- Is AI the future of personalized healthcare?
- The benefits of network slicing: flexibility and more
- How 5G will impact the future of farming
- Cyber security posture FAQ: know your cyber risk
- How public safety systems support natural disaster recovery
- Preparing for disaster with storage virtualization
- Is augmented reality the future of CX?
- 5G vs. Wi-Fi 6: how do they compare?
- Interactive voice response (IVR) systems: three tests to pass
- Cyber security for smart energy and renewables
- Digital signage can help transform public transportation
- 10 Considerations for an ideal edge computing model
- Contact center infrastructure in the cloud has never been a better option
- Contact center outsourcing: four signs your business is ready
- Deliver a personalized customer experience to transform your brand's customer relationships
- Intersection safety and the technology that will bring it to your town
- PRI vs. SIP trunking: what's best for your business?
- Refund fraud: how to spot refund scams and prevent them
- The business benefits of unified communications (UCaaS)
- VoIP trends: the future of the VoIP industry is clear (and flexible)
- Creating a customer-centric culture
- 5G-enabled simultaneous translations: how companies are creating shared global experiences
- Combining Interactive Voice Response (IVR) and Automatic Call Distribution (ACD) to meet customer needs
- Business communications solutions to keep remote teams connected
- UCaaS: how retail call centers are improving customer service with the cloud
- Retaining talent post-pandemic: is technology friend or foe?
- Virtual collaboration in the workplace and the bionic organization
- The overlooked signs of a network data breach
- Deploying a unified communications system—and supporting your IT team while doing it
- How ensuring contact center security helps maintain customer trust
- An effective customer engagement strategy is essential to improving CX
- Senior leadership skills and the new, digitally savvy executive
- How to assess business collaboration technology: the data you need
- Dual Web Application Firewall
- Mobile Security Strategy: Beyond Devices and Users
- Keep ahead of the curve: Small business advice for 2021
- Using social media to connect with customers
-
Articles
-
Impact of Communication in Cybersecurity
-
Impact of Communication in Cybersecurity
- 2019 LinkedIn Phishing Threat
- Five best practices for managing your network security in the age of digital transformation
- Cybersecurity Benchmarking: Do you out-secure the competition?
- Six ways to strengthen network security and maintain a competitive edge
- Cybersecurity and 5G
- Small Business Webinar: Leading Through Uncertainty
- Navigating the CARES Act process
- How Tools That Leverage Blockchain Can Address Escalating Security Concerns
- Contact Center Workforce Management
- IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
- What is UCaaS and is it right for my organization?
- Zero trust security framework: benefits and downsides
- 5G network slicing: Do you have the team you need?
- How to Run a Public Meeting Online
- Why You Need Managed Detection And Response Services
- The golden age of voice communications
- Worried about fraudulent calls? Build a strong voice security strategy
- Why 56 % of large business are turning to SDN for cybersecurity
- What are successful CX leaders doing differently?
- Three ways technology can enhance your contact center performance
- Five CIO Strategies to Create a CX Roadmap
- Three reasons why the role of the CMO is now a technology job
- Retail Apocalypse? We don’t think so.
- Five technologies helping brand and CPG manufacturers survive disruption
- Digital transformation is everywhere. But did you forget to transform your security program?
- What is an ounce of cybersecurity prevention worth?
- Three Energy and Utility Trends to Watch in 2019
- Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
- How 5G Impacts Your CX Strategy
- IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
- Why your digital transformation strategy requires a risk management plan
- Overcoming the challenges to digital transformation
- Three reasons why SD WAN is essential for cloud migration
- SD WAN vs. MPLS: Understanding the Difference
- Four ways AI can help build an omnichannel customer experience
- Though behind the scenes, cybersecurity is a star in the media and entertainment industries
- Why connectivity is key to digital transformation
- How Digital Transformation Impacts CX
- How technology is driving the transformation of content
- Security in the public cloud: Get peace of mind
- The Challenges and Benefits of Securing Hybrid Clouds
- Private cloud security: What’s the difference?
- When self-service is done right
- Smart City 3.0
- Why rethinking your software culture can be a competitive advantage
- Six reasons you can’t afford to go cheap on network
- A thought experiment about shared credentials
- Acceptable use policies: Keeping your workplace secure
- Advanced threat detection – Adapting to change
- Anatomy of well-managed malware incident
- Briefing the board: Directing security evolvement
- Can you explain IoT without saying IoT?
- CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
- Creating the city of the future today
- CX Day 2017: Celebrating customer experience
- Data breaches: how long does the damage last?
- Darknet: The shady underbelly of the iceberg
- Data Breach Digest Update Data ransomware the Catch 22
- Delivering smart, sustainable energy solutions
- Data breaches in industrial environments: Safety comes first
- Error detecting data visualizations
- Help Me, Help You. Sincerely, Your Customer.
- Make sure the bad guys don’t get what they’re hoping for this Christmas
- Man vs machine, which delivers the best customer experience?
- My experience with the Kano Model
- Insider Threat: One pattern, four scenarios, thirteen countermeasures
- My superb Go-To-Gemba customer experience
- Powering the digital economy with modern utilities
- Preparing for GDPR? PCI DSS could help
- Smart cities are the wave of the future
- Smart traffic helps improve quality of life
- Social engineering: Strengthening the weakest link
- Where SMBs have the upper hand
- What to consider when planning your future digital network
- This framework ain't big enough for the both of us
- What does IoT really mean for the enterprise
- Verizons Data Breach Digest - Perspective is reality
- Retail’s Digital Roadmap
- Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
- Mobile Customer Experience: Savvy shoppers Ready associates
- Incident Management Focus: Two Approaches to Incident Response Plans
- I Admit It: I’m Biased
- How to retain viewers with your online video services
- Virtual Network Security Services
- Announcing VERIS Community
- Are we reaching the limits of technology?
- Virtual Network Services- WAN Optimization
- Find the Right Construction Management Tools
- Usage-Based Car Insurance Solutions
- Enable Banking Virtually Anywhere with Wireless ATMS
- Verizon Intelligent Video and Smart Surveillance
- Ethernet Services & Ethernet Architecture Solutions
- VGo Mobile Telepresence Robot Case Study
- Fleet Maintenance and Performance Case Study
- Auto Dealer Solutions for Courtesy Cars Case Study
- Car Rental Solutions Streamline Rental Operations to Create New Business Models
- Smart Fleet Management Basics
- ICS Security Services
- Adaptive CX Means Liquid Personalization
- Verizon Wireless Private Network Connections
- Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
- Wireless Backup Solutions
- Are you living in a glass house?
- Utilities and Energy Management Technologies
- When it comes to CX, don’t get hung up on the jargon
- Tough Love and the Customer Experience Culture
- “Retail is Dead” — and Other Rumors with no Validity
- Are your vendors the weak link in your cybersecurity?
- Banks—It’s Time To Start Talking To Each Other, Say UK Police
- Cloud storming: You need more than an umbrella to stay secure
- M2M Transportation Solutions Brief
- Network Security Solutions
- Fact Sheet: Verizon Network Analytics
- Customer Experience and the Security Paradox
- Customer Experience Mystification
- Cybersecurity In 2017: It’s Not All Doom And Gloom
- Digital Convergence: The Perfect Storm
- Does connected working kill innovation?
- Don’t make a fish climb a tree: customer preferences matter.
- EESI as Pie: Essential Elements of a Successful Intrusion
- Federal Government Modernization: Priorities for the Federal IT Executive
- Five Ways Tech Can Supercharge Your CX Team
- Get a new perspective on cybersecurity
- Have Your Metrics Become Your Master?
- How to move from product first to customer first
- IoT: from theory to practice
- Is automation your golden ticket to great CX?
- To Sell Or To Serve?
- Just because you can, doesn’t mean you should
- Keep the "personal" in personalized customer experience
- Make the right cybersecurity investments
- The four pillars of digital transformation
- Stop feeding your customers air sandwiches
- Dedicated IP Internet Services
- Retail Industry Solutions
- Connected working: think outside the box
- Travel and Hospitality Industry Solutions
- Virtual Network Services
- M2M Solutions for Government Brief
- State of the Market: Internet of Things 2017
- Grid Intelligence Water Case Study
- Private IP: Get a network that grows with your business.
- United Security Services
- Business Connections- Business Communication Solutions
- Verizon Cypher Encryption Software
- Achieve Operational Transformation with Dynamic IT Services
- Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
- Workplace Mobility Strategies
- Espionage Health Check
- E-Discovery Support
- Push to Talk Plus Phones & Technology
- Security Incident Response Analytics
- Visual Interactive Calling
- Fleet management service helps improve performance and cut costs
- A Foundation for Growth with Data Center Consolidation and More
- Assessing Intrusion Detection
- Digital Advisory Services - Software Defined Networking Strategic Assessment
- Network Threat Monitoring
- Virtual Network Services-Security
- Drive Business with Fleet Telematics Solutions
- Business Smartphones Jump-Start Productivity
- Mobile Device Management
- Fleet Management Solutions Factsheet
- A better way to get the latest CPE technology
- Rapid Response Services
- Verizon Rapid Delivery Platform
- Advanced Network Experts Retainer
- Cyber Risk Management Program
- Internet Dedicated Services
- Express Connect WAN Services
- Intelligent Cloud Control
- MDM Software Management with OTA Distribution
- Managed Security Services
- Computer Emergency Response Team
- Network discovery service: Discover your network’s potential
- IP Contact Center
- Network Management Solutions Brief
- Mobile Technology for Retailers
- Threat Intel and Response Services
- Business VoIP & Business Phone System Solutions
- Security Health Checks
- Law Enforcement and Public Safety Solutions Brief
- M2M Finance Solutions Brief
- Choosing a Wireless Network Provider
- 4G LTE Enables Business
- Wireless ATMs & Kiosks Factsheet
- Simplify Your Grid Solution
- Take Control of Infrastructure Security with Intelligent Video Surveillance
- Smart Lighting Technology Brief
- Grow your business with leading-edge proof of concept testing
- Managed Security Services – Analytics
- ThingSpace IoT Management
- SD WAN Services
- DDoS Protection Service: DDoS Shield
- Smart Communities Solutions
- Enterprise Mobility Management Solution from MobileIron
- Custom Apps and eForms for Mobile Devices
- Making the Case for MPLS VPNs in the Modern Enterprise
- Diary of a cybercriminal
- HP Elite x2 Business PC on the Verizon 4G LTE Network
- Private Network Traffic Management
- Retail M2M solutions
- SD WAN Service with Application Aware Routing
- Virtual Network Services Solutions Brief
- The Verizon Fleet Management System
- Verizon Condition-Based Maintenance Solutions
- Private Network Traffic and Bandwidth Management
- Verizon ThingsSpace IoT Development Platform
- The Verizon Network-Backed Asset Tracking System
- The resonant theme of RSA 2016
- Optimize Fleet Operations With Verizon Autoshare
- Unified Communications and Collaboration as a Service Factsheet
- Networkfleet Fleet Management Case Study
- Leading the way for vision zero
- How SDN can help your business transform and grow
- Helping your workers get the most out of your new cloud based communications solution
- Implementing automation in your contact center read this first
- How to keep your business communications secure
- Five reasons why your business needs software-defined networking
- The Delicate Nature of Trust
- Will SDN replace MPLS? Not so fast.
- The future of connected vehicles hinges on today’s investments.
- Disclosing cyber risk? New SEC guidance requires it.
- Revolutionize your communications: Migrating to a cloud-based platform
- The role human touch plays in the digital customer experience.
- The importance of public-private partnerships to make smart cities a reality
- Staying Ahead of the Curve
- Why network visibility is important for your business
- Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
- How to break down the barriers to SDN adoption
- Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
- The four key steps to improving customer experience with artificial intelligence
- Staying safe online: Observing good digital hygiene
- 2017 Data Breach Digest: Half Year Anniversary
- Better living through parking
- Your Endpoint Security Strategy Needs a Hug
- 5G and autonomous vehicles: turning fiction into reality
- Making cities safer for everyone
- Be a better bot boss: 3 tips for CX chatbot success
- Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
- For insurers, failure is learning—and you need to learn fast.
- Network Orchestration Enhances Digital Transformation
- It’s real: Digital transformation is already delivering results
- The Humanability of Smart Cities
- How DevOps can turn IT into the leaders of your business
- Knowledge is power: How an intelligent knowledge base powers CX
- Light the way to futureproof your smart city investment
- Why DevOps is critical for improving the customer experience
- Operation "Surprise and Delight"
- Get the SD WAN facts before you buy
- Are you "over-sharing" your customer feedback data?
- Why risk scoring is critical for your business (and your career)
- Changing consumer demands are forcing entire business models to be rethought
- Cyber security posture FAQ: know your cyber risk
- Deception Technology: A strategic imperative for detection and response
- Voice Security Strategy Best Practices
- CX Improvement: The need to put consumer data protection and privacy first
- The Digital Transformation of the NFL Stadium and the 5G Fan Experience
- How to Improve Customer Experience
- Customer Personalization: The time is now for customized experiences
- Why Cyber Risk Visibility is the Key to Security
- 2019 LinkedIn Phishing Threat
- Minimize Your Attack Surface
- How Velocity Can Impact Cyber Security Strategy
- The top 10 criteria for selecting an SD WAN vendor
- How to implement SD WAN architecture the right way
- The Power of SD WAN and 5G
- Creating an Effective Cyber Security Incident Response Plan
- Embedded Universal Integrated Circuit Card
- How digital transformation is impacting the utilities sector
- How to promote teamwork among remote employees
- Three keys to managing remote employees
- Business Impact of Coronavirus: Ready in the Face of Uncertainty
- Tips to promote connectivity in digital workplace
- Accelerate Your Digital Workplace with 5G Mobility
- How to Prevent Phishing & Malware Attacks
- Tips and strategies to improve virtual meeting performance
- PCI Compliance: What to Know About Digital Payment Security
- Getting Calls When Working Remotely
- Keep your business open when your location is closed
- How to improve the customer service experience in crisis situations
- Methods & Types of Business Communication Services that Businesses Rely On
- How to Work Remotely Using Collaboration Tools
- How Mobile Hotspots Can Help When Working Remotely
- Teamwork and Collaboration Best Practices
- Remote Work Security Policy & Best Practices
- Streamline CX with Better Tech Integration
- Creating a Personalized Customer Experience
- Does your school have these five critical security features?
- Telehealth Relief for COVID-19
- Transform Your Network with Edge Computing
- Five ways the cloud can help improve your school's security
- How to enhance distance learning and remote employee training sessions
- What is Zero Trust Architecture
- Remote Work Tips for the Public Sector
- Five top mobile security threats
- Strategic Outsourcing
- Tips for Small Businesses in a Tough Economy
- The Future of Telehealth Starts Today
- Considering Remote IT Support Solutions
- Four tips to strengthen your digital marketing strategy
- User Experience Checklist
- BYOD Security for Remote Employees
- Building a 30/60/90 Day Business Plan
- Create an Acceptable Use Policy
- Strategize with Small Business Cyber Security Plan
- Small Business Cyber Security and Data Breaches
- Five productivity tips for your newly remote team
- Corporate Network Enhancements
- In cybersecurity, integrity matters.
- Creating the New Normal for Your Small Business
- Connectivity best practices for distance learning
- Scalable Network Solutions During Critical Events
- Ways to Find New Customers Now
- How to Protect Data Security
- Small Business Innovation for Big Impact
- Finding Alternative Small Business Funding
- Tips to Transition to Working from Home
- Five best practices for choosing the right security provider
- Three next-gen technologies that will define cybersecurity in the next decade
- IoT security: Why you need to encrypt your data
- Analyzing the COVID-19 data breach landscape
- Design considerations for a 5G network architecture
- Five security blind spots you might not realize you have
- How to drive business agility with remote collaboration tools
- Mapping the 5G impact in the retail industry
- 5G and IoT: The future of efficiency
- The 5G evolution: Exploring the journey from 2G to 5G
- Funding Safe and Secure Elections During the COVID-19 Pandemic
- Low-latency 5G and the opportunities it can create
- Three 5G application scenarios and how they could change your workforce
- Optimizing business communications networks by combining SD WANs and MPLS
- A guide to unified communications solutions: beyond VoIP and video
- Improving customer experience with a contact center provider
- Strategies to Get 5G Ready
- The industries that will benefit from 5G
- Optimize fleet operations through smarter supply chain disaster management
- Six design principles to help mitigate latency
- Understanding the five C’s of Latency
- Where 5G and MEC work together
- Securing your 5G edge computing architecture for business success
- Unpacking the “5G” in Verizon’s 5G edge
- Cloud computing security: Is it safer than on-premises?
- How AI improves the customer experience
- The human element in cyber security: When user error is the problem
- Security threats in e-commerce: Protecting data while maintaining customer experience
- How a power grid attack threatens the energy industry
- Mobile device security in the workplace: five policies you must have
- Cloud contact center technology: empowering your employees
- How IIoT in manufacturing is made possible with MEC and 5G
- How to cultivate customer relationships through social engagement
- Supply chain communication strategies for successful management
- What is edge computing and where is it being used?
- 5G and edge computing: configuring the edge topology
- Collaboration tools: focus on interoperability to avoid tool fatigue
- How intelligent routing can improve the contact center experience
- Securing the smart city of the future
- Building a successful digital transformation strategy
- Video conferencing network requirements: delivering the best user experience
- Solving common remote work endpoint security challenges
- Real-time crime centers and law enforcement technology
- 5G and IoT edge computing: driving future business value
- Smart cities and cyber security: protecting citizens from malicious attacks
- Mapping the digital customer experience for optimal growth
- 5G and AI: creating a connected global business
- The power of AI: artificial intelligence examples for a modern world
- Edge computing vs. cloud computing: What are the benefits in higher education?
- A guide to IT/OT convergence
- IoT in retail can help improve the customer experience
- The benefits of contact and call center speech analytics software
- New collaboration tools: rolling out an enterprise application
- How cloud contact center solutions help workforce productivity
- Diversify the contact center experience to better serve your customers
- Benefits of unified communications services and platforms
- IoT risk management in the mining industry
- How virtual hold technology can boost customer satisfaction
- How cloud-based call center solutions can boost customer satisfaction
- Effective communication strategies in business for 2021 and beyond
- Vehicle tracking solutions that can help protect drivers and customers
- IoT and healthcare: near real-time health monitoring on hospital floors
- How IoT and big data are transforming the construction industry
- Nation-state cyber attacks aren't like your average cyber adversary
- AI hacking: How IT security leaders can mitigate emerging cyber risks
- What is a zero-day attack? How to prepare and respond
- Social engineering attacks to watch out for
- Four enterprise communications trends for 2021 and beyond
- Edge computing examples: what is your edge?
- 5G and telemedicine: Hospitals should take an individualized approach
- Why deepfake video is a real threat to businesses
- Fostering smart construction site solutions with a temporary network
- Learning from cyber espionage attacks like Operation Soft Cell
- User behavior analytics and the technology you need to realize its value
- The next wave of telehealth services is coming, and 5G will power it
- Secure fleet vehicle management is increasingly critical
- Construction cyber security: protecting the worksite against threats
- Professional and Managed Services Vendor: 4 Factors to Consider
- Big data security and privacy concerns in healthcare
- Is a cloud-based phone system right for your business?
- AI-powered customer engagement: Is it worth the investment?
- How pairing UCaaS and CCaaS transforms the customer experience
- The future of education technology
- Improving patient experience through on-premises telemedicine
- Innovations in healthcare technology see boost from pandemic
- Methods of communication on a construction site for a staggered team
- Lessons from the RobbinHood ransomware attack on Baltimore
- 2021 Resolutions for CISO & Security Leaders
- Condition-based monitoring is crucial for preventative maintenance
- A customer engagement strategy for insurance includes virtual call centers
- Will hosted VoIP solve your mobile communications woes?
- Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
- How to budget for cyber security costs—and why it's crucial
- Session hijacking attacks: understanding and preventing them
- Can the cloud be hacked?
- How a local government IT strategy can benefit from managed services
- Cloud contact center solutions empower exceptional customer experiences
- What is 5G Network Architecture?
- How Businesses Should Prepare for 5G
- How will 5G Affect Business?
- The Future of 5G: 5G-Powered Technologies
- What is 5G Beamforming?
- The digital transformation challenges confronting retailers in 2020
- Finding the future of IoT in municipal government
- Enabling manufacturing automation and factory cost controls with IIoT
- From intelligent lighting to smart metering: how energy and utilities are transforming
- How to Build a Smart City from the Ground Up
- How to solve public sector technology and government IT challenges
- Extending the lifespan of IoT sensors in industrial devices
- The future of healthcare technology—faster access and better information through 5G
- Virtual contact centers for small businesses: how cloud-based options help
- 5G and connected cars: the next-generation automotive industry
- Learning from a backdoor attack: the takeaways of Operation ShadowHammer
- Cyber security threats to schools and how to protect against them
- Security vulnerability scanning on an ever-expanding attack surface
- Is your organization's incident response plan up to par?
- How camera hacking threatens remote workers—and their organizations
- How data encryption protects patients
- Exceed customer expectations with these five technologies
- How cloud security best practices keep hospitals healthy
- Social media phishing is on the rise
- Considerations for a new small business network
- A work-from-home security policy is essential for businesses
- Financial services cyber security and edge computing
- How user experience testing can detect customer experience friction in e-commerce
- How the media and entertainment industry is using mobile edge computing
- Disaster recovery after a hotel data breach
- Is AI the future of personalized healthcare?
- The benefits of network slicing: flexibility and more
- How 5G will impact the future of farming
- Cyber security posture FAQ: know your cyber risk
- How public safety systems support natural disaster recovery
- Preparing for disaster with storage virtualization
- Is augmented reality the future of CX?
- 5G vs. Wi-Fi 6: how do they compare?
- Interactive voice response (IVR) systems: three tests to pass
- Cyber security for smart energy and renewables
- Digital signage can help transform public transportation
- 10 Considerations for an ideal edge computing model
- Contact center infrastructure in the cloud has never been a better option
- Contact center outsourcing: four signs your business is ready
- Deliver a personalized customer experience to transform your brand's customer relationships
- Intersection safety and the technology that will bring it to your town
- PRI vs. SIP trunking: what's best for your business?
- Refund fraud: how to spot refund scams and prevent them
- The business benefits of unified communications (UCaaS)
- VoIP trends: the future of the VoIP industry is clear (and flexible)
- Creating a customer-centric culture
- 5G-enabled simultaneous translations: how companies are creating shared global experiences
- Combining Interactive Voice Response (IVR) and Automatic Call Distribution (ACD) to meet customer needs
- Business communications solutions to keep remote teams connected
- UCaaS: how retail call centers are improving customer service with the cloud
- Retaining talent post-pandemic: is technology friend or foe?
- Virtual collaboration in the workplace and the bionic organization
- The overlooked signs of a network data breach
- Deploying a unified communications system—and supporting your IT team while doing it
- How ensuring contact center security helps maintain customer trust
- An effective customer engagement strategy is essential to improving CX
- Senior leadership skills and the new, digitally savvy executive
- How to assess business collaboration technology: the data you need
- Dual Web Application Firewall
- Mobile Security Strategy: Beyond Devices and Users
- Keep ahead of the curve: Small business advice for 2021
- Using social media to connect with customers
- Home
- Resources
-
Articles
- Recognition
- Vidder
- Events
- Learn the Basics
- Stay Informed
- Solutions Briefs
- Latest Business News Articles
- Coronavirus (COVID-19) Response for Businesses
- Whitepapers
- Free Enterprise Webinars and Registration
- Mobility
- 5G
- Business Communications
- Internet of Things
- Security
- Customer Experience Services
- Network
- Energy and Utilities
- Healthcare
- Financial Services
- Manufacturing
- Media and Entertainment
- Public Safety
- Public Sector
- Retail
- Technology
- Transportation and Distribution
- Travel and Hospitality
- Education
- Federal Government
- State and Local Government
- Business Continuity
- Customer Success Stories
-
Impact of Communication in Cybersecurity
- 2019 LinkedIn Phishing Threat
- Five best practices for managing your network security in the age of digital transformation
- Cybersecurity Benchmarking: Do you out-secure the competition?
- Six ways to strengthen network security and maintain a competitive edge
- Cybersecurity and 5G
- Small Business Webinar: Leading Through Uncertainty
- Navigating the CARES Act process
- How Tools That Leverage Blockchain Can Address Escalating Security Concerns
- Contact Center Workforce Management
- IT/OT Alignment on the Factory Floor: Tips for a Smooth Transition
- What is UCaaS and is it right for my organization?
- Zero trust security framework: benefits and downsides
- 5G network slicing: Do you have the team you need?
- How to Run a Public Meeting Online
- Why You Need Managed Detection And Response Services
- The golden age of voice communications
- Worried about fraudulent calls? Build a strong voice security strategy
- Why 56 % of large business are turning to SDN for cybersecurity
- What are successful CX leaders doing differently?
- Three ways technology can enhance your contact center performance
- Five CIO Strategies to Create a CX Roadmap
- Three reasons why the role of the CMO is now a technology job
- Retail Apocalypse? We don’t think so.
- Five technologies helping brand and CPG manufacturers survive disruption
- Digital transformation is everywhere. But did you forget to transform your security program?
- What is an ounce of cybersecurity prevention worth?
- Three Energy and Utility Trends to Watch in 2019
- Stop skimping. Cybersecurity breaches can severely hurt your bottom line.
- How 5G Impacts Your CX Strategy
- IoT Device Security: 6 Ways to Protect Against Often Overlooked Threats
- Why your digital transformation strategy requires a risk management plan
- Overcoming the challenges to digital transformation
- Three reasons why SD WAN is essential for cloud migration
- SD WAN vs. MPLS: Understanding the Difference
- Four ways AI can help build an omnichannel customer experience
- Though behind the scenes, cybersecurity is a star in the media and entertainment industries
- Why connectivity is key to digital transformation
- How Digital Transformation Impacts CX
- How technology is driving the transformation of content
- Security in the public cloud: Get peace of mind
- The Challenges and Benefits of Securing Hybrid Clouds
- Private cloud security: What’s the difference?
- When self-service is done right
- Smart City 3.0
- Why rethinking your software culture can be a competitive advantage
- Six reasons you can’t afford to go cheap on network
- A thought experiment about shared credentials
- Acceptable use policies: Keeping your workplace secure
- Advanced threat detection – Adapting to change
- Anatomy of well-managed malware incident
- Briefing the board: Directing security evolvement
- Can you explain IoT without saying IoT?
- CIOs need to embrace digital customer experience (CX), otherwise CIO will stand for “Career Is Over”
- Creating the city of the future today
- CX Day 2017: Celebrating customer experience
- Data breaches: how long does the damage last?
- Darknet: The shady underbelly of the iceberg
- Data Breach Digest Update Data ransomware the Catch 22
- Delivering smart, sustainable energy solutions
- Data breaches in industrial environments: Safety comes first
- Error detecting data visualizations
- Help Me, Help You. Sincerely, Your Customer.
- Make sure the bad guys don’t get what they’re hoping for this Christmas
- Man vs machine, which delivers the best customer experience?
- My experience with the Kano Model
- Insider Threat: One pattern, four scenarios, thirteen countermeasures
- My superb Go-To-Gemba customer experience
- Powering the digital economy with modern utilities
- Preparing for GDPR? PCI DSS could help
- Smart cities are the wave of the future
- Smart traffic helps improve quality of life
- Social engineering: Strengthening the weakest link
- Where SMBs have the upper hand
- What to consider when planning your future digital network
- This framework ain't big enough for the both of us
- What does IoT really mean for the enterprise
- Verizons Data Breach Digest - Perspective is reality
- Retail’s Digital Roadmap
- Numbers Aren’t Enough: CX Professionals Need to Be Storytellers Too
- Mobile Customer Experience: Savvy shoppers Ready associates
- Incident Management Focus: Two Approaches to Incident Response Plans
- I Admit It: I’m Biased
- How to retain viewers with your online video services
- Virtual Network Security Services
- Announcing VERIS Community
- Are we reaching the limits of technology?
- Virtual Network Services- WAN Optimization
- Find the Right Construction Management Tools
- Usage-Based Car Insurance Solutions
- Enable Banking Virtually Anywhere with Wireless ATMS
- Verizon Intelligent Video and Smart Surveillance
- Ethernet Services & Ethernet Architecture Solutions
- VGo Mobile Telepresence Robot Case Study
- Fleet Maintenance and Performance Case Study
- Auto Dealer Solutions for Courtesy Cars Case Study
- Car Rental Solutions Streamline Rental Operations to Create New Business Models
- Smart Fleet Management Basics
- ICS Security Services
- Adaptive CX Means Liquid Personalization
- Verizon Wireless Private Network Connections
- Entertainment and Media Technology Solutions Help You Deliver More Engaging Content
- Wireless Backup Solutions
- Are you living in a glass house?
- Utilities and Energy Management Technologies
- When it comes to CX, don’t get hung up on the jargon
- Tough Love and the Customer Experience Culture
- “Retail is Dead” — and Other Rumors with no Validity
- Are your vendors the weak link in your cybersecurity?
- Banks—It’s Time To Start Talking To Each Other, Say UK Police
- Cloud storming: You need more than an umbrella to stay secure
- M2M Transportation Solutions Brief
- Network Security Solutions
- Fact Sheet: Verizon Network Analytics
- Customer Experience and the Security Paradox
- Customer Experience Mystification
- Cybersecurity In 2017: It’s Not All Doom And Gloom
- Digital Convergence: The Perfect Storm
- Does connected working kill innovation?
- Don’t make a fish climb a tree: customer preferences matter.
- EESI as Pie: Essential Elements of a Successful Intrusion
- Federal Government Modernization: Priorities for the Federal IT Executive
- Five Ways Tech Can Supercharge Your CX Team
- Get a new perspective on cybersecurity
- Have Your Metrics Become Your Master?
- How to move from product first to customer first
- IoT: from theory to practice
- Is automation your golden ticket to great CX?
- To Sell Or To Serve?
- Just because you can, doesn’t mean you should
- Keep the "personal" in personalized customer experience
- Make the right cybersecurity investments
- The four pillars of digital transformation
- Stop feeding your customers air sandwiches
- Dedicated IP Internet Services
- Retail Industry Solutions
- Connected working: think outside the box
- Travel and Hospitality Industry Solutions
- Virtual Network Services
- M2M Solutions for Government Brief
- State of the Market: Internet of Things 2017
- Grid Intelligence Water Case Study
- Private IP: Get a network that grows with your business.
- United Security Services
- Business Connections- Business Communication Solutions
- Verizon Cypher Encryption Software
- Achieve Operational Transformation with Dynamic IT Services
- Verizon Collaboration Services: Erase Boundaries and Communicate with Ease
- Workplace Mobility Strategies
- Espionage Health Check
- E-Discovery Support
- Push to Talk Plus Phones & Technology
- Security Incident Response Analytics
- Visual Interactive Calling
- Fleet management service helps improve performance and cut costs
- A Foundation for Growth with Data Center Consolidation and More
- Assessing Intrusion Detection
- Digital Advisory Services - Software Defined Networking Strategic Assessment
- Network Threat Monitoring
- Virtual Network Services-Security
- Drive Business with Fleet Telematics Solutions
- Business Smartphones Jump-Start Productivity
- Mobile Device Management
- Fleet Management Solutions Factsheet
- A better way to get the latest CPE technology
- Rapid Response Services
- Verizon Rapid Delivery Platform
- Advanced Network Experts Retainer
- Cyber Risk Management Program
- Internet Dedicated Services
- Express Connect WAN Services
- Intelligent Cloud Control
- MDM Software Management with OTA Distribution
- Managed Security Services
- Computer Emergency Response Team
- Network discovery service: Discover your network’s potential
- IP Contact Center
- Network Management Solutions Brief
- Mobile Technology for Retailers
- Threat Intel and Response Services
- Business VoIP & Business Phone System Solutions
- Security Health Checks
- Law Enforcement and Public Safety Solutions Brief
- M2M Finance Solutions Brief
- Choosing a Wireless Network Provider
- 4G LTE Enables Business
- Wireless ATMs & Kiosks Factsheet
- Simplify Your Grid Solution
- Take Control of Infrastructure Security with Intelligent Video Surveillance
- Smart Lighting Technology Brief
- Grow your business with leading-edge proof of concept testing
- Managed Security Services – Analytics
- ThingSpace IoT Management
- SD WAN Services
- DDoS Protection Service: DDoS Shield
- Smart Communities Solutions
- Enterprise Mobility Management Solution from MobileIron
- Custom Apps and eForms for Mobile Devices
- Making the Case for MPLS VPNs in the Modern Enterprise
- Diary of a cybercriminal
- HP Elite x2 Business PC on the Verizon 4G LTE Network
- Private Network Traffic Management
- Retail M2M solutions
- SD WAN Service with Application Aware Routing
- Virtual Network Services Solutions Brief
- The Verizon Fleet Management System
- Verizon Condition-Based Maintenance Solutions
- Private Network Traffic and Bandwidth Management
- Verizon ThingsSpace IoT Development Platform
- The Verizon Network-Backed Asset Tracking System
- The resonant theme of RSA 2016
- Optimize Fleet Operations With Verizon Autoshare
- Unified Communications and Collaboration as a Service Factsheet
- Networkfleet Fleet Management Case Study
- Leading the way for vision zero
- How SDN can help your business transform and grow
- Helping your workers get the most out of your new cloud based communications solution
- Implementing automation in your contact center read this first
- How to keep your business communications secure
- Five reasons why your business needs software-defined networking
- The Delicate Nature of Trust
- Will SDN replace MPLS? Not so fast.
- The future of connected vehicles hinges on today’s investments.
- Disclosing cyber risk? New SEC guidance requires it.
- Revolutionize your communications: Migrating to a cloud-based platform
- The role human touch plays in the digital customer experience.
- The importance of public-private partnerships to make smart cities a reality
- Staying Ahead of the Curve
- Why network visibility is important for your business
- Are You About to Sever the Final Thread Your Dissatisfied Customer Is Clinging To?
- How to break down the barriers to SDN adoption
- Keep an eye on these five KPIs as you drive improved customer experience using artificial intelligence
- The four key steps to improving customer experience with artificial intelligence
- Staying safe online: Observing good digital hygiene
- 2017 Data Breach Digest: Half Year Anniversary
- Better living through parking
- Your Endpoint Security Strategy Needs a Hug
- 5G and autonomous vehicles: turning fiction into reality
- Making cities safer for everyone
- Be a better bot boss: 3 tips for CX chatbot success
- Virtual Reality / Augmented Reality: A humanizing revolution for customer engagement
- For insurers, failure is learning—and you need to learn fast.
- Network Orchestration Enhances Digital Transformation
- It’s real: Digital transformation is already delivering results
- The Humanability of Smart Cities
- How DevOps can turn IT into the leaders of your business
- Knowledge is power: How an intelligent knowledge base powers CX
- Light the way to futureproof your smart city investment
- Why DevOps is critical for improving the customer experience
- Operation "Surprise and Delight"
- Get the SD WAN facts before you buy
- Are you "over-sharing" your customer feedback data?
- Why risk scoring is critical for your business (and your career)
- Changing consumer demands are forcing entire business models to be rethought
- Cyber security posture FAQ: know your cyber risk
- Deception Technology: A strategic imperative for detection and response
- Voice Security Strategy Best Practices
- CX Improvement: The need to put consumer data protection and privacy first
- The Digital Transformation of the NFL Stadium and the 5G Fan Experience
- How to Improve Customer Experience
- Customer Personalization: The time is now for customized experiences
- Why Cyber Risk Visibility is the Key to Security
- 2019 LinkedIn Phishing Threat
- Minimize Your Attack Surface
- How Velocity Can Impact Cyber Security Strategy
- The top 10 criteria for selecting an SD WAN vendor
- How to implement SD WAN architecture the right way
- The Power of SD WAN and 5G
- Creating an Effective Cyber Security Incident Response Plan
- Embedded Universal Integrated Circuit Card
- How digital transformation is impacting the utilities sector
- How to promote teamwork among remote employees
- Three keys to managing remote employees
- Business Impact of Coronavirus: Ready in the Face of Uncertainty
- Tips to promote connectivity in digital workplace
- Accelerate Your Digital Workplace with 5G Mobility
- How to Prevent Phishing & Malware Attacks
- Tips and strategies to improve virtual meeting performance
- PCI Compliance: What to Know About Digital Payment Security
- Getting Calls When Working Remotely
- Keep your business open when your location is closed
- How to improve the customer service experience in crisis situations
- Methods & Types of Business Communication Services that Businesses Rely On
- How to Work Remotely Using Collaboration Tools
- How Mobile Hotspots Can Help When Working Remotely
- Teamwork and Collaboration Best Practices
- Remote Work Security Policy & Best Practices
- Streamline CX with Better Tech Integration
- Creating a Personalized Customer Experience
- Does your school have these five critical security features?
- Telehealth Relief for COVID-19
- Transform Your Network with Edge Computing
- Five ways the cloud can help improve your school's security
- How to enhance distance learning and remote employee training sessions
- What is Zero Trust Architecture
- Remote Work Tips for the Public Sector
- Five top mobile security threats
- Strategic Outsourcing
- Tips for Small Businesses in a Tough Economy
- The Future of Telehealth Starts Today
- Considering Remote IT Support Solutions
- Four tips to strengthen your digital marketing strategy
- User Experience Checklist
- BYOD Security for Remote Employees
- Building a 30/60/90 Day Business Plan
- Create an Acceptable Use Policy
- Strategize with Small Business Cyber Security Plan
- Small Business Cyber Security and Data Breaches
- Five productivity tips for your newly remote team
- Corporate Network Enhancements
- In cybersecurity, integrity matters.
- Creating the New Normal for Your Small Business
- Connectivity best practices for distance learning
- Scalable Network Solutions During Critical Events
- Ways to Find New Customers Now
- How to Protect Data Security
- Small Business Innovation for Big Impact
- Finding Alternative Small Business Funding
- Tips to Transition to Working from Home
- Five best practices for choosing the right security provider
- Three next-gen technologies that will define cybersecurity in the next decade
- IoT security: Why you need to encrypt your data
- Analyzing the COVID-19 data breach landscape
- Design considerations for a 5G network architecture
- Five security blind spots you might not realize you have
- How to drive business agility with remote collaboration tools
- Mapping the 5G impact in the retail industry
- 5G and IoT: The future of efficiency
- The 5G evolution: Exploring the journey from 2G to 5G
- Funding Safe and Secure Elections During the COVID-19 Pandemic
- Low-latency 5G and the opportunities it can create
- Three 5G application scenarios and how they could change your workforce
- Optimizing business communications networks by combining SD WANs and MPLS
- A guide to unified communications solutions: beyond VoIP and video
- Improving customer experience with a contact center provider
- Strategies to Get 5G Ready
- The industries that will benefit from 5G
- Optimize fleet operations through smarter supply chain disaster management
- Six design principles to help mitigate latency
- Understanding the five C’s of Latency
- Where 5G and MEC work together
- Securing your 5G edge computing architecture for business success
- Unpacking the “5G” in Verizon’s 5G edge
- Cloud computing security: Is it safer than on-premises?
- How AI improves the customer experience
- The human element in cyber security: When user error is the problem
- Security threats in e-commerce: Protecting data while maintaining customer experience
- How a power grid attack threatens the energy industry
- Mobile device security in the workplace: five policies you must have
- Cloud contact center technology: empowering your employees
- How IIoT in manufacturing is made possible with MEC and 5G
- How to cultivate customer relationships through social engagement
- Supply chain communication strategies for successful management
- What is edge computing and where is it being used?
- 5G and edge computing: configuring the edge topology
- Collaboration tools: focus on interoperability to avoid tool fatigue
- How intelligent routing can improve the contact center experience
- Securing the smart city of the future
- Building a successful digital transformation strategy
- Video conferencing network requirements: delivering the best user experience
- Solving common remote work endpoint security challenges
- Real-time crime centers and law enforcement technology
- 5G and IoT edge computing: driving future business value
- Smart cities and cyber security: protecting citizens from malicious attacks
- Mapping the digital customer experience for optimal growth
- 5G and AI: creating a connected global business
- The power of AI: artificial intelligence examples for a modern world
- Edge computing vs. cloud computing: What are the benefits in higher education?
- A guide to IT/OT convergence
- IoT in retail can help improve the customer experience
- The benefits of contact and call center speech analytics software
- New collaboration tools: rolling out an enterprise application
- How cloud contact center solutions help workforce productivity
- Diversify the contact center experience to better serve your customers
- Benefits of unified communications services and platforms
- IoT risk management in the mining industry
- How virtual hold technology can boost customer satisfaction
- How cloud-based call center solutions can boost customer satisfaction
- Effective communication strategies in business for 2021 and beyond
- Vehicle tracking solutions that can help protect drivers and customers
- IoT and healthcare: near real-time health monitoring on hospital floors
- How IoT and big data are transforming the construction industry
- Nation-state cyber attacks aren't like your average cyber adversary
- AI hacking: How IT security leaders can mitigate emerging cyber risks
- What is a zero-day attack? How to prepare and respond
- Social engineering attacks to watch out for
- Four enterprise communications trends for 2021 and beyond
- Edge computing examples: what is your edge?
- 5G and telemedicine: Hospitals should take an individualized approach
- Why deepfake video is a real threat to businesses
- Fostering smart construction site solutions with a temporary network
- Learning from cyber espionage attacks like Operation Soft Cell
- User behavior analytics and the technology you need to realize its value
- The next wave of telehealth services is coming, and 5G will power it
- Secure fleet vehicle management is increasingly critical
- Construction cyber security: protecting the worksite against threats
- Professional and Managed Services Vendor: 4 Factors to Consider
- Big data security and privacy concerns in healthcare
- Is a cloud-based phone system right for your business?
- AI-powered customer engagement: Is it worth the investment?
- How pairing UCaaS and CCaaS transforms the customer experience
- The future of education technology
- Improving patient experience through on-premises telemedicine
- Innovations in healthcare technology see boost from pandemic
- Methods of communication on a construction site for a staggered team
- Lessons from the RobbinHood ransomware attack on Baltimore
- 2021 Resolutions for CISO & Security Leaders
- Condition-based monitoring is crucial for preventative maintenance
- A customer engagement strategy for insurance includes virtual call centers
- Will hosted VoIP solve your mobile communications woes?
- Guest experience hospitality: how companies can deliver a best-in-class security and customer experience
- How to budget for cyber security costs—and why it's crucial
- Session hijacking attacks: understanding and preventing them
- Can the cloud be hacked?
- How a local government IT strategy can benefit from managed services
- Cloud contact center solutions empower exceptional customer experiences
- What is 5G Network Architecture?
- How Businesses Should Prepare for 5G
- How will 5G Affect Business?
- The Future of 5G: 5G-Powered Technologies
- What is 5G Beamforming?
- The digital transformation challenges confronting retailers in 2020
- Finding the future of IoT in municipal government
- Enabling manufacturing automation and factory cost controls with IIoT
- From intelligent lighting to smart metering: how energy and utilities are transforming
- How to Build a Smart City from the Ground Up
- How to solve public sector technology and government IT challenges
- Extending the lifespan of IoT sensors in industrial devices
- The future of healthcare technology—faster access and better information through 5G
- Virtual contact centers for small businesses: how cloud-based options help
- 5G and connected cars: the next-generation automotive industry
- Learning from a backdoor attack: the takeaways of Operation ShadowHammer
- Cyber security threats to schools and how to protect against them
- Security vulnerability scanning on an ever-expanding attack surface
- Is your organization's incident response plan up to par?
- How camera hacking threatens remote workers—and their organizations
- How data encryption protects patients
- Exceed customer expectations with these five technologies
- How cloud security best practices keep hospitals healthy
- Social media phishing is on the rise
- Considerations for a new small business network
- A work-from-home security policy is essential for businesses
- Financial services cyber security and edge computing
- How user experience testing can detect customer experience friction in e-commerce
- How the media and entertainment industry is using mobile edge computing
- Disaster recovery after a hotel data breach
- Is AI the future of personalized healthcare?
- The benefits of network slicing: flexibility and more
- How 5G will impact the future of farming
- Cyber security posture FAQ: know your cyber risk
- How public safety systems support natural disaster recovery
- Preparing for disaster with storage virtualization
- Is augmented reality the future of CX?
- 5G vs. Wi-Fi 6: how do they compare?
- Interactive voice response (IVR) systems: three tests to pass
- Cyber security for smart energy and renewables
- Digital signage can help transform public transportation
- 10 Considerations for an ideal edge computing model
- Contact center infrastructure in the cloud has never been a better option
- Contact center outsourcing: four signs your business is ready
- Deliver a personalized customer experience to transform your brand's customer relationships
- Intersection safety and the technology that will bring it to your town
- PRI vs. SIP trunking: what's best for your business?
- Refund fraud: how to spot refund scams and prevent them
- The business benefits of unified communications (UCaaS)
- VoIP trends: the future of the VoIP industry is clear (and flexible)
- Creating a customer-centric culture
- 5G-enabled simultaneous translations: how companies are creating shared global experiences
- Combining Interactive Voice Response (IVR) and Automatic Call Distribution (ACD) to meet customer needs
- Business communications solutions to keep remote teams connected
- UCaaS: how retail call centers are improving customer service with the cloud
- Retaining talent post-pandemic: is technology friend or foe?
- Virtual collaboration in the workplace and the bionic organization
- The overlooked signs of a network data breach
- Deploying a unified communications system—and supporting your IT team while doing it
- How ensuring contact center security helps maintain customer trust
- An effective customer engagement strategy is essential to improving CX
- Senior leadership skills and the new, digitally savvy executive
- How to assess business collaboration technology: the data you need
- Dual Web Application Firewall
- Mobile Security Strategy: Beyond Devices and Users
- Keep ahead of the curve: Small business advice for 2021
- Using social media to connect with customers
-
Impact of Communication in Cybersecurity
Let's
connect.
Choose your country to view contact details.
- Argentina
- Australia
- Austria
- Belgium
- Brazil
- Canada
- Chile
- China
- Colombia
- Costa Rica
- Denmark
- Finland
- France
- Germany
- Hong Kong
- India
- Ireland
- Italy
- Japan
- Korea
- Luxembourg
- Mexico
- Netherlands
- New Zealand
- Norway
- Panama
- Portugal
- Singapore
- Spain
- Sweden
- Switzerland
- Taiwan
- United Kingdom
- United States
- Venezuela
The impact of communication in cybersecurity
Published: June 19, 2019
One of the most important components of any cybersecurity program has nothing to do with firewalls or intrusion detection systems or cloud access security broker deployments. In fact, it’s an asset that doesn’t require licensing, rack-space or even an uninterruptable power supply.
It’s the ability of Chief Information Security Officers (CISO) and their teams to effectively engage and communicate with cybersecurity stakeholders (employees, business line process owners, customers, and executives who hold the cybersecurity purse strings) so they fully understand the role they play in mitigating (or inadvertently increasing) risk to an organization.
Stakeholder engagement (or communication skills) have been called a “soft skill” in countless cybersecurity blogs and technology magazine articles. But, there’s nothing soft about this skill: stakeholder engagement is hard. And it’s well-worth the effort.
The most effective cybersecurity leaders communicate with stakeholders regularly and strategically, and with specific outcomes in mind -- such as encouraging employees to stop using obscure and unapproved cloud-based storage services for critical business purposes such as file transfers.
Other examples of outcome-driven communication include persuading a profitable business line to modify a risky business process and convincing executives to support new cybersecurity program investments.
Annual online employee cybersecurity training alone is not effective stakeholder engagement. Neither is showing up to quarterly board meetings with a six-inch binder stuffed with KPI metrics that mean little to non-IT executives (especially when you could put cybersecurity data into a broader business context, like with the Verizon Risk Report.)
Instead, consider the following techniques and tools to improve your communication in your cybersecurity program and with critical stakeholders.
Use data to win minds -- and stories to win hearts
Two new publications from Verizon – the 2019 Data Breach Investigations Report (DBIR) and the Insider Threat Report – are brimming with data and stories that help organizations in specific industries to better understand the unique threats they face.
For example, the DBIR uses real-world breach data to illustrate how bad cyber actors attack hotels using different tools and techniques than they use when attacking healthcare organizations. Retail stores have very different risk profiles from manufacturers, and so on. And knowing this allows stakeholders across an organization to actively contribute to the defense of an organization.
With DBIR data, companies can adjust policies and procedures to be more effective against the proven attack methods that plague specific industries. A quick glance at social media posts about the recently-released 2019 DBIR shows that many CISOs and their teams are using the DBIR data to educate and influence decision-makers, all the way up to the board of directors.
For example, this year’s DBIR shows that as more companies move to the cloud, so do cybercriminals. Knowing this can drive conversations on the need to adjust corporate cybersecurity policies and business practices to strengthen cybersecurity initiatives and communication.
But data alone doesn’t always inspire stakeholders, especially non-IT employees and executives, to change their behaviors, revisit their business processes or approve a new cybersecurity investment.
That’s where stories come in.
Storytelling has emerged as a powerful tool for CISOs and their teams. Telling true, data-driven stories about cybersecurity makes the abstract real and applicable to stakeholders and their roles in the workplace.
Verizon’s Insider Threat Report, for example, features several stories – anonymized, but drawn from many of Verizon’s middle-of-the-night incident response engagements. These stories walk the reader through cybersecurity breach scenarios and how they were resolved. Using a simple, non-technical (but not dumbed-down) narrative approach, the ITR tells data breach stories that employees can easily see themselves in. This is an important step to getting employees to recognize the role they play in securing your environment.
Ever try to explain to senior executives (who don’t specialize in IT) why your cybersecurity architecture needs an upgrade? Eyes tend to glaze over when you get into the nuts and bolts of network segmentation, firewall rules and DDoS systems. So the DBIR uses a “golf course analogy” instead: investing in cybersecurity enhancements is like installing stickier sand-traps, deeper water hazards, and relocating the tees and the holes every day. Bad cyber actors, this story teaches us, are like selfish golfers: they cheat shamelessly. And we need to make navigating the course as hard as possible for them.
It may sound overly-simplified, but everyone likes a good story, especially when the bad cyber actors are so easy to dislike. Make your stakeholders the heroes of your cybersecurity story by showing them how they can make real contributions to the cybersecurity program, even if they work in a non-IT role. After all, who doesn’t want to be a hero?
Click here for more information on how Verizon can help strengthen your cybersecurity program.
Let's
connect.
Choose your country to view contact details.
- Argentina
- Australia
- Austria
- Belgium
- Brazil
- Canada
- Chile
- China
- Colombia
- Costa Rica
- Denmark
- Finland
- France
- Germany
- Hong Kong
- India
- Ireland
- Italy
- Japan
- Korea
- Luxembourg
- Mexico
- Netherlands
- New Zealand
- Norway
- Panama
- Portugal
- Singapore
- Spain
- Sweden
- Switzerland
- Taiwan
- United Kingdom
- United States
- Venezuela