{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":90,"width":600,"title":"Using your auto-attendant for security with Jesse Gnas","description":"Host: Jeremy Cherny interviews Jesse Gnas, owner of ACS.&amp;nbsp; \u201cWe are basically a business that sells cloud based solutions for voice and data. And we are a full service, single point of contact for all your needs. So that includes the project management through the entire process. So when our clients order new services from us, whether it be a cloud based phone solution or data, we manage that purchase from start to finish. \u201c Why is security important?&amp;nbsp; \u201cThe reason we incorporate those is because they are a very essential lifeline for our businesses to maintain their business model. And in the event, there are any security issues, we want to make sure while we partner with Tobin solutions, that we exhaust all those possibilities that could occur, because they'd otherwise be compromising the business model. \u201c What are you seeing from your side of things in the world of data comp and telecommunications and the demands on you and what people have been around requesting right now? \u201cThe businesses that we currently work with, we've set them up already in an environment where they're able to take their desk phone home, and use their internet at home as a remote teleworker.\u201d How do you stay on top of all these different security threats that are out there? \u201cWe really encourage having an Auto Attendant and I know most businesses love to answer the phone live and they like to take that call and differentiate, differentiate themselves. However, a simple Auto Attendant would say thank you for calling Tobin's solutions. If you'd like to speak to someone live, please press one. that eliminates 100% of the robo calls because robocalls cant\u2019 press one. So it really increases the productivity of the receptionist and many receptionists that I see are \u201c What are some things you did in your prior role in IT around protecting people's data? \u201cYou know, for example, you could put your accounting system on your network. But if you don't have any kind of security measure put in place, everybody, every employee that has asked for access to that network could access anything at all. So that includes all of your financials, your general ledger. And then it also includes not just accessing and viewing, but the ability to modify and change and or delete.\u201d How do you educate your customers on security around Telecom, telecommunications and phone systems? \u201cWe do risk management in our own conversations. Is there any value to having this business turned over to you or an assessment because if someone's in denial, that they've never had a problem, we try to encourage everyone to educate our customers that if you have not had one, a virus or any kind of attack on your business, it's only a matter of time that you will.\u201d     ","author_name":"Security Strong Podcast","author_url":"http:\/\/securitystrong.libsyn.com\/website","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/13892738\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/88AA3C\/\" height=\"90\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/content\/69297857"}