Blog

The activereach blog offers education and inspiration in #security, #collaboration and #connectivity. Our aim is to share vital knowledge with business professionals across all functions – so that they can understand the impact of emerging technology trends and gain insight into how these could be adopted in their organisations.

All content is our own, created by our salesteam, support engineers, tech consultants, and directors. We also pick the best of our technology partners’ blogs, re-published with their kind permission. Opinions expressed are the authors’ own. Comments gratefully received at marketing@activereach.net.

Blog

2018 Contact Centre Predictions: It’s All About the Customer

This month we share a blog from our Technology Partner Enghouse Systems on their 2018 Contact Centre Predictions.

How are Contact Centres going to evolve over the year? Will there be more focus on automation and self-service solutions? A change in the way we handle customer interactions?

Contact Centre Predictions 2018

The role of the contact centre agent will continue to evolve

We expect to see ongoing investment by businesses in self-service and automation solutions during 2018.

more →

Blog

Teamwork and Collaboration: It’s Time for Business Leaders to Embrace Change (Part 1)

Richard Brown

We have reached the limits of individuals’ productivity to the point where employees are saying they are too busy to do their jobs. Business leaders are now recognising that team performance needs to be optimised to drive productivity and growth. It is unreasonable to expect individuals to have all the expertise required to keep on top of everything and so the challenge is to broaden the collective knowledge through teamwork.

more →

Blog

GDPR: Top 10 Technologies To Aid Compliance (Part 5 of 5)

Max Pritchard

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In Part 2, we highlighted the major provisions in the GDPR for technological measures to protect data. In Part 3, we examined some of the guiding principles to be considered in relation to the technological impact of the GDPR within an organization.

more →

Blog

2018 Cybersecurity Predictions – Big Bad Attacks on Automation

What will happen in cyberspace in 2018? How will technology impact the real world over the next year? To kick off 2018, we are sharing a cybersecurity predictions blog from technology partner Radware.

2016 was the Year of DDoS. 2017 was the Year of Ransom. Can we assess leading indicators of new attack techniques and motivations to predict what 2018 will bring?

more →

Blog

Spectre And Meltdown, The Good News

Max Pritchard

Vulnerabilities in modern computers leak passwords and sensitive data

Spectre and Meltdown are the names of theoretical attack techniques which exploit weaknesses in many modern microprocessor chips. The attacks seem to be extremely limited in scope – able only to allow an unauthorised programme to read data from parts of the computer memory that it ought not to have access to.

more →

Blog

GDPR: Compliance Timeline For Implementing Technological Transformation (Part 4 of 5)

In Part 1 of this GDPR blog series, we looked at the PII threat landscape and the legal & financial consequences of technology failure. In Part 2, we highlighted the major provisions in the GDPR for technological measures to protect data. In Part 3, we examined some of the guiding principles to be considered in relation to the technological impact of the GDPR within an organization.

more →

Blog

Is Your Online Business Vulnerable to Bad Bots?

An ever-increasing amount of internet traffic is generated by non-human users. Increasingly, websites are facing large volumes of traffic caused by automated scripts, or bots. According to Incapsula’s 2016 report, 51.8% of web traffic was caused by bots – total bot traffic now exceeds total human traffic. All this traffic can be a significant drain on available bandwidth for websites, and cause issues for real customers trying to access your site.

more →