Home » Archive by category 'Tech' (Page 7)

What is Inside Sales and How is it Changing in 2025?

inside sales

Inside sales have become the most popular sales model for B2B SaaS and many other high-ticket industries. But what are inside sales, how do they compare to outside sales, and …Read More »

The Impact of Missed Sales Calls & How to Track and Turn Into Opportunities

An image showing the impact of missed sales calls in a business.

While self-service and omnichannel options gain popularity, about 78% of contact centers continue to have high or medium usage of phones. This means that most customers call the business for …Read More »

How to Translate Voicemail in Multiple Languages

How to translate business voicemail multiple languages.

Effective communication is key to business success. And voicemail transcripts are a valuable business tool that help improve communication and operational efficiency. For global businesses providing multilingual support and linguistic …Read More »

Using Virtual Numbers to Establish a Local Presence Globally

An image of virtual phone numbers being used to establish local presence in other countries.

Virtual numbers have emerged as a potent instrument for those seeking to broaden their business horizons and establish a global footprint. These numbers harness the power of cloud communications technology …Read More »

5 Call Metrics for Sales Managers

Important call metrics for sales managers to track.

In the ever-evolving business world, sales managers are key to a company’s success. And if you want to optimize your teams’ performance, then it’s vital to track sales call metrics. …Read More »

VoIP versus Cloud Telephony

Is VoIP different than cloud telephony.

Communication is the lifeblood of any business and when it comes to selecting the right modern business phone system. When you look for a business phone solution, you’ll see various …Read More »

Amazing Data Centers Around the World

What makes a data center amazing? It could be size or whether the data center has an environmentally friendly, green design. Aesthetics like beauty, uniqueness, or coolness could make it amazing.  Amazing is in the mind of the beholder. However, this article will begin with size.

World’s Largest Data Centers

On August 30, 2017, Hannah Williams reported on the 10 largest data centers by square footage in COMPUTERWORLDUK. The following table lists the centers and their sizes.

 

Largest Data Centers in the World by Square Footage
Data Center Location Size (sq ft) Data Center Location Size (sq ft)
The Citadel Reno, NV, USA 7.2 million Utah Bluffdale, UT, USA 1.5 million
Kolos Ballangen, Norway 6.5 million Microsoft West Des Moines, IA, USA 1.2 million
Range Int’l Langfang, China 6.3 million Lakeside Tech Center Chicago, IL, USA 1.1 million
Switch SuperNAP Las Vegas, NV, USA 3.5 million Tulip Bangalore, India 1.0 million
DuPont Fabros Tech Ashburn, VA, USA 2.1 million QTS Atlanta-Metro Atlanta, GA, USA 990,000

The Citadel

The global technology company Switch owns the Citadel. The Citadel’s connection time to Los Angeles is 9 msecs via the Switch Superloop. Then, from LA to the Core Campus takes an additional 7 msecs via fiber link. The Campus, including all data centers, has a design capacity of 650 megawatts of power. It also delivers 100% renewable energy, making it the largest and greenest data center in the world.

Kolos

Kolos is located north of the Arctic Circle. It will have computing power capacity of 1,000 megawatts, which will get electricity from Norway’s abundant hydropower capability. The project represents a significant milestone in hyperscale cloud infrastructure, offering unprecedented computational resources in an environmentally strategic location. It will have a unique hyperscale data center designed with sustainability and security in mind. The site will open in the fourth quarter of 2018, will full completion by 2027.

data centers
Source: Shutterstock 306988172 – Standard License

Range International Information Group

Public and private funds financed this data center that services the IT sectors of private enterprises and the Chinese government. Construction began in 2013 and finished in 2016. IBM provided design services, technology, business applications, training, and support as needed.

Switch SuperNAP

The Switch SuperNAP site delivers data to Reno in 7 msecs, which allows 50 million people to access data within 14 msecs. This site has planned expansions in 2020 and 2025.

DuPont Fabros Technology

DuPont Fabros Technology consists of 7 buildings in Ashburn, Virginia that operate as a data center campus. The size of the campus is 160 acres. Each of the data center elements accommodates 10,500 servers. The campus total critical load is 208 megawatts operating with a medium voltage distribution system. It also uses isolated parallel power supply topology. During the latter part of 2017, Digital Realty acquired DuPont Fabros Technology, which ceased operations on September 14, 2017.

Utah

This site is a data center for the National Security Agency (NSA). It has a power capacity of 65 megawatts at an annual cost of $40 million. Its Tier 3 data center occupies 100,000 sq ft, administration and technical support, 900,000 sq ft, and the total campus, 1.5 million sq ft. Utah uses 1.7 million gallons of water per day, and its near-term data storage is between 3 and 12 exabytes. (An exabyte equals 1018 bytes.).

Microsoft

The facility occupies 200 acres at a projected cost of $2 billion. This is Microsoft’s largest data center. It will employ 133 persons. The data center is situated in 3 West Des Moines, Iowa locations to reduce the risk from natural disasters like tornadoes.

Lakeside Technology Center

Digital Realty Trust owns Lakeside Technology Center. It used by IBM, CenturyLink, and Facebook, among others. The data center has three electric power feeds to provide 100 megawatts of power, and there are 53 power backup generators. It uses 8.5 million gallons of cooling water per year. Its infrastructure space has four fiber vaults.

Tulip Data Center

Tulip is India’s largest data center. Tulip Telecom owns the site, and IBM assisted with the design of power, cooling, rack layout, and technology. There are 12,000 server racks back up by 100 megawatts of power. Tulip meets Leadership in Energy and Environmental Design (LEED) gold standards and is an Uptime Institute Tier IV facility.

QTS Atlanta-Metro

Quality Technology Services (QTS) owns and operates this data center, which has an on-site Georgia Power substation and fiber access to several carriers. QTS offers its clients flexible solutions, secure facilities, real-time visibility, and expert support. The ATS Atlanta-Metro site features ample office space with suites, cages, and rack cabinets, along with dedicated servers, virtual servers, and remote hands.

Greenest Data Centers

The Information and Communications Technology (ICT) sector accounts for 2% of global carbon emissions including 0.3% from data centers. US data centers consume 1.5% of the country’s electricity. Therefore, many data centers feature designs to maximize energy efficiency and minimize environmental impact. A list of five of the greenest data centers in the world follows.

 

  • Green Mountain Data Center – There are two Green Mountain Data Centers in Norway; one in Stavanger and the other in Telemark. Both have achieved ISO 9001, ISO 14001, and Uptime Institute Tier 3 certifications. Stavanger is located deep inside a mountain at a former NATO site, and Telemark is near multiple hydropower plants. The data center serves finance, IT, government, health, O&G (a heavy civil construction firm), and others.
  • Verne Global Keflavik Facility – This carrier neutral, colocation data center is in Keflavik, Iceland. The site uses 100% carbon neutral power and natural cooling. Verne Global offers scalable solutions to address power requirements. Their clients include BMW, VW, DeepL, and the Earlham Institute.
  • HP’s Wynyard, England Data Center This site was a conversion of an existing 30,000 sq ft warehouse. A design goal was to increase energy efficiency without sacrificing quality and reliability. This data center has a pressure free cooling system with minimum use of chillers. This required wider operating conditions for the IT equipment. Air plenums, to permit large volumes of low-velocity air to cool the equipment, sit below the data halls. The cooling fans use less than 5% of the total facility load.
  • General Electric’s Louisville Facility The GE data center, built in 2011, has a LEED Platinum certification. The data center is 34% more efficient than similar facilities. High-density servers reduced space by 50%, and ultra-low-flow fixtures reduced water consumption by 42%.
  • Apple’s Maiden, NC & Prineville, OR Facilities – Apple’s data center in Maiden, NC is a 500,000 sq ft facility. It uses 100% renewable energy from its 300-acre site containing three solar farms and a 10-megawatt fuel cell installation. In April 2017, Apple disclosed a deal to buy 200 megawatts of power for its Prineville, OR data center from the Montague Wind Power Project in Gilliam County. It also purchases power from a 56-megawatt project called Solar Star Oregon II and it generates hydroelectric power from a project on the Deschutes River. In addition, Apple uses treated water from the Prineville sewage system to cool equipment.

 

Beautiful Data Centers

Datacenter Dynamics listed these beautiful data centers in its February/March issue of DCD Magazine.

  • The Switch Pyramid near Grand Rapids, Michigan occupies a building the former Steelcase design center. The 225,000 sq ft data center uses the lower two floors.
  • The Bahnhof data center in Stockholm is in a former nuclear bunker. It features waterfalls, a saltwater fish tank, and live plants. Submarine diesel engines generate backup power.
  • The Barcelona Supercomputing Center occupies a 19th century church, the Torre Girona. It houses the MareNostrum supercomputer, an IBM project with the Spanish government.
  • Located in Google, Oklahoma, this data center has murals on the outside walls. The murals represent data center activities and images from Google Maps. Jerry Odell was the concept artist who worked with 15 painters to create this marvelous project.
  • Naver is South Korea’s leading web portal. The data center is at the foot of Mount Gubong in Chuncheon, Gangwon Province.
  • Green Mountain, Norway – The data center listed above is both beautiful and environmentally efficient.
  • The NGD Newport data center is in a former LG semiconductor plant in Wales. Electricity from the Dinorwig hydroelectric facility powers the site.
  • Digital Reality owns the Amsterdam Data Tower in The Netherlands. Rosbach Architects of the Netherlands designed the building.
  • AQL built its headquarters and data center in the 18th century Salem Chapel in Leeds, UK. The data center has a glass ceiling, and it occupies the ground floor of the chapel.
  • The LuxConnect data center in Bissen, Luxembourg has grass on its roof to minimize environmental impact. Steel mesh walls act as a Faraday cage for security.

Coolest Data Centers

Some of the coolest data centers in the world include the following:

  • Google’s Floating Data Center
  • Ozark’s Data Center in the Missouri Mountains
  • Sun Microsystem Data Center Bat Cave
  • The Bahnhof data center is extremely attractive
  • The Barcelona Supercomputing Center is a marvel of design

Debt Collectors Have to Follow FDCPA Rules

Whether you owe a few hundred dollars or tens of thousands to a debt collector, you may be on the receiving end of some frustrating phone calls. Unfortunately, this is one of the many harsh realities of being in debt to a third party. Collectors seem to follow you everywhere.

debt collector phone call
Source: Shutterstock 447617410 – Standard License

 

This is a very stressful situation for thousands of Americans each day. Data actually shows that 73% of American consumers die in debt. Of that 73%, the most common debts were credit card balances, mortgages, auto loans, personal loans, and student loans, in that specific order.

The Federal Trade Commission (FTC) exists for the protection of the consumer. This is why they have brought this act into law. The Fair Debt Collection Practices Act (FDCPA) actually protects you from some of the unfair tactics collectors use against you. It basically dictates how collectors should interact with you, and what they should and shouldn’t ask for. If they break the rules, they get a citation. Not only that, FDCPA ensures you have certain rights in the marketplace.

Here’s what you need to know about debt collectors that have to follow FDCPA rules.

FDCPA Rules About Calling

First of all, The Fair Debt Collection Practices Act considers repeated or continuous calls harassment.

Secondly, collectors should only call you during certain times of the day. If they attempt to contact your home before 8 AM or after 9 PM, be sure to log the time to provide as proof later on. More than that, if a collector is calling you during a time they know is inconvenient to you, that is also out-of-bounds behavior.

The FDCPA also has rules about contacting you at work. So if they know your employer does not approve your accepting these calls on company time, this is also a violation of the act.

Debt collectors should never repeatedly call a third party in an attempt to get your location information. In fact, the only time a collector should contact a third party is if they have reason to believe your current contact information is either outdated or false.

FDCPA Rules About Payments

There are many reasons why an individual would get into debt. This includes car payments, medical bills, or an unfortunate circumstance, such as divorce. No matter the cause, there is never a reason you should pay more than the amount of money owed. Further, a collector should not add on extra fees, expenses, or “taxes” attached to the original loan agreement.

You’d be surprised to know that it’s not uncommon for collectors to “double dip,” which is an illegal practice. This is when they attempt to collect on a debt that you settled long ago.

FDCPA Rules About Communications

Debt collectors should conduct themselves in a certain manner when they contact you. Any communications that are considered profane, abusive, or obscene should immediately be reported. Using threatening or violent tactics is absolutely against the law. This includes screaming at or belittling consumers. Keep in mind that debt collectors do not represent the government or any government entity, so they cannot bring in law enforcement agents, such as the police, against you.

Collectors can only go so far in an attempt to collect money. They cannot legally sue you or your family, they cannot file charges, and most importantly, they cannot claim your property or garnish your wages. Any person who claims they can ruin your credit (or threaten to ruin your credit) is lying and cannot take action in this way. They also cannot threaten to take away your home, car, or items of value on your property, including liens on your property. To do this, a collector would have to sue and win a case in court first.

When a collector leaves a message on your voicemail or online answering machine, they must state their name and the company they represent.

You should know that you are allowed a certain amount of privacy when it comes to debt. This means a collector cannot inform a third party about how much you owe, unless you have given them your explicit permission beforehand. Here are the parties collectors are allowed to contact:

  • Your spouse
  • Your attorney or lawyer
  • Your creditor or creditor’s attorney
  • A credit reporting agency
  • Your parent (only if you are a minor)

FDCPA Rules About Debt Verification

So how can you stop a collector from contacting you? Consumers have the right to tell their debtor in writing. It is recommended that you make a copy of the letter before sending the original by mail. You can even pay for a return receipt to ensure they actually received it. When they do, they cannot contact you again, except in these two cases:

  • To inform you that there will be no further communications from their agency
  • To inform you that they intend to take action in relation to the debt, such as filing a lawsuit

Keep in mind that sending this letter does not erase the debt owed or prevent them from suing you in the future.

In terms of verification, a collector must send something called a “validation notice.” This is a written letter stating how much you owe within five days after their initial contact. It must include the name of the creditor and how to move forward if you believe you have been wrongly charged.

If you tell the collector you don’t owe them money, or if you ask for debt verification, they should stop communicating with you. However, you must let them know within a 30 day period. They can begin calling you again if they send a written verification, such a copy of the bill.

What to do if Your Rights are Violated

After reading this list, you may realize that your collector is involved in some shady business practices. So what are your next steps? Here’s who to contact to report an alleged violation:

Be aware that different states have different laws, but your state’s Attorney General office should assist you in understanding your rights. If what they are doing is deemed unlawful, that party is responsible for damages up to $1,000. They are also required to pay your lawyer’s fees and costs.

Quantum Communications is Changing Telecom Forever

Hackers are smarter and more capable than ever before, leaving virtual phone lines, computers, and smart home technology susceptible to hacking. Just as software and internet programs are created to help better society and assist us in carrying out daily tasks, there are also people using technology to invade the privacy of others, manipulate information, and steal sensitive data.

Imagine how a system could be developed with no coding errors or weaknesses in the system. This would change the future of wireless communication as we know it. Hackers and malware would be detected so easily that secure networks would be virtually unhackable. This high level of security would change the way telecom functions and protects its users. Enter the technology of quantum communication.

As quantum communication continues to be studied and understood, countries that are at the forefront of technology and thought leadership are looking to implement quantum technology into the operation of various business sectors.

In order to understand the important relationship between quantum communication and telecom, we must understand how each system functions.

What is Quantum Communication?

Quantum communication uses Quantum Key Distribution (QKD) to operate. This distribution enhances security because its innovative system instantly alerts someone when they are being listened to or observed. QKD uses cryptographic keys that are heavily encrypted and difficult to decipher. Entangled photons are the basis of quantum communication and they aren’t bound by geographical limits. As photons move under unexpected observation when a hacker successfully enters a quantum system, it will immediately break the entanglement of photons and create obvious changes.

This is a game changer for national security and information protection because most security systems attempt to block hackers before they can enter a network, or they can try to clean up malware after an attack happens. Quantum communication would be the first technology to instantly detect and alert users of security threats. This instant alert happens because it changes the information once it is accessed by an outside party.

What is Telecom?

Telecom is the most common way we transfer information in the modern world. It encompasses diverse types of technology that allow us to talk to one another, listen to the radio, and use the internet to connect over short and long distances.

Any time you use a cell phone or landline telephone, you’re using telecommunication. If you use a virtual phone system for business purposes, remote work, or to stay in touch with friends and family from a distance, telecom services are connecting you and the other party.

The telecommunications industry provides service to millions of individuals and companies on a daily basis. Because so many individuals rely on these services to gain access to people in various regions of the world, telecom service providers must always be considerate of personal security for their customers. The majority of business professionals and individuals discuss private matters, contract, and payment information. Therefore, a conversation that is held over a phone or powered by an internet connection should be protected by the latest technology that prevents others from secretly listening in.

While efforts to increase security are ongoing, cyber hacking remains a major threat for telecom professionals. Even with updated security measures in place, internet-savvy criminals are finding ways to break through protected systems. As more businesses transition to cloud communications, they must also be defensive by staying up-to-date on the latest hacking techniques that allow security invasions in all networks.

The Effects of Cyber Attacks on Businesses and Consumers

When businesses are hacked, it can be detrimental to the success of the organization. The cost of damage repair following a data breach is usually estimated be over a million dollars. Fixing the breach and implementing more security measures will require the use of company funds and may result in a loss of company time because employees might be unable to work until systems are secure. If you are an IT company, valuable work hours may have to be exhausted in an attempt to correct system errors, which would delay the time needed to meet other company goals.

The reputation of the company is also in jeopardy after a hacking incident. Many potential customers refuse to do business with an organization after it is successfully attacked. Current customers will take their business elsewhere out of fear that you will be hacked again in the future.

If you work with sponsors or investors, or you’re looking to partner with other businesses, the respective parties might back out of the agreement to protect their reputation and prevent the possible loss of funds from affiliating with your company. All of these scenarios will result in significant losses of money and trust that many small businesses cannot recover from in the future.

Businesses suffer from hacking, but the effects on individuals do not go unnoticed as many customers are affected for years following a cyber attack. When hackers gain access to private information, people often fall victim to identity theft. Identity theft isn’t just emotionally upsetting, it negatively affects credit scores and personal bank accounts. Some consumers may not realize when their private information has been compromised. By the time they discover that their identity has been stolen, cybercriminals have already shared their payment information and made purchases. At this point, victims must prove that someone else used their information illegally and wait until companies and credit organizations assess and rectify the damages.

What may be worse than the sharing of account information is the distribution of personal images and conversations that are meant to remain private. When this happens, it can destroy a person’s reputation at school, home, and work, and the stolen information becomes a lingering source of shame and embarrassment.

Quantum Technology Will Provide Advanced Security

Quantum communications can be the answer to the rising security risks involved when using telecommunications because the network encryption will be almost impossible to decipher. If a cyber breach does occur, the hackers will be stopped in their track to prevent damages. Using the quantum approach, telecom providers will be able to secure the privacy and protection of their customers and protect their business from revenue losses and a damaged brand. As consumers, we will be able to feel secure when speaking with business associates or discussing private matters.

How Do Rotary Phones Work?

You are probably already aware of what a rotary dial telephone looks like. Perhaps you have seen the telephone in an old movie or at an uncommon thrift store, but have you ever wondered how the old school phone made its calls? The rotary telephone was introduced to the public in the early 1900s, with the finger wheel design making its world debut in 1904.  Eventually, push buttons were introduced to the telephone model and the rotary dial fell completely out of fashion around the 1980s.

Rotary dial telephones began popping up in personal homes in the United States and Canada during the 1910s. Before the rotary dial was invented and commercialized, people would have to use a phone with a crank on the side. They would need to crank the side of the phone in order to get into contact with an operator, who would then connect that person to the party they wished to call. We’ve come a long way in business communication technology, starting from telegraphs, to rotary dials, push buttons, to the touch sensitive screens we are so accustomed to in the present day. Today, you don’t even have to dial, memorize phone numbers, or check your Rolodex – we can simply tell our smartphone the name of the person we want to call and Siri will dial it for us.

Prior to the Rotary Dial

It’s still important, however, to understand the humble beginnings of the technology that we often take for granted today. The rotary dial was the first telephone to gain popularity in modern households because of how easy it was to use and its sleek design. Before the rotary dial, a calling design existed that was far more complicated to use and therefore, it was not appealing to the everyday user. These phones did use push-button technology, however, they only had three buttons. The three buttons were measured as 100s, 10s, and single units. For instance, if someone were to try calling the number 182, they would first need to press the 100s button, followed by pressing the 10s button eight times and the single units button twice. Now people may think that waiting for a rotary dial to spin back multiple times just to dial a number may be an annoyance, but based on past findings it seems to be infinitely easier to dial 182 using three rotations rather than 11 pushes.

How Does the Rotary Phone Work?

The telephone itself is able to make phones calls by converting sounds (the voice) into a powerful electronic signal that travels through a network of cables, a telephone network, to various other telephones. Telephones contain a microphone that the user would speak into and on the opposite end, the earphone would receive the sound from another location.

The rotary dial was designed as a circular layout that allows the user to insert their finger into a hole that corresponds to different digits of 0-9. Some models also include letters that correspond to each number. In America that would be 2 – ABC, 3 – DEF, 4 – GHI, 5 – JKL, 6 – MNO, 7 – PRS, 8 – TUV, 9 – WXY, and 0 could be used for Z. Once the finger is inserted in the correct location the user would rotate the desired number all the way around the circle until they heard a soft clicking noise. The rotary dial would then automatically rotate back to its starting position and the process would begin again. The rotation from 0 was the longest because it was the furthest from the starting point. However, just because the rotation was longer does not mean the click back was; it would snap back to its starting point as fast as 1 would to the beginning point. This is because the dial used spring action to return to its initial position.

As the dial returns, the system records the pulses. Pulses are recorded by a switch that records the number by a series of steps. For example, if you dial 2, the switch will step twice. The last digit is the only digit that doesn’t use a switch, instead, it uses a wiper arm. The wiper arm process is very similar to the step switch process. In this instance, it is the wiper arm that moves the specific number of times as the digit dialed. That is why when a user finishes dialing, the necessary signals will go out to the intended parties.

Would a Rotary Phone Work Today?

If you find yourself at a thrift store or antique show and stumble upon a working rotary dial phone, before you buy it you might want to consider if it will even work in your home. Based on responses from Quora.com, you should go ahead and pick up that old school telephone because it just might work, depending on your service provider, of course.

One user who works for Verizon Wireless named David Trower offers this little piece of advice for testing out older devices. “To test if a rotary dial would work, try dialing a number that has a 1 in it. For example, to dial 371–4000, dial 3 and then 7 using the push buttons but hang up the phone one time quickly to “dial” the 1 and then dial the rest of the number using the pushbuttons. If this works, you have proven that a rotary phone will work.”

User Talmort O’Dole claimed that if you own one, the phone can even be used when the power goes out. Fortunately, cell phones can also be used as a Plan B when the power goes out. However if you have forgotten to charge your smartphone and the power has gone out, you would be quite fortunate to own a rotary phone in case you find yourself in a situation where you must make an important phone call.

Finally, a third user, Rosario Contarino, encourages consumers to contact their telecom service providers to receive an adapter if their rotary dial telephone is not working.

If you’re looking to add a touch of old-fashioned sophistication to your home, then a rotary dial telephone may be perfect for you. You can find true vintage phones on many popular online retail sites like etsy.com, or if you don’t want to take the risk of your vintage purchase not working on your network, then you can find many updated phones that are designed to look exactly like the classic rotary dial phones at a variety of common retailers.

Call Recording Regulations for Forex Trading and International Banks

In recent days, compliance regulations and requirements for traders and banks have been expanding dramatically due to leveraged technology and the need for accountability and higher standards. Due to these new regulations, Global Call Forwarding has increased our long-term call recording storage up to 6 years to enable easy access and a trustworthy platform for banks and Forex traders. As a result, these changes ensure that traders, banks, and contact centers are in full compliance with every new regulatory requirement.

Naturally, governments around the world have stepped in to increase regulations to combat ever-widening capabilities of corruption by forcing companies to expand their recordkeeping capabilities via audio. Because traders and bankers are now required to record and archive voice communications, Global Call Forwarding understands the need to have these recordings easily available on demand in the event a dispute should arise. Due to the highly sensitive nature of such calls, we offer the safest security standards. Our platform makes it simple to access and download calls kept in storage with the simplest navigation.

Globally, call recording is becoming required across a multitude of industries for the purpose of record keeping. This is why long-term storage is such a necessary service. Consider the following examples:

  • As of January 1, 2018, the markets regulator Securities and Exchange Board of India (Sebi) has now required stockbrokers to compulsorily keep a record of orders placed by clients from January 1, 2018. This mandate includes phone recordings. This puts the burden of proof on the broker to produce documentation for trade disputes that may be unauthorized.
  • As of August 31, 2017, the FDIC has ruled that banks and other financial institutions must keep recordings (and other documentation) of “suspicious activity” for 5 years from the date of filing a suspicious activity report (SAR).
  • In Europe, under the General Data Protection Regulation, bankers and traders are required to keep recordings or face steep penalties as a consequence. For firms that don’t comply, they can be fined €10,000 per infraction. However, these fines can reach up to a staggering €20 million or 4% of a firm’s annual revenue.

recording office screens

Why Do You Need to Record Your Calls?

It’s obvious that brokers and bankers should take these new regulations seriously and record/ store their calls immediately. Here are a few reasons you should consider:

  • The Price of Noncompliance: As mentioned before, the price of non-compliance can be high. If traders or banks don’t record their calls, they could potentially be hit with significant fines or potentially lose their license. Even for companies that are willing to roll the dice when it comes to avoiding potential audits, the risk of being unable to conduct business is a significant deterrent against not integrating call recording services into your business.
  • Maintaining Your Public Image: In the Information Age, having records and proof is often an essential part of your business. Therefore, call recording needs to be at the forefront of your business strategy. Staying ahead of the curve, and in line with regulations can keep your business away from negative outcomes and any possible disasters that await unprepared banks and traders if they choose not to take the necessary precautions in long-term storage of their calls.
  • Peace of Mind: Even without such regulations, call recording services are an excellent way to ensure that your business is accountable internally. Consider a few of the advantages, including the ability to verify suspicious activity from customers and the ability to ensure your employees maintain accountability for adhering to your company’s standards of ethics.

Quality of Recording Services Matters

Not all call recording services are created equal. Consider the ramifications of having lesser-quality recording services that cannot be trusted when you need them most.

Hypothetically, what would happen if you discover that some of your recorded calls aren’t audible or are missing? By the time that you discover these anomalies, your records may be, in fact, missing thousands of calls. Sometimes, stored calls need to be accessed immediately, and if you can’t trust the storage system, you may run into some serious trouble. By most standards of legislation, not having the recording document is the same as not having made the effort to record them in the first place.

And even if there is an attempt to find the information, many auditors request recorded calls typically within 60 days. With this short time frame, your company may not be able to respond quickly enough to avoid violating the law.

How Global Call Forwarding Can Help

No one wants to lose their license or be fined over a simple mistake. To avoid these possibilities, it is so important that you have a quality service provider that can help you store your calls and provide instant access when you need it. However, we cannot stress enough that this service needs to be top-notch. This is precisely why so many businesses rely on Global Call Forwarding, especially when it comes to call recording for Forex trading and international banks.

Global Call Forwarding’s easy to use technology ensures that all calls required to be recorded for legislation and regulatory purposes are recorded with high-quality content, and are not inaudible. To help Forex traders and banks to comply with these new requirements, we have increased our long-term call recording storage capacity to ensure absolute peace of mind.

In addition to the increase in Global Call Forwarding’s long-term call recording storage capabilities, our platform provides customers the ability to store calls for up to 6 years and access each recorded call with an easy-to-navigate user interface. With only a few clicks, recorded calls can be easily accessed for listening or downloading through a highly secure online control panel. Multiple levels of redundancy ensures safe and secure storage of recorded calls. Best of all, our customers can combine call recording and long-term storage with the ability to reach international markets by utilizing local and/ or toll free numbers available in over 140 countries on our network

Thailand Fights Caller ID Spoofing by Scammers

You may have heard of phishing – the fraudulent act of sending out emails, which pretend to be from a reputable company, in an attempt to obtain personal information such as bank account details, social security numbers, or credit card details. But you may not yet have heard of vishing. Vishing or voice phishing is a similar type of scam but using telephone calls rather than emails, in an attempt to dupe unsuspecting victims into giving up money or confidential information. The practice is becoming common all over the world and has seen excessive activity in some countries, such as Thailand.

After a recent revival of vishing scams in Thailand, some of the country’s top Telecommunications companies have been instructed to jam 50 phone numbers which have repeatedly been used by fraudulent callers to con their victims out of money. The service providers have been allowed just eight weeks to devise a system to prevent caller-ID faking using Voice over Internet Protocol (VoIP).

The mandate was issued in January 2018 after a meeting was held between the Royal Thai Police, the Thai National Broadcasting and Telecommunications Commission (NBTC), and the Anti-Money Laundering Office (Amlo), as well as six major Thai telecom service providers. According to Thai authorities, the groups agreed on several strategies to protect consumers from transnational vishing gangs who have been using VoIP networks.

The groups of scammers have been trying to dupe their victims by using numbers that belonged to courthouses, police stations, and post offices. They were making the calls from VoIP networks and using software to conceal the original caller ID. The number that the recipient sees is a fake number.

The scammers pretend to be state officials, police officers, or bank clerks. They make false accusations against their unsuspecting victims about debts or drugs to try to intimidate them into giving up money or their personal information.

Though the six telecom companies have been ordered to block the scam numbers, they must also come up with a more permanent solution. Their answer is to create a system which will maintain a record of all calls made using VoIP networks and to detect the caller’s real identity. This system is supposed to be in place by the beginning of April 2018. Henceforth, all incoming calls using the VoIP network mush show their real caller ID so that people who receive the calls can verify them. Within two months, the whole system will be completely upgraded, and gangs using fake numbers will no longer be able to operate.

The six Thailand telecommunications providers involved in the task force are Triple T Broadband (3BB), CAT Telecom, TOT, Total Access Communication (DTAC), Advanced Info Service (AIS), and True Move. So far fifty numbers have been logged as being used to scam victims. Since December 2017, eleven Thai victims were conned out of a total of 8 million baht. Thai authorities were able to retrieve 1.6 million baht from the scammers and return it to the victims.

How the Thai Vishing Scams Typically Work

The scammer, posing as a bank employee or police officer informs the call recipient that he or she is suspected of having committed a money-related crime, such as laundering money. The scammer then asks the victim for information to verify their innocence and instructs them to go to an ATM to perform a “checking procedure.” The scammers tell the victim that the procedure is to prevent them from having their bank account frozen. However, the procedure results in the victim unwittingly transferring money into an account set up by the vishing gang.

The police warn that the gangs frequently change their tactics. Some of the more recent scams have involved the use of forged arrest warrants. The police have issued more than 200 real arrest warrants for members of vishing gangs, and so far, 162 perpetrators have been arrested.

In a related incident, the Thai police have been investigating several commercial banks after a 24-year-old Thai woman, Nicha Kiartthanapaiboon, allegedly had her identity stolen. Ms. Nicha reported that identity thieves used her ID card to open nine accounts within seven different banks. The scammers used the account to handle money which was obtained through a call center scam. Ms. Nicha was charged in connection with the crime, although she maintains her innocence. Thai authorities are investigating the commercial banks where the accounts were opened to assess if the financial institutions were negligent in following the proper authentication processes. If the banks are found to have flouted the rules, they can face fines of up to 1 million baht.

The New Wave of Vishing Scams

No matter what country you live in, you can still be targeted by vishing scammers. It is important to note that this type of scam is becoming more and more sophisticated. These days just by answering a scammer with a simple “yes,” can lead to unwanted subscription charges, call charges, and sign-ups that will be billed on your next monthly bank statement. The best way to avoid becoming a victim of caller ID spoofing is to know what to look out for so you can avoid giving your personal information to the wrong people.

How to Catch a Vish

Vishing scammers often offer services, products or fake prizes which are grossly exaggerated, before asking for your personal information to get money out of you. Red flags include:

  • An offer from a company you do not do business with, or you have never heard of
  • A notification that you have won a prize from a competition you did not enter
  • Assurance of unrealistic returns on your money
  • Pressure to make an immediate decision or to follow instructions such as:
  • Give money
  • Give up personal information
  • Give banking details
  • Give information about your business
  • Threats (such as fines or legal action) if you fail to provide the information requested
  • Unprofessional manner or language
  • Unsolicited calls with offers to help you with unpaid taxes or other debt

You can find out more about vishing, phishing, and other kinds of scams at the Federal Trade Commission (FTC).

International Forwarding for Google Voice and Skype

If you’re someone who frequently travels overseas, particularly for business, you are probably familiar with the complications and expenses of your mobile service provider’s international roaming and data charges. While you might be able to disconnect when you’re taking a relaxing vacation, these days when you’re traveling overseas for business, having access to a reliable communication network is essential. Being disconnected during the middle of a business call is simply unacceptable. The problem is, most mobile service providers realize this so they hike up their fees for international plans. However, don’t think you don’t have other options. You don’t have to bust your budget to stay in touch when you’re abroad; the internet offers a couple of very affordable and efficient alternatives.

google voice

What are Google Voice and Skype?

Google Voice and Skype are both VoIP (Voice over Internet Protocol) phone services. As such, they send and receive calls via the internet between people who are on the same platform or between the platform and a landline or mobile phone.

Google Voice

When you sign up for a Google Voice number, you will be able to make and receive calls from within the Gmail platform. This service is also integrated with Google Hangouts. You can also send text messages from within Gmail, and it won’t cost anything. Here’s a rundown of Google

Voice features:

Video chat: this is available only with Google’s plug-in installation called Voice and Video Chat.

Free international calling: this service is not included.

Unlimited domestic calls: this service is available.

Single platform integrated voice, video and IM: this is not available in a single platform; you have to add Google’s Voice and Video Chat plug-in.

  • Free SMS: only domestic SMS is free.
  • Free voicemail: available.
  • Free voicemail transcription: available.
  • Free call recording: this is available for incoming but not outgoing calls.
  • Free call blocking: this is available.
  • Free individual phone number: this is available.
  • Requires a phone plan: You do need a phone plan to use Google voice, though you may use Google Voice and Video Chat for free if you are connected to the internet.
  • Free group video chat: This is available but only on Google+ hangouts.
  • Place 911emergency calls: this is not available.
  • The corporate version of this service: this is not available.

Skype

Skype is one of the most widely used VoIP platforms in the world, and it has been widely popular for almost a decade. Though there were other means of chatting and communicating over the internet before Skype, this platform really changed global communication for the better.

Skype has made it easy and affordable to communicate with others all over the world with the easiest access. It’s simple to use and offers a user-friendly and cost-effective way to stay in touch with family, friends, and colleagues, wherever you are in the world and whenever you are traveling overseas. You can use Skype on your Mac, PC, iPhones and Android devices. You can connect with other Skype users via the internet for free. If you are calling a landline or a mobile number there are varying fees depending on the location you are calling.

  • Video chat: Skype allows video conferencing.
  • Free international calling: only direct calls from one Skype user to another are free.
  • Unlimited domestic calls: you may make domestic calls for free from one Skype user to another, but you will have to pay for a Skype subscription to make calls to landlines and mobile phones. The rate will be charged per minute and will depend on the country you are calling.
  • Single platform integrated voice, video and IM: this is available.
  • Free SMS: you must purchase credits to send text messages. The rate will vary depending on the country you are sending to.
  • Free Voicemail: available.
  • Free Voicemail transcription: this will cost you 25 cents/ message.
  • Free call recording: this is not available.
  • Free call blocking: available.
  • Free individual phone number: in the U.S. you may purchase a number for a three-month period for the price of $18. The Skype Premium plan also allows users a 33% discount for three months on their numbers and a 50% discount for a year.
  • Requires a phone plan: this is not necessary because you can connect via the internet.
  • Free group video chat: this is not available. In order to have group video chats, you must subscribe to Skype Premium. The cost will vary depending on your country.
  • Place 911 emergency calls: this is not available.
  • The corporate version of this service: to obtain this you must purchase a subscription to Skype for Business. The cost will vary depending on the size of your company. This version features group calling, less expensive calls, contact with non-Skype customers and, collaborative functions.

International Number Forwarding

Google Voice offers free number forwarding using (Public Switched Telephone Network [PSTN] integration). Skype users have the option of call forwarding with certain paid subscriptions. However, if you wish to take advantage of international number forwarding, you will need to purchase a virtual international number from a third party and have the calls routed to your Google Voice or Skype number.

What is International Virtual Number Forwarding?

A virtual phone number is not like any other phone number. International number forwarding is most often used to forward calls to businesses overseas. As such, a virtual number is more of a redirect route which passes through a service, rather than an actual phone number. International forwarding allow you to connect with overseas customers without having to change your main contact number. It allows customers from all over the world to contact you via a local toll-free number, providing you with a virtual presence all over the world. This method is advantageous because it facilitates global communication and gives overseas customers confidence in your company and your brand.

No matter where in the world you are trying to reach out to, international forwarding will allow you to offer a toll-free number for clients to reach you, eliminating their need to use confusing international dialing codes and pay expensive international calling fees. Not only will you build your global presence, but you will also seem like a local company in many different countries.

Why You Should Keep Educating your Team

As a team leader, one of your most important roles is to keep your team educated. This means ongoing training so that your personnel can keep up with the latest products, standards, and practices related to your business. In order to keep educating them, you have to maintain vigilant attention to your company’s vision as well as the goals and deadlines of the project at hand. It is also important to maintain your own motivation; only when you participate wholeheartedly in a project will your team be motivated to be there alongside you. There are a number of advantages to ongoing training; here is a look at some of the ways it pays to keep your team continuously trained.

Boosting Productivity

Training and development is an excellent way to increase productivity and retention. Don’t give in to the temptation of cutting back on outside training such as workshops and conferences for your employees because this can actually cause you to lose out in the long run. Studies show that employees who are well-trained are much more willing and capable of assuming a higher level of control over their assignments and they need less supervision when on task. Not only do they offer better customer service, but they also enjoy their work more.

Maintaining Communication

There is no such thing as too much communication, and this should be an integral part of all employee training. Make sure that you and all members of your team are on the same page all the way through each project. Employees need to be updated on the progress of the project on a regular basis. Though regular face-to-face meetings are very important, it’s not always convenient to call everyone together as this can impede progress, particularly if your team members do not share the same geographic location. Other good ways to keep your employees on top of the project’s ongoing status is through email, memos, conference calls, and video conferencing. Let your team know how important communication is for meeting long-term training goals and also addressing any challenges that are being faced, and encourage them to make suggestions.

Rewarding Efficient Performance

Another key factor to maintaining adequate training and motivation to learn is to reward individual and team performance. Recognition of achievement is a great way to provide positive reinforcement and encourage excellence among your employees. Use your company newsletter to announce specific achievements and goals that have been met. Take the time to make personal phone calls to commend high achieving workers. In recognition of team efforts, take your employees out for lunch, post-performance charts in the workplace or on your company website. Make these acts a regular part of your corporate motivation strategy.

Offering Your Team a Challenge

By setting your team-challenging goals, you are offering a stimulating way to learn new skills or to brush up on old ones. Your employees will work hard to meet new challenges and to achieve excellence. Make sure that the training goals are realistic and can be attained within a reasonable amount of time. Don’t forget to equip your team with the tools to succeed. They will soon lose motivation if they lack the tools required for the job. This doesn’t only include the necessary equipment, but also internal support, materials, and regular communication.

Keep Poor Performance in Check

Poor performance can lead to a downward spiral of decreased motivation and can undermine the whole point of ongoing training. Your team will rely on you to manage group members who are not participating fully, without causing conflict. Resolve such issues as quickly and diplomatically as possible. Avoid turning a blind eye to poor performance, otherwise, it will soon get out of hand and affect your team and their efficiency. Be clear about the changes you expect to improve performance, and if necessary explain what additional action will be taken if goals are still not met.

When and How to Use Praise

Praise is an important part of keeping your team educated, but remember, if praise is to be productive, it must be specific so that the individual is aware of what he or she has done to earn it. Clear and detailed feedback will help your employees understand their strengths and will ensure that you do not appear to be patronizing. Use praise conservatively; if you praise everything, it ceases to have any value. Try to avoid adding conditions to your praise; otherwise, it will come across as false or as a requirement for something else.

Another important thing to remember is that praise should be timely. If you wait too long after an event to make positive comments, they will have lost their impact. A good way of reinforcing praise is to coincide it with some form of recognition. Some possibilities include an achievement award, a write-up in the company newsletter or a gift certificate.

When and How to Use Constructive Feedback

There is an important difference between constructive feedback and criticism. Constructive feedback is given with forethought and with the intention of creating an empowering experience. Criticism, on the other hand, consists of being judgmental and most often creates negative feelings and loss of empowerment. While individuals and teams are inspired by constructive feedback, criticism can lead to resentment, loss of motivation and poor performance.

As part of your employee training, consider how you can strengthen your bonds with your employees and encourage them to fulfill their maximum potential. Remember to listen to suggestions from your team; their input may lead to new breakthroughs, especially if you are not afraid to try out new methods. Staying abreast of concerns and disagreements within your workforce will enable you to diffuse them before they get out of hand. It will help instill your employees with confidence in your leadership skills. Use training to address weaknesses in your company and to strengthen these areas. Don’t forget that before you begin training your staff, you should be personally up to date with the latest information to maximize the effectiveness of the team. An investment in your employees’ continuing education is an investment in your company as a whole.

Scammers Buying Phone Numbers for Verifications

Scammers have a history of buying local and 800 phone numbers, using free Google numbers, and pirating phone numbers to conduct fraudulent verifications and other scams. The following article discusses the applicable Federal Communications Commission (FCC) regulation, telephone verification, two different legal apps for spoofing telephone numbers, a process known as orange boxing, guidance on scams from the Better Business Bureau (BBB), and additional information on avoiding scams.

Federal Communications Commission (FCC) Consumer Guide

Spoofing is the deliberate falsification of information transmitted on caller ID displays. However, blocking a number is not spoofing. The federal regulation governing spoofing is the Truth in Caller ID Act of 2009, which prohibits the transmission of misleading caller ID information in instances that will:

  • Defraud
  • Cause harm
  • Wrongly obtain anything of value

Illegal spoofing can result in penalties of up to $10,000 for each violation.

Under this regulation, telemarketers are required to transmit or display their telephone numbers or that of the entity on whose behalf they are making the call. Furthermore, if possible, the caller should display the name of the company for which it is selling products or services. They must also display the telephone number that people can call and request the cessation of calls.

FCC Citation for Scamming

In June 2017, the FCC issued a citation to a Miami individual and his associated companies for violating the Truth in Caller ID Act of 2009. The proposed fine is $120 million based on 80,000 calls, which the FCC can verify. The FCC alleges that the scammers made 96 million illegally spoofed calls. “Neighborhood Spoofing” was the technique used by the scammers whereby the caller ID displayed the area code and first three digits of the recipients’ telephone numbers. Consequently, the recipients think the calls come from a neighborhood caller.

Telephone Verification

Telephone verification is a process where a website calls a consumer on their phone to verify their identity. Other names for this process are Phone Verification, Automatic Call Back Service, and Verification Service. Here is how it works. When a person makes a request to a website, that site automatically initiates a call or a text to the person’s phone that contains a randomly generated PIN. Upon receiving the PIN, the person enters it on the website, verifying their identity. However, as shown in the next two sections, spammers can use this process to get information from unwary persons.

Account Verification Scam

If an account holder has a phone tied to their account in the event of a forgotten password, and the scammer knows the victim’s email address or credit account number and their phone number, the account verification scam works as follows.

  1. The scammer initiates a password reset on the victim’s account and requests the sending of a verification number to the victim’s phone.
  2. The scammer sends a text to the victim posing as the email or credit provider saying, “We have noticed unauthorized activity on your account. Please respond to this text with the verification number being sent to your phone.”
  3. If the victim responds with the verification number that they subsequently receive, the scammer will have access to their account.

Double-Digit Google Phone Scam

People that have posted classified ads with their phone number should be wary of this scam. Scammers use it to maintain their anonymity with Google Voice numbers. Since Google requires a valid phone number to be associated with new Google Voice numbers, the scammer picks a victim from published ads and sends them a text. The text may say, “I am interested in your ad.” Text back when you’re ready to talk.” When the scammer receives the response, he or she calls Google Voice and specifies the victim’s number as the link to the new number. Google Voice responds with a double-digit verification code. The scammer then texts the victim saying, “I am on a Google Voice line. When you receive a call, enter the double-digit code to connect.” If this happens to you, do not hit the code.

SpoofCard

SpoofCard is a mobile phone app that changes the caller name and phone number that displays on outgoing calls. The SpoofCard website claims that it works on any cell phone. Your identity is anonymous using SpoofCard caller ID spoofing. Users can also get downloadable recordings of their spoofed calls. In addition, calls can go directly to voicemail making receivers think they missed your call. SpoofCard has a feature to change your voice to a man or woman, or it can add background noise to disguise your identity. SpoofCard also sends anonymous text messages. The following table shows rates for SpoofCard packages.

 

Rate $9.95 $19.95 $29.95 $49.95 $99.95
Minutes of Call Time 45 100 160 280 600
Rates for Pay-as-you-go SpoofCard Packages

SpoofTel

SpoofTel is another company that provides spoofing services. Users of the service must first establish a SpoofTel account. Use the spoofing service either through the SpoofTel website, the SpoofTel app, or by calling 1-866-SPOOF-ID (1-866-776-6343). To place a call follow these steps.

  1. Log into your account.
  2. Enter your telephone number in the top field.
  3. Enter the receiving telephone number.
  4. Enter the desired display number on the receiver’s display.

The features provided with the SpoofTel account are as follows.

  • Short Message Service (SMS) Spoofing and SMS history
  • Spoof Fax and Fax History
  • Voice Alteration – use higher pitch for female voice or lower pitch for male voice
  • Answering Machine Feature – If an answering machine answers the call, SpoofTel can send an uploaded message automatically.
  • Auto Redial Option
  • Time Limit for Calls
  • Call Back URL

SpoofTel offers two different apps, a desktop app, and an iPhone app. The iPhone app requires a jailbroken phone or compatible device. Jailbroken refers to the practice of removing restrictions that Apple places on a device’s operating system.

The cost for caller ID spoofing is $0.10 per minute. SMS costs $0.50 per message. Voice changing costs $0.25 per call. Recording a call costs $0.50 per call. The use of soundboards is free.

Orange Boxing

Orange boxing is a term for call ID hacking. An orange box emulates a caller ID signal to spoof the caller ID display. The following three methods accomplish this emulation.

  • A tape recording of a real caller ID signal
  • A software program to generate a caller ID signal
  • A hardware device that generates the caller ID signal

Follow these steps to use the orange box. First, make the call and wait for an answer. Then, send the caller ID signal. The orange box can also send a caller name and falsified date and time. When using an orange box, the answering phone displays the actual caller ID before receiving the spoofing caller ID signal. This limits the usefulness of the orange box.

Better Business Bureau (BBB) Advice for Dealing with Scammers

  1. Do not send money to persons you have never met face-to-face.
  2. Beware of unsolicited emails, and do not open links or attachments in them.
  3. Question everything that you see.
  4. Purchase online using only secure transactions.
  5. Be cautious of people that you meet online.
  6. Refrain from sharing personal ID information such as banking and credit card information, your birthdate, and your social security number.
  7. Avoid acting under pressure.
  8. Make all payments using secure, traceable transactions.
  9. Whenever possible, work with local businesses that have proper identification, licensing, and insurance.
  10. Be cautious when sharing personal information on social media.

Related: How to Prevent Your Numbers from Being Flagged as Spam or Scam Likely