Recently Updated Pages
Audit Logging Standard
1.0 Purpose Comprehensive logging from critical systems, applications, and services is essential...
Email Policy
1.0 Purpose Electronic mail (email) is a primary communication tool essential for business opera...
Digital Signature Acceptance Policy
1.0 Purpose As electronic communication and documentation become standard practice, digital sign...
Clean Desk Policy
1.0 Purpose This policy establishes the minimum requirements for maintaining a secure workspace ...
Bluetooth Baseline Requirements Policy
1.0 Purpose The proliferation of Bluetooth-enabled devices presents potential security risks if ...
Acquisition Assessment Policy
1.0 Purpose The purpose of this policy is to establish the framework and minimum security requir...
Acceptable Use Policy
1.0 Purpose This policy outlines the acceptable use of the organization's information technology...
Acceptable Encryption Policy
1.0 Purpose The purpose of this policy is to establish standards for the use of cryptographic al...
HIPAA_Data_Recovery_SOP
HIPAA Data Recovery SOP (Printable Checklist) Purpose: Ensure compliant, timely restoration of e...
Sample Call Flow
*Click on photo to make it larger
10DLC Key Attributes to get your Campaign Approved
Pre-Registration Guidelines These factors are critical for a successful registration process, s...
TCR Brand Registration Requirements Guide
Due to the ever-changing nature of the 10DLC Messaging Initiative, this guide may quickly be outd...
Privacy Policy
The privacy policy is a non-negotiable requirement for all brands to ensure compliance with 10DLC...
Intercom
VoIP phones provide an intercom feature that allows you to instantly connect to other phones with...
Login to Company Laptop?
This guide walks you through logging into a corporate Azure AD-joined or AD Joined Windows Laptop...
Website not working right?⚡ Targeted Clear Site Data via DevTools (Right-Click Method)
Website not loading correctly? You may need to clear saved site data on your computer, you probab...
Ineligible Use Cases
Sharing of end-user information The sharing and selling of end-user information with third parti...
Why Carrier Filtering Matters for SMS Marketing — and How to Avoid It
Consumers check their text messages more than 11 times a day—more than any other app. That’s why ...
Add Holiday Hours - Holiday Closures
Adding Holidays is one of most common requests, as you want phones to provide message to callers ...
How to get a shareable Authenticator 2FA Key on Microsoft 365
While this is strongly advised against, there are situations that an account needs to be shared b...