The Importance of Multi-Channel Support
Not that many years ago, customer support meant one thing for most people: picking up the phone and contacting a call center. Times have changed a great deal ...
Can Vendors Use Your Data? Read the Fine Print
Your contact data assets represent the lifeblood of your company. Your organization probably has procedures in place to secure this data. But what about the third-party vendors you ...
99.999% Server Uptime – How We Guarantee It
Many products and services claim to always work. But when they don’t? Unfortunately, the answer is frequently, “sorry.” For our customers, “sorry” isn’t good enough – especially since ...
API Security: A Closer Look
Recently, we published a blog article discussing the growth of the “API Economy”: a term coined to describe the proliferation of API-based tools being incorporated into many software products and ...
Oh No, You’ve Been (Email) Blacklisted! Now What?
Blacklisting is the email equivalent of being put on Santa’s naughty list. Except the consequences can be much worse than not getting presents: it can keep your business’ ...
TLS and Email Security: An Overview
Many people don’t realize that when you send an email, its contents are often unencrypted – and in turn, vulnerable to being seen and intercepted by others. This ...
Email Validation: To Correct or Not to Correct?
Wouldn’t it be great if there were a service where you could enter an email address, and it would be validated and automatically corrected when an error was found? The ...
Credit Card Validation: Your Questions Answered
You’ve got questions? We’ve got answers! This is the first in a series of articles exploring common user questions about our products and how they can be used ...
To Collect or Not to Collect? Understanding Sales Tax Nexus
If you sell products and services across state lines, are you liable for collecting sales taxes? The answer is more complicated than you think nowadays – and it ...