TalkingPointz

Research, analysis, and thought leadership for enterprise communications.

Telecom in Your Inbox

Privacy: Expectations and Reality

by

Colin here. It surprises me that people don’t understand when the constitution applies and when it does not. This is very relevant in today’s privacy-sensitive world with the NSA wanting…

Read the article →

Welcome to TalkingPointz

This site provides opinion and research on various Enterprise Communications topics. The site started by Dave Michels as the PinDropSoup blog, but today features multiple authors. Note that TalkingPointz has no ads or sponsors – just informed opinions about what’s new, great, and not so great in modern communications. In addition to regular posts, there’s interviews, podcasts, and independent research. There’s no editors, so you might also find a few typos and perhaps some political incorrectness.

I hope you enjoy the site. Leave a comment, tell a friend, and come back often. If that’s too much to ask, consider the site’s RSS subscription just sign up for the weekly email recap.

 

A Password Strategy

by

It’s well documented that the most sign-in common password is “password” and that “123456” is next most popular. To combat hacking these trivial passwords, organizations impose password rules. The purpose…

Read the article →

Encrypt the Email

by

If eMail were encrypted and secure, your bank could email you your monthly statement. Your doctor could communicate directly with you. Your life would be a lot simpler. It’s surprising…

Read the article →

Passwords in Asia

by

I travel the world, especially Asia. I can tell you that by and large, computer security in Asia is better for the average user than in the United States. You…

Read the article →

Passwords, The Fifth Amendment, and Thumbs

by

How does the fifth Amendment apply to passwords you might ask. Let’s say that the police want to perform an inspection. Perhaps you had a baggie of oregano in your…

Read the article →

You can follow @TalkingPointz for the best UC headlines on Twitter (bot)

Safe Wi-Fi-ing

by

Colin Here. Hopefully you are aware that if you connect to a WiFi hotspot that doesn’t use a password you are basically sharing all of your data with the world….

Read the article →

Cloud Security Headlines

by

This week there were two major security headlines that might cause you to think twice about doing business in the cloud. The first was the celebrity photo leak. A very…

Read the article →

Fraud and the Blue Box

by

Colin here. A recurring, popular news theme is about hackers and the billions of dollars in fraud that they inflict upon the public. It’s a feel good topic that gets…

Read the article →

Who is Securing Who?

by

Colin here. The NSA spying has been in the press a lot. Up until Snowden the NSA strongly professed it had no mass surveillance.  Now, it is clear that they…

Read the article →

Latest Podcast

Hopes and Aspirations for 2016

In this Industry Buzz podcast, the UCStrategies Experts address their “hopes and aspirations” for UC for the rest of 2016, and welcome new Expert Dave Smith group. Moderator Dave Michels is joined…

Listen to the podcast →

All Podcasts →

How to Secure Corporate Communications

by

Colin here. Probably the question that I am most asked anymore is whether we should use more encrypted communications to protect our corporate secrets and confidential information. The undercurrent is…

Read the article →

Point to Point and PRISM

by

Colin here with a question: Does Point to Point Communications bypass PRISM? PRISM has been in the media a lot recently. And, it has raised a lot of questions about…

Read the article →

Sectionalization of Comms Then and Now

by

Colin here. The internet appears to be doomed. Its been recently revealed that the US government is monitoring and recording most of the communications on the Internet. They do this…

Read the article →

A History of Secrecy in Communications

by

Colin here. In light of the recent PRISM scandal where the NSA has been revealed of intercepting and recording most communications on the internet, it is interesting to take an historical…

Read the article →

Does SSL Equate to Privacy?

by

Colin here. Perhaps the most frequent question I get asked recently is whether SSL/TLS security certificates protect the privacy of communications. Should we all switch to using SSL/TLS for our…

Read the article →

KimDotCom

by

Colin here. It’s very rare when an individual raises to the level that they are worth listening to. Steve Jobs was one of those people. Kim Dotcom may be another…I’m…

Read the article →

Is Security That Complicated

by

Colin here. I recently had to set up an account with a US Government web site. I had a dickens of a time picking a password. They had amazing rules:…

Read the article →

RIM:Back From the Brink?

by

I am a sucker for the underdog. I love the battle, the strategy, the market dynamics. The ‘We’re Not Number One, So We Try Harder’ mentality. I think that’s why…

Read the article →

Do You Suffer from Nomophobia ?

by

File this under Things People Research When They Have Too Much Time. The following research was sent to me by securenvoy.com, I thought I would share it. First identified in 2008,…

Read the article →

Parlez-vous L33t?

by

You are most likely familiar with numbers being used to implicate letters, phrases or even symbols. In SMS (txting) shortcuts, for instance, 2 can also be used for “to”, 4 can…

Read the article →

My Keychain

by

A lot of things are changing these days – books, newspapers, retail, communications, etc. But this one snuck up on me. Take a look at my keychain: Look ma, no…

Read the article →

Latest Interview

Vik Verma, CEO 8x8

8×8 CEO Has a Tiger by the Tail

[My interview with Vik first appeared on NoJitter on February 8, 2016] Vik Verma became CEO of UCaaS pioneer 8×8 in 2013, having been recruited into the company a year earlier…

Read the Interview →

All Interviews →

External Posts

Recent posts by Dave on other websites.