Select Page

Blog

Category: Industry
Installing Jabber to Bypass Automatic Login Using SSO

Installing Jabber to Bypass Automatic Login Using SSO

Cisco Jabber is a great collaboration tool, one that our team at Stack8 uses every day. Our Services team receives many questions on how to troubleshoot different issues within Cisco Jabber. In this article, we answer one of the most common questions that we receive,...

Microsoft Secure LDAP Security Update for Cisco UC Systems and SMACS

Microsoft Secure LDAP Security Update for Cisco UC Systems and SMACS

Over the coming months, Microsoft will be publishing security updates related to Advisory ADV190023 that will significantly affect how LDAP can be used in a Microsoft Active Directory (AD) environment. In the first round of security patches scheduled for March 2020,...

CDPwn Vulnerabilities

CDPwn Vulnerabilities

Today a collection of five vulnerabilities affecting Cisco phones and switches has been published. These vulnerabilities, identified collectively as CDPwn by Armis, the security firm that discovered them present a significant risk in many enterprise environments. For...

Why Cloud UC Puts the Power to Choose in Your Hands

Why Cloud UC Puts the Power to Choose in Your Hands

Businesses cannot afford to stand still if they want to maintain their competitive advantage. Today’s success stories can suddenly become tomorrow’s has-beens if they fail to evolve. That’s why the cloud is so compelling – it provides companies with an ideal platform...

The Unseen Costs of Traditional Provisioning

It’s easy to see the upfront costs of traditional moves, adds, changes in Cisco’s Unified Communication applications. Time X Salary, right? That’s how we measure cost.  But like the old story of the iceberg, where we only see 10% above water, 90% remains hidden...

CRTC Universal Call Blocking – How it Could Impact Your Organization

On December 19th 2019, all Canadian carriers will have to comply with a new CRTC policy for the “universal blocking of calls with blatantly illegitimate caller identification.” The objective of this policy is to protect the public against unwanted, unsolicited, and...

Going Cloud? Get There on Your Own Time with Cisco Webex and Stack8

Begin with the End in Mind – A Successful Digital Transformation Today’s large enterprises have invested in on-premises PBXs and VoIP calling systems over the years and expanded through growth or acquisitions. For any given enterprise, these systems now connect...

Not Communicating As You Should? We Should Talk About Webex

I want you to take a minute and think about how much of your day is actually consumed by meetings. Think about how many of those are in person vs. on the phone. How many of the participants are remote or traveling? How many actually involve a conferencing solution for...