Posts

Showing posts from February, 2016

Introducing SmartSimple Premium Support Services: Taking Personalized Support to the Next Level

Image
At SmartSimple, a good number of new features and enhancements we introduce every upgrade come directly from requests, recommendations and suggestions from our clients. Through our user community, clients provide crucial feedback on how the system works and what would make it work even better.
So when several of our clients indicated they were interested in an enhanced support offering, we put our heads together to come up with a service that was proactive while still being responsive to immediate calls for assistance.

Introducing Premium Support Services Premium Support Services is designed to offer a more personalized support experience. Clients are provided with a dedicated SmartSimple representative to act as their main point of contact for all support related issues. This adds an additional level of accountability, and provides clients with the peace-of-mind that they have a dedicated resource who is familiar with their specific needs and challenges.
Who should use Premium Support Se…

Seven things your Software as a Service (SaaS) provider should be doing to secure your data in the cloud

Image
Strong security practices must be the number one priority for any cloud solution vendor you choose. Without that commitment, there’s a good chance your data will be at risk.

So how do you know if the SaaS (software as a service) provider you’re using or considering choosing has the right security protocols in place to ensure your valuable information is protected? We’ve compiled a list of the top seven security practices any vendor should be using to ensure they’re meeting their obligations to your security. 1. Penetration Testing Penetration testing assesses how easy or difficult it is to hack into a system. This method uses what’s known in the industry as a White Hat Hacker. White Hat Hackers are ethical computer hackers or computer security experts specializing in testing methodologies to ensure the security of information systems. Their job is to make sure a malevolent hacker can’t access your data, hijack other user accounts or redirect your users to bogus sites, even if they have a…