Good control is good business. Total Control is great.

Thursday, July 17, 2014

Man Records Nightmarish Attempt to Cancel Cable

Cable companies, cellular providers, and every type of telecommunications carrier has the ability to waste your time, and waste your money.  Do you need evidence?  This is a recording of a problem with a cable company:

https://soundcloud.com/ryan-block-10/comcastic-service
 
Here is the article telling the story about Ryan Block's experience with Comcast:

http://www.wtop.com/1374/3662942/Man-records-nightmarish-attempt-to-cancel-cable-Comcast-apologizes

CMS handles problems so you and your staff don't need to waste your time, become distracted and get aggravated.

Visit us http://www.cmsenterprisesinc.com or call (503) 972-9999 to learn how you can reduce your monthly telecom and cellular costs, while simultaneously freeing up your staff time.

Wednesday, April 2, 2014

Small Problem Stealing Big Time

This specific example illustrates our attentiveness to detail and follow through.  We saved our client money, time, and aggravation.  

A telecom billing problem caused consistent aggravation.  Prior to engaging CMS services, the employees of a company spent numerous hours during a 4-month period attempting to resolve a small billing problem with a carrier for one of their office locations.  The employees’ time and distraction totaled to much greater value than the invoice error.  Aggravation with the issue continued to increase, and distracted the employees’ attention from higher priority work.

Once CMS was engaged, a CMS account manager invested 4 hours to correct the problem.  One call lasted 2 hours: hold time, transfer to supervisors, and transfer to different departments.  CMS identified that the client account had not billed on the correct carrier platform, which resulted in the unnecessary charges. 

Credit issued.  Problem solved.  

CMS eliminates at least 90% of the items on your telecom/cellular to-do list, and simultaneously reduces hard-dollar monthly costs.  We guarantee measurable results. 

Let's talk (503) 972-9999.  See us at www.cmsenterprisesinc.com

Wednesday, March 26, 2014

BYOD Summarized - It's a Mobile World

Mobile devices are valuable business productivity tools for companies and their employees.  And, because mobile devices increase productivity, many organizations have administered and paid for their employees’ devices.  In a quest for financial efficiency, organizations shift the cost and administration of cell phones to the employees.  An employee’s use of a personal mobile device for business purposes is Bring Your Own Device (BYOD). 

Overall, how do you want BYOD to benefit your business?  Is the set of goals clear and measurable?  How do you measure the cost efficiency, progress, and performance, in your BYOD program?

            A First Look at BYOD

BYOD shifts the responsibility and cost of cellular devices from the employer to the employees.  The gains for the employer are reduced costs, reduced support, and reduced administration.  The gain for the employee is broader choice of mobile devices.  Also, if the employee was carrying two phones, one personal and one business, he or she can now carry one phone. 

For an organization to transition to BYOD: 1) Install security, and 2) Have employees sign policies and procedures.  Easy, right?

Good control is good business.  Careful planning for mobile device management is essential for a successful BYOD implementation.  Unfortunately, many companies migrate to BYOD without careful planning.

            Risks of BYOD  

What's your risk by migrating to BYOD, and how do you quantify it?

Anthony Diana, partner at the law firm Mayer Brown, addresses the risks of BYOD: "There are legal risks, such as the ability to access information responsive to document requests for preservation or production.  There are regulatory risks associated with information on those devices that may be subject to regulatory retention and supervision requirements.  There are information security risks associated with lost or stolen devices, as well as many different devices having access to the organization’s networks.  There are data privacy risks associated with the mix of personal information with business information on one device. The question for any organization is how to best mitigate and balance these risks in light of the business demand for BYOD flexibility.”

If your organization is associated with the health care industry, inappropriate use could cause you to violate rules and regulations of HIPAA.  Something as obvious as having records in an unsecured place, like an unencrypted device, or on someone’s kitchen table, would violate HIPAA regulations.  Confer with your compliance officer.  Violations are not worth the risk.

How much do you want to avoid risks, and will your efforts interfere with employee productivity?

          Cost of BYOD

The payments for the mobile device become the responsibility of the employee.  The employee pays for the monthly cost of the service plan, overages, downloads, device upgrades, accessories, international long distance, roaming, text overages, and the additional taxes.  Corporate discount plans are not available to individual plans.   

A potential revenue leak is employees who expense cell phone costs in creative ways.  This is counter-productive to the principle of BYOD saving money for the employer. Address this problem in your policies and procedures. 

The costs to the organization are security and support, if offered.  How much money needs to be allocated to support BYOD?  Will you use a Mobile Device Management (MDM) provider?  How are future costs contained? 

Every company culture is different.  If you are on a BYOD program, does your company offset the employee’s cost with a stipend?  Are employees happy with the arrangement?  Productivity increases when employees are happy.  Will they conform to the new policies and procedures?  Are your employees spending company time on maintaining and trouble shooting their mobile devices?  Is your organization saving hard-dollar costs under BYOD? 

          Managing Mobile Devices Owned by Employees

The employee’s use of a personal mobile device becomes subject to restrictions of the organization’s policies.  How much authority does your organization have over an employee’s personal property?  Prepare employees with clear communication for the transition to their responsibility of the cost and policy restrictions.

Anthony Diana also states that BYOD imposes risk in that, “… organizations find themselves almost entirely dependent on policies and their employees’ compliance with such policies to manage the considerable risks associated with electronic data.”  An organization “…is forced to rely more heavily on employee participation and compliance with policies to manage risk.” 

Diana highlights the need for clear policy, and also audit procedures, “Because an employee’s use of his or her personal device is largely outside of the employer’s control, critical components of any BYOD program include a clear, concise policy that is developed with the input of all the relevant stakeholders, together with audit procedures that validate and ensure compliance with that policy.”   The organization should set policies and enforce its policies.  

Your employees expect to use their devices and applications at all times.  How much support will you offer to your employees?  Is your help desk ready to assist with the variety of devices?  Many companies find that centralized management and support of BYOD is not practical, because of the variety of devices and carriers, therefore each employee becomes responsible for his or her own device and technical support. 

Employee Productivity – some staff need more support than others.  Are there employees who have less ability to fix his or her cell problems?  Should fixing cell issues be considered company time or personal employee time?   You will rely on employees to be responsible for lost, stolen, and malfunctioning devices.  You want your employees to invest time to trouble shoot problems and manage invoices? 

BYOD is easier without corporate applications, because the corporate applications add a layer of complexity.  Your applications must meet the demand of employees.  Will applications cause technical constraints and difficult deployment?  Do corporate applications work on all devices and platforms?  What limitations are there on applications?  How well defined is the company’s policy? 

What are the side effects of BYOD, if any?  For example, think about telephone numbers as a company asset.  Would you port-out your main corporate phone number to one of your former employees?  How about the number to your purchasing department?  The point is that a mobile number used for business is your organization’s property.  Whatever that employee does for your organization, the employee may be terminated, and the phone number is property of the employee, not your business.  Clients and vendors will use the mobile number to contact the employee, terminated or not.  

Overall, how much accountability to you expect from your employees?  What are your audit procedures that validate to ensure compliance with the policies?  

          Security

Security and data loss remain top concerns for companies that allow BYOD.

A recent statistic from Canada reveals that 58 per cent of Canadian organizations are losing corporate information through laptops, smart phones and tablets used by employees.   

Ensure that basic security includes: Requiring employees use a complex password, or better, a pass phrase, if the device can accommodate it.  Use encryption.  Enable GPS tracking to help find lost devices.  Wipe business data from lost devices, ask the employee if he wants the personal information wiped from the lost device.

If unmanaged, BYOD can allow hacker access to your network resulting in data loss. You need effective network access controls and policies to secure your data.  One part of policy is to require employees to install mobile security solutions on their personal mobile devices.  But, how will you recognize and fix data leaks?  What do you say to an auditor if information is compromised?  How do you protect against malware and viruses entering your network? 

An issue as simple as forwarded emails to personal accounts opens the risk of corporate information traveling outside your organization.  Can you limit the ability to forward a corporate email to a personal account?  How can you ensure that company data is encrypted and deleted according to policy you set?  Do you have a plan to keep your corporate data and network secure?  What if the plan doesn't perform as intended?

The good new is that there are many resources for security related to your BYOD program. 

            Professional Help is Available

Like every project, know what you want, how you will measure it, and how you will reach your objectives.  Assistance from outside your organization can increase your success.  A Mobile Device Management (MDM) provider is an important component of any successful BYOD program. Your MDM provider enables you to achieve the right balance between providing enterprise security while maintaining employee convenience and privacy.  An MDM provider can supply functional and flexible MDM tools that addresses the fundamental concerns about your BYOD program.

          Thank the Experts


The law firm of Mayer Brown served as a resource from an article titled, ”Electronic Discovery & Information Governance – Managing the Risks of Bring Your Own Device” by Anthony Diana and Therese Craparo.  Click here for article.

Anthony Diana is a partner at Mayer Brown, and focuses his practice on commercial litigation, electronic discovery, internal and regulatory investigations, and bankruptcies.  He is a co-leader of Mayer Brown’s Electronic Discovery & Information Governance practice.  Click here for Anthony’s bio.

Therese Craparo is an experienced litigator at Mayer Brown, whose practice focuses on complex commercial litigation, including technology and telecommunications and electronic discovery.  Therese is a member of Mayer Brown’s Electronic Discovery & Information Governance practice.  Click here for Therese’s bio.


Thursday, February 20, 2014

Consolidated Bill: Better Scrutiny Yields Lower Cost

Many organizations don't have the time to carefully scrutinize consolidated billing.  

CMS discovered that a new client was paying for two point-to-point circuits.  Problem: The circuits had not been used in 10 years.  The carrier billed for these two circuits, along with other services, in a consolidated bill.  There was no red flag.  We contacted the carrier, and disconnected the circuits.  We followed through to make sure the invoice reflected the disconnects.  

If you are enjoying the convenience of a consolidated bill (also know as aggregation, or summary invoice), the carrier may be enjoying the benefit of receiving over-payment from you. 

CMS will give you complete visibility for you to know what you have, why you have it, and why you are paying that dollar amount.  CMS routinely finds unexpected hard-dollar savings for its clients.  That’s part of our job. 

You get pure savings.  No contingency commissions.  We do all the legwork.  Thorough scrutiny.  Exhaustive follow through.  Flat fee.  No change of carriers.  CMS takes the time to solve problems, and do the work, so your staff can focus on core priorities.  And, we guarantee to deliver monthly hard-dollar savings.   

Please visit us at www.CMSenterprisesinc.com   Feel free to discuss your situation with us, call (503) 972-9999.  Thank you.

Friday, January 17, 2014

Wrestling for Results

A company with geographically diverse locations reduced monthly telecommunications expense by renegotiating a contract with their primary carrier.  So far, so good.

Problem.  The company, and the carrier, did not follow through to carefully examine the new billing.  The company did not notice the problem, because their costs dropped.  No one had the time to verify the invoices against the contract terms.

After the company hired CMS, we caught numerous billing errors.  Wrong rates were inconsistently applied.

CMS wrestled with the carrier, and did all the legwork.  The carrier issued checks totaling $60,031.87 to the client.  The money was refunded, because CMS caught the 6 months of billing errors.  We tenaciously followed up to get the credits for our client.  The account now bills correctly.

The on-going savings, and credits from the past, belong 100% to the client.  CMS does not charge a contingency fee, or accept payments from carriers.

This may not represent a situation of every company.  But, where there are telecom and cellular problems, we will achieve measurable results.  We have since 1989.

Look at us behind our back