
Coffee Break IT Webinars Fall 2025
Topics:
Vulnerabilities Scanning: Top 5 Most Identified Threats | Voice with Microsoft Teams | AV vs. EDR: What’s the Difference? | Voice with AZURE

Topics:
Vulnerabilities Scanning: Top 5 Most Identified Threats | Voice with Microsoft Teams | AV vs. EDR: What’s the Difference? | Voice with AZURE

Topics:
Vulnerabilities Scanning: Top 5 Most Identified Threats | Voice with Microsoft Teams | AV vs. EDR: What’s the Difference? | Voice with AZURE

Topics:
ATCOM Cirrus Hosted Voice | Charting Your Company’s IT Course | Microsoft Teams Voice | Who’s Checking Your Boxes?

Topics:
ATCOM Cirrus Hosted Voice | Charting Your Company’s IT Course | Microsoft Teams Voice | Who’s Checking Your Boxes?

Topics:
Strategic IT Planning: Core Components | New MITEL Endpoints | 2022 Cybersecurity Statistics & Trends | ATCOM Cirrus Hosted Voice

Topics:
Vulnerabilities Scanning: Top 5 Most Identified Threats | Voice with Microsoft Teams | AV vs. EDR: What’s the Difference? | Voice with AZURE

Topics: Navigating Potential Pitfalls in
Cyber Insurance | FCC Update for Softphones | Policy and Compliance in
Business Technology | Premise/Hybrid/Cloud | Email

Topics: Collaboration in the Cloud | IT Outlook for 2021 | Mass Notification | Cyber Security Update for 2021 | Softphones | Disaster Recovery Planning

Topics: Keeping your remote worker secure | Collaborative Team | SD-WAN | Data Protection Strategies | Time For The Cloud?