top of page
All Posts


Luck is Not a Strategy: The Growing Threat of Help Desk Caller Impersonation
Help desk impersonation is on the rise. Don’t leave security to chance—learn how to stop attacks before they start.

Tracey Nyholt
Mar 253 min read
20


Best Practices for Verifying Callers in Call Centers
Caller verification is key to call center security. Avoid guessable info, rethink biometrics, use device-based factors.

Tracey Nyholt
Jan 202 min read
25


Caller Verify: An Award-Winning Solution
We are proud to announce that TechJutsu has been nominated for an award in the Okta Elevate Partner Program.

Tracey Nyholt
Oct 21, 20241 min read
7


Skating Ahead of Cyber Threats
Embracing Gretzky's strategy, cybersecurity must skate to where threats will be, not just where they are.

Tracey Nyholt
Sep 5, 20244 min read
3


Beyond Passwords: Verifying Callers Amidst the CrowdStrike Crisis
Explore the need for robust caller verification following the CrowdStrike incident, focusing on secure methods beyond passwords.

Peter Steller
Jul 31, 20244 min read
4


Social Engineering Attacks Targeting IT Help Desks in the Health Sector
With the rise of social engineering attacks on IT help desks, discover how Caller Verify combats cybersecurity threats.

Peter Steller
Apr 25, 20243 min read
6
bottom of page