Plum Voice Blog

Stay up to date on the most relevant topics and developments in the world of automated communications with tips, tricks, and advice from Plum

Change Your Healthcare Billing for the Better with IVR

Healthcare Billing Featured Image

The World of Healthcare Billing A recent article from Advance Healthcare Network highlighted some of the issues that exist in the world of healthcare billing and offered a number of specific areas where healthcare companies can focus their energy to create a better experience for patients. This article demonstrates how no solution exists in a vacuum. But that just means… Read More

IVR – The Strong, Silent Partner In Mobile Banking

IVR Mobile Banking Featured Image

From Here to There and Everywhere Are we seeing the swan song of brick-and-mortar store fronts for banks? It’s no secret that mobile banking has taken off in recent years. People are more likely to stand outside their bank and complete a transaction on their phone than to actually go inside. Scaling back the number of brick-and-mortar locations eliminates a… Read More

Case Study: Use Voice Tech to Provide More, Better Payment Options

NMSC Case Study Feature Image

Merchant services companies have lot of different payment channels to offer their customers these days. These are the companies that provide customers with the infrastructure to accept and complete payments. Needless to say, with the right merchant services company, a business can cater to the needs of their customers no matter how diverse those may be. One of Plum’s clients,… Read More

How Credit Card Transactions Work: A Tutorial

Credit Card Trans Blog Image Featured

One of many famous scenes in the mockumentary This Is Spinal Tap occurs when the band is trying to get from their dressing room to the stage and they end up getting lost in the hallways and corridors of the venue. If you’ve ever wondered what happens after someone swipes a credit card—how, exactly, does the payments process work?—then chances are you’d… Read More

Experts Reveal How to Get Healthy, HIPAA-Compliant IT

HIPAA Blog Image Featured

Personal medical information may be the only type of data that is more valuable to internet ne’er-do-wells than credit card information. Health care data breaches are serious business so having security measures in place to protect patient information is critical. The federal government passed the Health Insurance Portability and Accountability Act of 1996 (HIPAA) to help address this situation. Companies… Read More

Expert Advice on Getting Your Tech PCI Compliant

PCI Blog Image Featured

If your company does or is thinking about processing credit card payments, whether it’s a single transaction or millions, it’s wise to ensure that those payments go through a PCI-DSS compliant environment. PCI-DSS is a set of security standards established by the leading credit card companies, e.g. Visa, MasterCard, American Express, and Discover. To be clear, there are a number of… Read More

A Beginner’s Guide to HIPAA and PCI-DSS Compliance

HIPAA and PCI DSS

We spend a lot of time talking about security these days. And right so. Data breaches can be costly for everyone involved. We’re not just talking financial costs either, although those can mount quickly. Industries that deal with sensitive customer data on a daily basis need to ensure that the people and companies creating and using that data do so… Read More

5 Ways Cloud-Based Automation Benefits Call Centers

Cloud Automation Benefits

There’s a scene in Wayne’s World, soon after Wayne and Garth sign a network contract, when Benjamin approaches Garth, who’s busy working one of his gadgets. Benjamin wants Garth to convince Wayne to change part of the show. With a frightened look on his face, and in a panic-stricken voice Garth responds, “Change? We fear change.” While this piece of… Read More

Adding Voice Biometrics Security is as Easy as A-P-I

Adding Voice Bio Security

It doesn’t take a genius to know that security is critical to successful business operations. Recently we looked at different authentication methods and how to use them. Naturally, as a company that deals in voice communications, it makes sense to highlight the benefits of voice biometrics as a security option. How It Works There are two elements to voice biometrics:… Read More

A Guide to Understanding the Language of Secure Authentication

Authentication Methods

Je ponce, donc je suis. Cogito egro sum. I think, therefore I am. Regardless of the tongue, this bit of philosophical thought is one that virtually everyone has heard. What does an esoteric question like this have to do with cybersecurity? One thing that Descartes exposes in his famous declaration is a relationship. One does not exist without the other…. Read More