TaCode Tuesdays:  How to Use Zang to Create Automated SMS Alerts & Prevent Credit Card Fraud

Posted by Pedram Mohammadi on January 3, 2017

Welcome back to TaCode Tuesdays! This is the only place you can find snippets of code for use in your very own text/voice apps, along with a weekly dose of taco puns. I’m a developer here at Zang and not only am I a big fan of tacos (if that wasn’t already apparent), I’m also a fan of open source. My goal is to share a new app idea each week that you're free to use “as is” or modify and use as the basis for your next app.

Read More

Topics: Ideas, TaCode Tuesday, SMS, Alerts

How to Create Automated Surveys Through Voice or SMS to Measure Customer Satisfaction

Posted by Alex Misevski on December 29, 2016

A recent study found that a satisfied customer tells nine people about the positive experience, while a dissatisfied one tells nearly twice as many people about their negative experience. Therefore, perfecting customer experience can do wonders in driving brand loyalty and consequently increasing revenues. Fortunately, developers can create an automated survey that can be answered over phone or SMS to enhance customer experience using Zang’s APIs.

Read More

Topics: APIs, CX, SMS, Automation

The CMO’s New Role: 360 Degree Customer Engagement

Posted by Mo Nezarati on December 15, 2016

Once, chief marketing officers (CMOs) were primarily tasked with brand management, market research and advertising. Today they’re being asked to do a whole lot more—from implementing technologies to analyzing data to customer service to measuring impact—all in an effort to forge stronger bonds with customers.

Read More

Topics: CX, SMS, bots

Failed Delivery? Top Factors That Affect Message Delivery

Posted by Bryan Dingwall on December 1, 2016

In spite of its popularity and ease-of-use across the world, SMS delivery is not always guaranteed, and several factors influence the successful delivery of sent messages. From number validity to routing factors, this article will address some of the top factors that affect message delivery. If you’re a mobile app developer, you should take them into consideration when building and testing your apps.

Read More

Topics: Phone Numbers, SMS, messaging

How Secure is SMS-Based Two-Factor Authentication?

Posted by Alex Misevski on November 17, 2016

With the current increase in digital crime and internet fraud, depending on passwords is no longer sufficient, and two-factor authentication is becoming a critical aspect of maintaining the security of mobile applications. In fact, a recent report indicated that more than half a billion online personal records were breached in 2015, and mostly through mobile devices. Therefore, strengthening the authentication process should be a priority of any mobile app developer.

How It Works

Two-factor authentication, as the name suggests, involves presenting two authentication credentials to ascertain the legitimacy of the user signing in to an iOS or Android app. It adds an extra layer of security by sending a random code to an individual’s device using an SMS message, which the user will input, along with a name and password, to gain access to his or her account.

When a mobile app user wants to log into his or her account, he or she will be prompted to validate with a unique username and password—which is the initial authentication layer.

Next, the two-step verification will require an additional procedure to reconfirm the user’s credentials. The most cost-effective procedure involves using either one-time-password (OTP) security tokens sent via SMS to the user’s mobile device or out-of-band (OOB) methods involving completing the authentication process over a different channel other than the primary one.

The purpose of the additional step is to discourage attackers who are trying to steal a user’s information by fraudulently penetrating their accounts. If you integrate dual factor authentication into your apps, a cybercriminal will require both the first verification process as well as the OTP to gain access to a user's’ credentials.

With the two-step verification technique, even if a hacker has retrieved a user’s username and password by exploiting a vulnerability in a mobile application, taking complete control of the account will be difficult because of the absence of the one-time-password, which must be sent as an SMS to the user’s mobile device. Consequently, this results in fewer security breaches and reduced total costs on interruption.

Read More

Topics: Security, mobile apps, SMS