Professional Documents
Culture Documents
- History
The CrowdBox expanded
• Tele/Digital Marketing Agency based in Sydney offering includes:
• Work with some of the world’s largest IT vendors, • Event audience acquisition (Regos)
distributors and resellers.
• BANT lead generation Leads
• KPI’s: 100 calls per day, 1.5 Hours
K.P.I’s
• Make the minimum daily call rate of 80-100 calls per day.
• Meet the minimum client lead campaign requirement on a daily and weekly basis.
• Maintain and manage both the client and company database as requested and in line with client and company
policy.
• Attend team meetings and client briefings when required and at the scheduled time. Participate in a positive and
respectful manner.
Behavior Values
• Look for opportunities to develop yourself and colleagues in technology and sales.
• Always represent the client in a professional manner, particularly when engaging customers
• Look for ways to improve the business, systems, processes and procedures to ensure you achieve the client, the
company and your goals.
• Collaborate with colleagues, managers and clients for the benefit of CrowdBox and its clients.
• Escalate complaints both client and personal using the standard escalation procedures.
• Utilise the internal email system appropriately for work use only.
• Ensure no mobile phones or internet is used for personal use in company time.
Module Overview: This Module will run through all of the day today operational
tasks involved when working for CrowdBox. This module will cover the following
topics:
1. Gatekeeper Tips
2. CRM call outcomes
3. BANT overview
4. What is a BANT qualified lead?
5. What is an Event Registration?
6. What is an Optin/Profiled Optin?
7. Quality Assurance Team Overview.
8. Lead Rejections/Cancellations
Module 1: Gatekeeper Tips
If you do not have a mobile number or Direct Line to call, you will need to be able
to get past the Gatekeeper or receptionist to get to the correct contact. Below
will include some tips on how to get past the Gatekeeper.
If you’re struggling getting past the gatekeeper try some of the below.
A number of factors contribute to your level of success: tone, language, approach
(be assertive), all these things can really help.
Giving the impression you have spoken to the gatekeeper before can help build
familiarity.
1. ‘Hi (gatekeepers name) It’s (your name) calling back from (your company),
how’s it going? I’m just after (first name) again (if questioned for last night
name by gatekeeper)-‘firstname lastname’.
2. If questioned why calling…… ‘just wanting to have a quick catch up in regards
to our printers your currently using?’ ‘just wanting to have a quick catch up
in regards to as you’re one of our customers?
3. If they don’t work there anymore…… ‘oh that makes sense he’s not been
replying to my emails recently, who’s taken over from him then?’
4. If they don’t work there anymore…….’oh that’s strange (prospects name)
never let us know he was leaving sure he had a lot on his mind, who’s taken
over from him now?
5. Is he expecting your call………… ‘YES, I spoke to him a couple of weeks ago
just calling back…’
Module 1: CRM Call Outcomes
Contact level Outcome When To Use Next Action
A – MQL or A – Req You have Qualified an Opportunity with a Decision Maker that Confirm the contacts Full name, Job Title, Work email address, a direct office of mobile phone number and the
meets the Campaign requirements of Budget, Authority, Need address that they are based at. Then go over the details that you have discussed with them an confirm that they
and Timeframe. are happy to be contacted by a client account manager within the next 2 weeks. Follow lead write up template
F – Call Back 1 First call attempt to contact with no success go to next contact
F – Call Back 2 Second call attempt to contact with no success Start looking for alternative contacts for Account
F – Left Message Left a message for contact on their VM or with colleague Await for contact and go to next contact
F – Nurture You have part qualified a lead with a decision maker, however Agree on a call back date with the contact and make a note of when this is so you can call them. Update nurture
need to call them back at a later date to close. i.e. the date.
timeframe is too far out or they are awaiting a decision to
move ahead with a project from management
S – Send Info No requirement however contact wants further information on Update record at Account level also, and send email if one has been provided by Account Manager. If you are
client product/service via email unsure if you can send emails on your campaign please speak with Account Manager
D – Already Talking to Client Decision Maker is already in contact with Client Update Contact notes and then copy notes into Account Level
D – No Requirement Decision Maker confirms there is no requirement for client Update Contact notes with reason for no interest and then Copy notes to Account Level
product/service at this time
D – Outsourced Contact confirms that Decisions are made by an Outsourced Update Contact notes and then Copy notes to Account level. If Possible obtain name of outsourced company
IT company
D – Referred On Contact informs that they are not the Decision Maker and you Update contact notes including the name of the contact you have been referred to and save notes.
obtain the Name and phone number of who to speak with.
Please update contact notes with the name of the person that Then clone contact and update new contact/DM details into new contact account and then call this contact.
they referred you to. From here treat as normal contact
D – Could Not Locate Switchboard has no record of contact on file Update contact notes. Find out from Switchboard the right contact and then add them to the database as new
contact to call
D – Do Not Call Contact asks for you not to call them again Apologise for the inconvenience and update contact notes.
D – Double Record You see that the same contact is down twice for an account Mark one record as Double record and use the other as a normal contact.
D – Company Too Small Company does not meet the client requirements for certain Update Contact Notes and then copy over into Account Level
criteria such as minimum staff, minimum locations, minimum
storage TB for example
D – Overseas Decision Contact informs you that all Decisions are made overseas Update Contact Notes and then copy over into Account level
D – Current Client Decision Maker confirms that they are a current client of who Update Contact Notes and then copy over into Account Level
you are calling for
N – Left Company The contact on file has left the company Update contact notes. Find out who the replacement contact is and them add them as a new contact to the account
N – Company Closed Down The company has closed down Update Contact Notes and then copy over into Account Notes
N – No Phone Listing Switchboard are unable to find a phone listing for contact Understand the contact details for another relevant contact that you can speak with.
Module 1: What is a Fully BANT Qualified Lead?
Remember, for a Lead to go to QA a company must have a PROJECT or
Our Business at CrowdBox is to provide our Clients with High Quality Leads PAIN POINT, and Budget must be AVAILABLE OR OBTAINABLE.
from Companies that have Fully BANT Qualified Requirements.
Additionally, both Project and Pain Point Leads must meet the following
Fully BANT Qualified Requirements fall into two categories, either criteria from the time you call them:
Confirmed Projects or Known Pain Points. 1. The Company will purchase/or implement a solution within the Clients
expected Timeframe (6 months).
A Confirmed Project is something that the Company has identified they will 2. The Company agrees to be contacted by the Client rep within 2 weeks.
be looking into and have budget set aside for. With this we must capture 3. If the Client Solution meets the Company’s requirements, they are able
the compelling reason for them putting this project in place and what Pain to obtain budget with 6 months.
they are looking to overcome. In this instance, Budget will be Available. 4. The client must be exploring the market with a view to speak with other
vendors similar to our client to overcome their pain point.
A Known Pain Point is something that the Companies has not set budget
aside to look at but needs to be addressed as it is affecting the business. All of the above must be qualified for a Lead to be passed to QA, if any of
With this we must capture the compelling reason for them putting this these are missing, i.e. the Company would not be able to obtain budget
project in place and what Pain they are looking to overcome. In this within 6 months, then it is not a Lead as they do not have a Qualified
instance budget must be obtainable, i.e. Via a Business Case Requirement.
Interest is where a contact identifies that they are interested in the clients Additional information you must capture:
Product/Solution, however they have no Project for it and there is no Pain
Point that the Product Solution would overcome; All they are looking for is 1. The Contacts Direct Number, either Mobile or Desk Number, ideally
more information on the solution or pricing on the solution but have no both.
view or compelling reason that would require it being purchased within 6 2. (If someone is unwilling to give you a contact number then are they
months. This will not be accepted by our Quality Assurance team as our really interested in speaking with the client?)
clients do not Pay CrowdBox for interest-based leads. At best, this would 3. Personal/Work email address. Emails such as Info@, IT@ or Reception@
be a Nurture. are not acceptable.
4. Physical Address where the contact is located. No PO Box address.
Module 2:
GDPR
Module 2: What is GDPR
What is GDPR:
The General Data Protection Regulation (GDPR) is the toughest privacy and security law in the
world. Though it was drafted and passed by the European Union (EU), it imposes obligations onto
organizations outside of the EU.
Six GDPR Principles:
1. Data processed lawfully, fairly and in a transparent way in relation to individuals
2. Collect Data for specified, explicit and legitimate purposes and not processed beyond
those
3. Adequate, relevant and limited to what’s necessary in relation to the purposes for which
they are processed
4. Accurate and kept up to date
5. Kept for no longer than is necessary for the purposes for which the personal data is
processed
6. Processed in a manner that ensures appropriate security
Legal Grounds for Processing Data: (that are relevant to this activity)
1. The subject has given consent
2. Processing is necessary for the purposes of the legitimate interest pursued by the
controller
Note – the controller is the client, the processor is the agency.
Note – the privacy policy details the processes by which a company operates in relation to
GDPR. End user has right to this, if they request. In this case, the privacy policy in question
would be of the controller (the client)
Module 2: What is GDPR
Objection Handling (When on Calls)
The legal rights of the data subject:
1. How did you get my number?
a. I am calling from CrowdBox. You registered through our website, and we
are simply reaching out to you in order to provide access to this
1. Right to be informed (e.g. share privacy policy) complimentary resource. If you wish to be opted out please let me know.
2. Right of access (would need to involve the client) (Return to where interrupted)
2. Please remove me from call list?
3. Right to rectification (e..g update contact number/email) a. Sure, we can remove you from our database now and make sure that you
are never contacted by phone again. Removing you will mean you’ll never
4. Right of erasure (would need to involve the client to relate to their CRM) receive exclusive whitepapers, invitations to our client’s events or
5. Right of restriction of processing exclusive offers and discounts on new IT products. Shall I remove you now?
– Tag contact as “Do Not Call” in database.
6. Right to data portability 3. Are you going to spam my email account?
a. We will not spam you. Since you chose to opt-in you will receive marketing
7. Right to object communications on the matter that may be of interest, but you can
8. Rights in relation to automated decision-making and profiling unsubscribe at any time. (Return to where interrupted)
4. I would like to speak to your manager.
a. Certainly, [Rob Jefferies] is responsible for Crowdbox customer contact
centre. They are currently away from their desk, but I can get him/her to
CB Processes support CB processing where the client is the controller. call you back as soon as possible, can I please re-confirm your telephone
number so that we can call you straight back?
5. I am going to report this call
How does this effect you? a. [Rob Jefferies or Daniel Tuck] is responsible for Crowdbox customer
contact centre, I can get them in touch to manage this complaint.
6. Please do not call me again.
There is a huge increase in interests around data privacy – primarily due to the a. Sure, we can remove you from our database now and make sure that you
increasing of importance data plays in our everyday life (Facebook, Google, are never contacted by phone again. Removing you will mean you’ll never
Amazon. Govt, Digitalization etc). As a result there is a strong chance, at some receive exclusive whitepapers, invitations to our client’s events or
point, you will be asked about data privacy. Here are some scenarios:
exclusive offers and discounts on new IT products. Shall I remove you now?
– Tag contact as “Do Not Call” in database.
Module 4:
IT Security
Key Module Areas
1. Endpoint Security
2. Email Security
3. Cloud Security
4. Firewall
5. Security Awareness
Training
Endpoint Security
Endpoint security Explained: EP Security is the practice of securing endpoints or entry points of end-user devices such as desktops,
laptops, Servers and mobile devices from being exploited by malicious spyware, viruses and campaigns. Today's endpoint
protection systems are designed to quickly detect, analyse, block, and contain attacks in progress. All organisations have to have
endpoint security installed across their workforces endpoints (by law) and is usually a annual license model.
•
•
•
•
•
•
•
•
1. Can you give me some rough indication on the
number of Endpoints in your network?
2. How many Physical Servers + Virtual Machines.
3. What vendor are you currently using for your
endpoint protection? (Refer to Gartner Report).
Email
Email Journey Quarantine (bin)
SAFE EMAIL
DELIVERED TO
USER
Email sent to: Vendor Email Security
dan.tuck@directit.com.au Software (Sandbox)
Common Email
Security
Vendors
•
•
•
•
•
•
•
•
TIP: Before any cold call, check which email security solution they are
already using. Knowing their current solution helps the user open up
about their environment using https://mxtoolbox.com/ You simply copy
the domain into the search bar, and it should provide you with
information on what they are using. It won’t give you results for every
domain, but can provide a useful angle.
Email Security:
Key Qualifying 1. What are you currently using in terms of Email Security, how
many malicious emails are getting through?
Questions 2.
3.
How many mailboxes + employees do you have?
When is your SLA/Contract up for review? (Within 6 months).
4. Are you on O365? (If yes) Since the adoption of office 365
we've found an increase in compromised accounts with
targeted attacks.
5. Have there been any examples of successful phishing attacks
at the company?
6. What flaws have you seen in your current solution?
7. How would you like to improve upon your current solution?
Cloud Security
What is cloud security: Cloud security is the whole bundle of technology, protocols, and best practices that protect cloud
computing environments, applications running in the cloud, and data held in the cloud. Securing cloud services begins with
understanding what exactly is being secured, as well as, the system aspects that must be managed.
As an overview, development against security vulnerabilities is largely within the hands of cloud service providers (AWS,
Microsoft Azure, Google Cloud, Apple). Aside from choosing a security-conscious provider, clients must focus mostly on
proper service configuration and safe use habits. Additionally, clients should be sure that any end-user hardware and
networks are properly secured.
The full scope of cloud security is designed to protect the following, regardless of your responsibilities:
•
•
•
•
•
•
•
•
1. Who is your incumbent firewall vendor?
2. Do you have a multi vendor approach, if so which vendors?
3. How many Firewalls are you managing? - in the data center,
network edge or to/from the cloud.
4. Do you have any branch locations/offices or multiple sites
Firewall 5.
6.
How do you manage Firewall policy rule changes?
Are you happy with their capabilities and innovation? Do you
Qualifying 7.
have any issues?
Is managing your current firewalls for policy and configuration
Questions 8.
an ongoing challenge?
When is your refresh cycle or when would you potentially look
at replacing your Firewalls?
9. Do you feel they will be able to meet your performance needs
for growing usage on your network and the increasing number
of threats which is also increasing the need to inspect all traffic
including encrypted traffic for threats and malware? Also for the
growth in IoT and 5G?
10. Do you have a growing requirement to segment your networks
and applications or apply Zero Trust?
Security User Awareness Training (UAT)
The vast majority of today’s threats require
humans to activate them. You can ensure your
users know what to do when faced with a real
threat by providing them with targeted education.
You can use the UAT people-centric approach to
reduce successful phishing attacks and malware
infections by up to 90%. This offers various (over
20) interactive training modules.
UAT allows IT Managers to send out phishing
campaigns to end users. If any users fall for a
phishing attack, they will get a message displayed
on their screen. They will then be asked to
complete the most relevant training module. It
gives you a full analytical breakdown as seen
below:
It is designed to help you deliver the right training,
to the right people, at the right time.
Common Security
Awareness
Training Vendors
•
•
•
•
•
•
•
1. What do you have in place for user awareness training?
2. Do you have software already or are you using your own in-
house training?
3. (IF NO – nothing in place) More than 90% of cyberattacks start with
an email, wary end users are critical to protecting your data. What are
Security/User you looking to do in regards to training your end users moving
forward?
Awareness 4. (IF Yes) How are you finding it? How would you improve on your
current solution? (Link their desired improvements back to PSAT
where possible)
Qualifying 5.
6.
Have you ran a phishing campaigns previously?
(Yes) What was the outcome of that campaign? What do you do with
individuals that falls for the Phish? How are you notified that
Questions they’ve fallen for it? (Inform PSATs efficiency in terms of reporting
results of Phishing Campaigns back to IT Manager)
7. (No) When are you looking to do this with your end users moving
forward?
8. Have you had any end users fall for Phishing emails in that past?
9. (Yes) Is there a particular department or range of individuals that are
targeted? How often do these phishing attacks occur? Do you feel
that these staff members are adequately trained to identify Phishing
attacks?
10. (No) 83 percent of global email security respondents experienced
phishing attacks in 2018, which is up from 76 percent in the previous
year. With those percentages it’s only a matter of time before you are
targeted, which is why we’d like to show you PSAT. Can we show you
PSAT in the form of a demo?
End of
Security
Module
Module 5:
Infrastructure
Infrastructure
Overview
5. Key Module Areas
1. Servers
2. Laptop/Desktop
3. Storage
4. Back Up
5. Networking/Switching
6. Cloud
7. HCI (Hyper Converged Infrastructure)
1. Servers
Server Explained: A server is a “computer” on a network that provides data and other services that can be shared and accessed by other
end user computers and laptops (clients) within the network. Servers can fill multiple purposes, such as supplying software (Active
Directory) and applications to other computers on the network, while others may be dedicated for a single purpose like application
development. Popular services that servers provide to SMB customers include: file and print sharing, web, database, remote access,
and authentication as well as using them as test environments for new applications. The Server is the “Brain” of IT Infrastructure and
controls all of the end user devices like Laptops, Desktops, Printers, Switches, Firewall. You can also create policies to block users
accessing certain applications and editing writes.
•
•
•
•
•
•
•
Server Campaigns: Key
Qualifying Questions
1. How many host servers do you currently manage? Physical and
Virtual Split.
2. What operating system do they run?
3. How many servers do you anticipate to manage this time next
year?
4. How many host servers are approaching end of life over the
next 12 months?
5. Which vendors do you have in place and how many stand-alone
servers remain?
6. How far along with server virtualization are you?
7. At this time next year how far along with virtualization do you
want to be?
8. Which Virtualization Vendors do you use? VMWare HyperV
2. Laptop & Desktops (Endpoints)
Every Organisations will have endpoints (peripherals) that connect to the Master Server on the network. All
endpoints are provisioned with an IP Address. Note - An IP address is a unique address that identifies a device on
the internet or a local network.
All desktops are hardwired using ethernet cables which will be directed to the switch which in turn is connected
to the server which manages all applications and updates. Most Laptops and Desktops will have a refresh cycle
where organisations will replace every 3-5 years – this is important when working on these campaigns. Tip – the
collective term for cluster of laptops and desktops is called a “fleet”.
Endpoint Overview
Laptop Desktop Qualifying Question
Common
Laptop/Desktop
Vendors
Module 6:
Storage +
Backup
On Prem Network Storage Diagram
3. Storage
• Storage is a process through which digital data is saved within a data storage device. Storage is a mechanism that enables a computer to
retain data, either temporarily or permanently. Most organisation have a hybrid storage set up utilizing both on premise stor age (physical)
and Cloud Storage (off-site).
• Data storage can occur on physical hard drives, disk drives, USB drives or virtually in the cloud. The important thing is tha t your files are
backed up and easily available should your systems ever crash beyond repair. Some of the most important factors to consider i n terms of
data storage are reliability, how robust the security features tend to be and the cost to implement and maintain the infrastr ucture. Browsing
through different data storage solutions and applications can help you arrive at the choice that is the best fit for your bus iness' needs.
Storage Types:
• NAS (Network Attached Storage) - Allows for multiple machines to share storage over a network. This is accomplished with multiple
hard drives or other storage devices. One of the key benefits of NAS is the ability to centralize data and improve collaborat ion. Data
can be easily shared among connected machines, and permission levels can be set to control access.
• DAS (Direct Attached Storage) – Direct attached storage (DAS) includes types of data storage that are physically connected to your
computer. This storage is generally accessible to only a single machine. Some common devices in this category include: Hard D rives,
Solid-State Drives (SSD), CD/DVD Driver, Flash Drives.
• SAN (Storage Area Network) - A SAN presents storage devices to a host such that the storage appears to be locally attached. This
simplified presentation of storage to a host is accomplished through the use of different types of virtualization.
• Flash- High Speed Storage: Using only flash memory, these solid-state storage systems offer swift data transfer between SSD and a
smaller physical size than a disk array. The upfront cost tends to be higher, but there's great potential to pay a lower cost over time.
• Public Cloud Storage: Public cloud storage is an easy way for businesses and end users to license storage capacity from a third party
to store their digital data. This article categorizes public cloud storage into two classes: file storage for sharing and collaboration, and
storage for business applications. Main public cloud vendors are Microsoft Azure and AWS.
• Private Cloud Storage: In private cloud storage, companies or businesses can have their own dedicated cloud storage. Within that
specified and customized cloud domain, no other subscriber can pool in their data. They offer in-house dedicated resources, self-
service, customized control, and scalability.
Common
Storage Vendors
•
•
•
•
•
•
•
Storage Campaigns: Key
Qualifying Questions
1. What is your current storage array/s that are you using? I.e. SAN, NAS, DAS ,
Flash ETC.
2. How are they used and managed?
3. What is the process to add capacity? Can they meet your growth and
performance needs?
4. Do you have plans to refresh your storage soon?
5. Do high I/O workloads stress your current storage environment?
6. Are you able to monitor, report and analyze your storage environment?
7. Are you evaluating new software-defined solutions for new application
deployments?
8. Are you looking to virtualize your storage or desktop environment?
9. Do you have applications & workloads or plan to have workloads running in
hybrid cloud environment?
4. Backup
Backup refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Secondarily, a
backup may refer to making copies for historical purposes, such as for longitudinal studies, statistics or for historical rec ords or to meet the requirements of a
data retention policy. Many applications, especially in a Windows environment, produce backup files using the .BAK file extension. There are 3 main types of
back up types which are listed below. Most organisations will replicate their backup and have physical copies of their backup in case of collateral damage e.g.
a fire takes down all of the servers/storage.
•
•
•
•
•
•
•
Backup Campaigns: Key
Qualifying Questions