
Voitec appointed to distribute Heedify Teams console in ANZ
Voitec has been appointed as the official distributor for Heedify's attendant console solution for Microsoft Teams in Australia and New Zealand.
Heedify offers an attendant console designed specifically for Microsoft Teams, allowing organisations to manage their frontline communications entirely within the Teams environment. The solution is intended to help receptionists, call handlers, and customer service staff operate more efficiently and deliver improved customer satisfaction.
Unlike some attendant consoles that require third-party plugins or additional infrastructure, Heedify is installed natively and can be set up in less than sixty minutes. This approach aims to simplify both deployment and ongoing management for IT teams in a variety of organisations, from single-site enterprises to distributed, multi-location companies.
Product features
Heedify's core features include full integration with Microsoft Teams, meaning organisations can adopt the solution without having to configure external components or adapt existing workflows. Users benefit from intelligent call queueing, skill-based routing, and advanced IVR (Interactive Voice Response) navigation, which are designed to connect callers with the appropriate representative as quickly as possible.
For customer-facing employees, Heedify also integrates with customer relationship management (CRM) systems, presenting relevant information during interactions and supporting more personalised service. Administrative controls are simplified, featuring delegated access along with real-time tracking of queue activity. Information such as wait times, call volumes, and call outcomes is accessible through standard reporting and can also be integrated into Power BI dashboards for more detailed analytics.
Partnership rationale
Mefteh Werghemmi, Co-founder of Heedify, described the solution's benefits for organisations seeking to improve frontline communication. "Heedify enables organisations to elevate their first impressions. It was built from the ground up for Microsoft Teams to streamline call flow, reduce wait times, and improve service levels. Customers such as NHS Royal Marsden and Endrix in Europe are already seeing measurable results. We're excited to partner with Voitec to bring these benefits to the ANZ market."
For Heedify, working with Voitec is seen as an opportunity to reach a broader audience in the Australia and New Zealand region, supported by a distributor with longstanding relationships in the enterprise and government sectors.
Mark Owens, Managing Director at Voitec, commented on the suitability of Heedify for current market needs. "Heedify brings a level of simplicity and integration that fits naturally into how many organisations already use Microsoft Teams. At Voitec, we've spent over a decade working closely with IT teams to understand their environments and help them overcome the real-world challenges of managing voice communications. Heedify offers a compelling solution that enhances the way frontline staff handle calls and interactions - without the complexity of disconnected systems or time-consuming deployments."
Regional availability
With the appointment, Heedify is now available across Australia and New Zealand through Voitec's distribution channels. The product is designed to address the requirements of both small-scale reception areas and larger, geographically dispersed call handling teams. The aim is to provide a functional and scalable solution for organisations seeking to align their communications infrastructure more closely with Microsoft Teams.
Voitec's role will include supporting implementation, training, and ongoing customer service, drawing on its local presence and technical expertise. The company has a history of assisting businesses and public sector bodies in upgrading their communication systems and supporting integrations with Microsoft products and platforms.
Voitec states that the partnership is intended to allow organisations in the region to adopt Heedify with confidence, with a focus on minimising deployment time and optimising call management processes for better overall customer interaction.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
a day ago
- Techday NZ
Hornetsecurity launches AI cyber assistant for Microsoft 365
Hornetsecurity has launched a new AI Cyber Assistant to support its 365 Total Protection Plan 4, featuring tools designed to aid IT security teams and protect Microsoft Teams users from cyber threats. The new solution includes the Email Security Analyst, which automates the handling of reported suspicious emails, and Teams Protection, which is intended to detect and block malicious messages and impersonation attacks within the Microsoft Teams platform. Hornetsecurity has also confirmed updates to its AI Recipient Validation, aimed at preventing email misdirection and data leaks, now integrated into the 365 Total Protection Plan 4 suite. The AI Cyber Assistant is designed to ease workloads for security personnel while equipping end users with information to make informed decisions about potential threats. According to Hornetsecurity, the assistant continually evolves by deploying machine learning technology to support both end users and IT teams within their daily operations. Daniel Hofmann, Chief Executive Officer of Hornetsecurity, said: "To continue enhancing the next-gen security we provide, our new AI-powered Email Security Analyst automates responses to user queries about potential threats, alleviating the workload on SOC and service desk teams, while educating end users on the nature of attacks. IT security personnel benefit by gaining more time to focus on other pressing issues, while end users receive instant feedback, which also encourages them to continue reporting suspicious emails and contribute to the organisation's overall security." Email response automation The Email Security Analyst leverages a large language model to provide automated analysis and response to user-reported emails, reducing the manual review burden on Security Operations Centre (SOC) and IT Admin teams. This automation is intended to improve efficiency in handling suspicious emails flagged by users. As Hofmann explained: "Thanks to growing media attention, end users are becoming more suspicious about incoming emails. While this a welcome and positive development, each email they flag increases the burden on SOC and Service Desk teams to analyse and verify them on a case-by-case basis. Email Security Analyst replaces this traditional manual analysis and significantly reduces the time SOC teams spend on false-positive and negative reports." Providing AI-driven insights for each reported email, the tool assists in training employees to better discern malicious activity, while guiding them on necessary precautions to help strengthen organisational cybersecurity. Hofmann stated further: "Organisations have to strengthen their 'human firewall' by empowering employees to become active participants in their organisation's cybersecurity strategy. Cyber-attacks are constantly increasing, so CISOs and security teams need to strategically allocate resources that strengthen organisational security while upskilling end users to cover any blind spots." Microsoft Teams threat detection The Teams Protection feature aims to provide continuous monitoring and analysis of messages within Microsoft Teams, identifying and alerting users to potential threats using AI-driven detection methods. The technology analyses URLs and pictures within messages, employing supervised and unsupervised machine learning algorithms as well as computer vision models. These models scan for indicators of phishing such as brand logos, QR codes, and suspect text embedded in images. Administrators can remove conversations found to contain malicious messages and block compromised users from accessing Teams, helping to manage threats across Microsoft 365 tenants. Hofmann said: "Instant messaging platforms like Microsoft Teams are increasingly used as a main channel of business communications, and yet they tend to be overlooked as a potential attack vector. However, attackers are sending malicious links and malware both through Teams that are open externally and also via compromised internal Teams accounts. We have therefore developed Teams Protection to address this growing cybersecurity threat." User experience updates The release also brings a redesigned, multitenant control panel for 365 Total Protection, offering a streamlined interface intended to facilitate easier access to security, backup, and compliance features for Microsoft 365 users. The aim is to make administration more efficient while bringing multiple security functions together in a single platform. Hornetsecurity reports that it delivers its products and services through a global partner network, with organisations using the platform for a range of needs including email protection, backup, governance, risk and compliance, and security awareness training.


Techday NZ
13-06-2025
- Techday NZ
Voitec appointed to distribute Heedify Teams console in ANZ
Voitec has been appointed as the official distributor for Heedify's attendant console solution for Microsoft Teams in Australia and New Zealand. Heedify offers an attendant console designed specifically for Microsoft Teams, allowing organisations to manage their frontline communications entirely within the Teams environment. The solution is intended to help receptionists, call handlers, and customer service staff operate more efficiently and deliver improved customer satisfaction. Unlike some attendant consoles that require third-party plugins or additional infrastructure, Heedify is installed natively and can be set up in less than sixty minutes. This approach aims to simplify both deployment and ongoing management for IT teams in a variety of organisations, from single-site enterprises to distributed, multi-location companies. Product features Heedify's core features include full integration with Microsoft Teams, meaning organisations can adopt the solution without having to configure external components or adapt existing workflows. Users benefit from intelligent call queueing, skill-based routing, and advanced IVR (Interactive Voice Response) navigation, which are designed to connect callers with the appropriate representative as quickly as possible. For customer-facing employees, Heedify also integrates with customer relationship management (CRM) systems, presenting relevant information during interactions and supporting more personalised service. Administrative controls are simplified, featuring delegated access along with real-time tracking of queue activity. Information such as wait times, call volumes, and call outcomes is accessible through standard reporting and can also be integrated into Power BI dashboards for more detailed analytics. Partnership rationale Mefteh Werghemmi, Co-founder of Heedify, described the solution's benefits for organisations seeking to improve frontline communication. "Heedify enables organisations to elevate their first impressions. It was built from the ground up for Microsoft Teams to streamline call flow, reduce wait times, and improve service levels. Customers such as NHS Royal Marsden and Endrix in Europe are already seeing measurable results. We're excited to partner with Voitec to bring these benefits to the ANZ market." For Heedify, working with Voitec is seen as an opportunity to reach a broader audience in the Australia and New Zealand region, supported by a distributor with longstanding relationships in the enterprise and government sectors. Mark Owens, Managing Director at Voitec, commented on the suitability of Heedify for current market needs. "Heedify brings a level of simplicity and integration that fits naturally into how many organisations already use Microsoft Teams. At Voitec, we've spent over a decade working closely with IT teams to understand their environments and help them overcome the real-world challenges of managing voice communications. Heedify offers a compelling solution that enhances the way frontline staff handle calls and interactions - without the complexity of disconnected systems or time-consuming deployments." Regional availability With the appointment, Heedify is now available across Australia and New Zealand through Voitec's distribution channels. The product is designed to address the requirements of both small-scale reception areas and larger, geographically dispersed call handling teams. The aim is to provide a functional and scalable solution for organisations seeking to align their communications infrastructure more closely with Microsoft Teams. Voitec's role will include supporting implementation, training, and ongoing customer service, drawing on its local presence and technical expertise. The company has a history of assisting businesses and public sector bodies in upgrading their communication systems and supporting integrations with Microsoft products and platforms. Voitec states that the partnership is intended to allow organisations in the region to adopt Heedify with confidence, with a focus on minimising deployment time and optimising call management processes for better overall customer interaction.


Techday NZ
12-06-2025
- Techday NZ
ReliaQuest details Black Basta's legacy & rise of Teams phishing
ReliaQuest has released an in-depth report on the state of Black Basta, a former ransomware-as-a-service (RaaS) group, following the leak of the group's internal chat logs and its subsequent dissolution in February 2025. The demise of Black Basta, a Russian-speaking criminal group previously active in naming up to 50 victims each month on its data-leak site, was triggered by a member known as ExploitWhispers. This individual leaked private chat logs on Telegram out of frustration with the group's decision to target Russian financial organisations, revealing the internal dynamics and operational methods of one of the most prolific RaaS groups to date. Ongoing impact Despite the cessation of activity under the Black Basta name, ReliaQuest's analysis shows that many of the group's phishing and intrusion tactics continue to be used. Former affiliates are operating with a consistent set of methods, relying heavily on large-scale email spam and Microsoft Teams phishing, and adapting to include techniques such as Python script execution to deliver payloads. "Despite the group's dissolution, former members continue to use its tried-and-tested tactics, with mass email spam followed by Teams phishing remaining a persistent and effective attack method. 'New' ransomware groups like '3AM' are taking pages from Black Basta's playbook, particularly its signature phishing tact," ReliaQuest notes in its assessment. The organisation reported that Teams phishing attacks have maintained a steady pace since February 2025, with a marked increase in April when these incidents accounted for more than 35% of Black Basta-style activity targeting ReliaQuest's own customers. Half of these observed attacks originated from onmicrosoft[.]com domains, exploiting the ease of account creation and rotation on Microsoft's platform. The report suggests this trend is expected to continue. The use of onmicrosoft[.]com domains remains the primary method for launching phishing campaigns via Teams, but the report highlights that efforts to compromise microsoft[.]com accounts, which give campaigns more credibility, are also growing. While such attacks are harder to carry out, their sophistication and risk could increase in the coming months. Evolving methodology "Recently, attackers have introduced Python script execution alongside these techniques, using cURL requests to fetch and deploy malicious payloads." ReliaQuest documented a May 2025 case involving a manufacturing sector client, where attackers used a Teams phishing campaign from an onmicrosoft[.]com-based account to gain remote access via Quick Assist and AnyDesk. Python scripts were then deployed to download and execute a markdown file, enabling command and control (C2) communications. The attack was detected and contained before it could escalate. Shifts among ransomware groups The closure of Black Basta's data-leak site, paired with the continuation of its trademark tactics, suggests that its former members may have joined other RaaS collectives or formed new ones. Leaked chat logs indicate a substantial payment—between USD $500,000 and USD $600,000—by Black Basta's leader to the Cactus RaaS group, suggesting a relationship between the two. There was also a notable increase in named victim organisations on Cactus's data-leak site that coincided with Black Basta's closure. Another scenario under consideration is that affiliates have transitioned to "Blacklock", a RaaS group previously known as Eldorado, which has named more than 50 organisations on its site. Eldorado's Russian-speaking origins and rebranding have led to speculation about links to Black Basta's membership. Internal organisation and adaptation ReliaQuest's analysis of the leaked chat logs provides insight into Black Basta's operational structure, which included defined roles such as intrusion specialists, campaign managers, and ransomware developers. The group also collaborated with external malware developers and used purchased access to tools like QakBot and DarkGate for campaigns, maintaining communication chains for technical support and updates. ReliaQuest highlights the group's flexibility in tactics, warning that an overemphasis on defending against a single vector—such as brute-force attacks—could leave organisations exposed to more sophisticated phishing methods. The report urges a comprehensive, multi-layered defense posture. Mitigating the threat ReliaQuest emphasises the importance of user education to counter the social engineering techniques favoured by ransomware affiliates. "To counter these threats, organisations should prioritise user education on phishing tactics. Informed and vigilant employees are often the first and most effective line of defence, stopping social engineering attacks before they succeed." Recent case studies in sectors including finance, insurance, and construction indicated that previous staff training helped potential victims avoid compromise during coordinated phishing campaigns. Security teams received real-time alerts and took prompt action, benefiting from employee awareness programmes. Additional recommendations for defence include restricting the use of personal Google accounts on company devices, implementing detection rules for unusual Python activity, monitoring for unauthorised remote-access tools, and deploying automated response playbooks for threat containment. ReliaQuest's threat research team continues to monitor shifting TTPs (tactics, techniques, and procedures) among ransomware groups, rapidly integrating new indicators of compromise into its security platform and supporting customers with intelligence-driven threat hunting and response measures. The report concludes that the tactics established by Black Basta are likely to remain prominent among ransomware operators, underscoring the need for ongoing vigilance, robust technical controls, and investment in cyber awareness among staff.