Need help?
Do you feel unsure or have any questions? Contact me or any of my colleagues and we'll help you.
Categories
Customer feedback on our services
We value satisfied customers and positive feedback highly, as it is an important indicator of how well we meet our customers’ needs and desires. When we receive positive feedback from our customers, we feel proud of the work we have done and inspired to continue delivering high quality on our products and services.
It is always rewarding for us to receive positive feedback directly from our customers! We would like to share an example of one of our customer’s responses to a potential new customer.
What services do you use?
I personally use the Batch tool where businesses send a list of phone numbers and information about what should be in the SMS message to me, which I then set up as a job in the customer portal at SMS Teknik.
Otherwise, we use their API “SMS gateway” where we have built our own hub where all our business systems connect to then go towards SMS Teknik’s API, so we only have one connection/link to them. And we use Short Number Services where our users can subscribe to receive information.
Have you needed support, and if so, how do you experience their support?
Yes, we have had some contact, mostly to ask about settings and information they have sent out regarding changes.
Very friendly staff, quick to respond, solve everything very quickly, if there is a misunderstanding in email communication they will fix it immediately. There is no “we have received your case and will return next week”. Now that I’m checking, I’ve never received a case number, they solve everything immediately, you get a personal contact right away. Once, I had to wait until the next day to get an answer to a question, but it was not urgent and had nothing to do with the operation or any problems.
How have you assessed that SMS Teknik meets your security requirements? (And if possible – what security requirements were particularly important to you?)
Here are some requirements we had in searching for an SMS service, we believe that SMS Teknik has good security requirements from the ground up. They inform well via email about the security measures they offer.
The seller shall continuously and in consultation with the buyer work to ensure that the delivery in all situations complies with the applicable laws, regulations, rules and regulations imposed on the buyer’s business. The seller shall have documented procedures for monitoring, detection, analysis, reporting, escalation and handling of security incidents and security incidents. The seller shall have rules and procedures for storage (also applies to portable media), processing, copying and communication of information related to the delivered service. The buyer shall, in consultation with the seller, have the right to conduct security reviews of the individual parts of the delivery.
Is there anything you think it would be good for us to know?
We have had them for several years and do not want to switch, they are good at informing well in advance about changes and improvements. Will send some info emails from them to you.
We send around 5-600,000 SMS per year and there have been no problems, we have not experienced any downtime or operational problems.
We want to thank our customer for their kind words and for choosing to share their experience with others. It means a lot to us and we will continue to work hard to continue delivering high quality on our services
From all of us to all of you, a holiday greeting filled with gratitude
As we approach the end of the year, we would like to take this opportunity to reflect on what has passed and extend a warm holiday greeting to you all. The year 2024 has been one of both significant challenges and remarkable achievements.
Full storyExecutive summary – Data Breach
On August 19, 2024, an incident occurred where data from SMS Teknik was inadvertently exposed on the internet during a routine exercise to restore a copy of the production database. The exposure lasted for 19 minutes and resulted in the copy being deleted, with a ransom note left by the attackers who gained access to the system
Full story