Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

ContactCenterWorld.com

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used

Twitter

Facebook

LinkedIn

Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used

LinkedIn

This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties

OK
[HIDE]

Here are some suggested Connections for you! - Log in to start networking.

EXECUTIVE MEMBER
Ikhwal Sidiq
Assistant Manager Trade and Remittance Services
408
MEMBER
R. Aju Eko Suprati
Ketua Subkelompok Program dan Anggaran
0
MEMBER
Firas Kurdi
Customer Service Director
0
MEMBER
Vijay s
Director
55

Article : Securing Network Access for Call Center Staff

#contactcenterworld, @IS_Decisions

The importance of getting access management right cannot be overstated. You need to make sure that anybody accessing your systems – and the data within - is exactly who they say they are.

This is especially important when dealing with agents and customer service representatives who have access to vast amounts of sensitive data. This trusted access to cardholder data, personal details or medical records helps ensure the best customer experience but it also makes the call center a prime target for a security breach.

Many organizations fall down in the same areas where access management is concerned. So to help you, here are details on four of the most common mistakes when it comes to managing access across your networks:

  1. Time and disruption for IT

At first, we wouldn’t think this is a big mistake but following some research, we found that one of the biggest barriers to adopting a technology is the amount of time it takes IT to actually manage the software. Of the 250 American companies we surveyed, 18% of them believe that ‘time to manage and oversee’ is the biggest barrier to adoption.

The thing is, if you spend too much time managing the software, it has some serious repercussions on productivity. This impact on productivity means that the total cost of ownership for the tool is often much higher than you would initially think. The best advice would be to try the product first, if you can, to make sure that it’s the right choice for you.

Security solutions with ‘stickiness’ tend to be simple to implement and intuitive to manage.

 

  1. Adoption by your users

If security overwhelms and stifles productivity, users can’t do their job and the solution is already dead on arrival. Organizations are, however, aware of the problem — 47% believe that complex IT security measures in place within their organization negatively impacts employee productivity.

Security should be behind the scenes, protecting the users and the environment until the moment the user is truly conflicting with security protocol.

 

  1. Monitoring every last bit of the network

As said before, you need to make sure that anybody accessing your system is exactly who they say they are. Spending all your (limited) time trying to monitor every last bit of the network, looking for anything that looks out of place is a failing proposition.

It's a pretty costly mode of operation; it requires significant IT time and resources to put proper detection mechanisms in place, will likely raise an initial set of false positives that need to be fine-tuned, and necessitates reports and meetings to ensure the detection is actually working.

You are far better off running and monitoring solutions that offer automated controls in addition to threat identification and real time response.

In short, should something fall outside a set of established restrictions, your solution should automatically take action before the damage is done – not only when IT intervenes.

 

  1. Blaming rather than empowering employees

While users are often the weakest link in any network security, they can also be the solution if you empower them in the right way. Call center agents are (usually) human. They are careless, flawed and often exploited. In fact, attackers love exploiting the naivety of your employees because it’s so easy.

All it takes is one successful phishing email to persuade just one user to hand over their organizations login details. And also keep in mind that almost every external attack eventually looks like an insider threat. The use of compromised internal credentials by an external attacker is the most common threat action in data breaches (Verizon, Data Breach Investigations Report 2018).

Education is key. Once you’ve put an education program in place, you need to then ensure that your access management software can warn users themselves of unusual connection events involving their credentials.

Who better than the user to judge whether the activity is suspicious or not.

 

Sensitive Data is at Risk

Many call center and BPOs in today’s cybersecurity world are facing these four issues. To solve this problem, we suggest to look for access management solutions that include context-aware security.

In a nutshell, when someone attempts to connect, this approach uses and benefits from supplemental information to make a decision on whether this access is genuine or not. After that, the system can automatically grant or deny access using admin-set rules that are based on this supplemental information.

Restricting access in this way monitors the right aspects of security, doesn’t take much time to manage, doesn’t force users to jump through hoops all the time, empowers those employees to make the right security choices and doesn’t force you to choose between security and convenience. It’s a win-win scenario for you and your call center agents.

#contactcenterworld, @IS_Decisions


About IS Decisions:
Company LogoIS Decisions makes it easy to manage and secure your Microsoft Windows and Active Directory Infrastructure.
Company RSS Feed   Company Twitter   Company LinkedIn   Company Profile Page

Today's Tip of the Day - Utilize Time & Money Saving Tools

Read today's tip or listen to it on podcast.

Published: Friday, December 21, 2018

Printer Friendly Version Printer friendly version

2024 Buyers Guide Telecoms

 
1.) 
Cloudonix

Cloudonix’s smart voice calls enable frictionless experiences that drive better customer care and faster sales by merging voice and data into a complete service context. Cloudonix add Cloud capabilities to your existing on premise Call Center enabling your agents to work from anywhere in the world. Security, Privacy and more – rapidly deployed and cost effective without replacing your existing systems or retraining your team.

2.) 
PRILINK

Demarc Network Traffic Monitor
A lightweight Network Traffic Monitor that privides real-time traffic alerts and tracks all IP and SIP endpoints at Demarc. It analyzes mirrored SIP Trunk and Internet traffic in real-time and compiles Network Traffic Analytics (NTA) for all endpoints giving daily network traffic telemetry, most active endpoint summary, endpoint search table and more.

3.) 
Scopserv Integrated Services

ScopTEL IP PBX
The ScopTel IP PBX solution is a distributed software application
that can be installed on both virtual and physical servers, thus
offering a multitude of architectural designs from premise-based
servers to a centralized data center (DC) hosted WAN
environment. The application is distributed as an ISO which
includes the customized Linux operating system

4.) 
Televergence

Long Distance and Toll Free Specialists for Contact Centers
Televergence is a facilities based US Nationwide High volume/High Capacity Inbound and Outbound VoIP Carrier for Contact Centers. We specialize in termination (outbound) and origination (toll free and local DID) for the contact center. We have a technical staff that is up to date on the majority of platforms in use today, including asterisk and Vicci dial, as well as many of the currently in use software platforms.
Contact Centers generally see cost reduction and containment when using Televergence as their contact center telecom carrier. Televergence is the only active US VoIP carrier certified by the Women's Business Enterprise National Council (WBENC), which enables our services to qualify for meeting corporations Supplier Diversity Needs.
 

About us - in 60 seconds!

Join Our Team

Industry Champion Award Leaderboard

Most active award (top 10) entrants in the past 48 hours! - Vote for Others / About Program
Submit Event

Upcoming Events

The 19th AMERICAS Annual Best Practices Conferences are here! Meeting Point for the World's Best Contact Center & CX Companies Read More...
 31743 
Showing 1 - 1 of 3 items

Newsletter Registration

Please check to agree to be placed on the eNewsletter mailing list.
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
CMS =
session cookie set = True
session page-view-total = 1
session page-view-total = 1
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =