Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used




Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used


This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties


Here are some suggested Connections for you! - Log in to start networking.

How To Protect Your Personal and Business Data Online - Carol Evenson - Blog

How To Protect Your Personal and Business Data Online

The digital age has come with its fair share of advantages, and then some. Modern life is a far cry from what it was merely a couple of decades ago, and those changes are by and large mostly positive. However, the benefits of high technology come at a small cost. Hackers will stop at nothing to use technology against the average user or businesses to get their hands on illicit data that they can use to commit identity fraud. Likewise, trade secrets and other market data makes businesses and medical facilities targets for bad actors. Here’s what you need to know about cybersecurity in the modern era.

Login Security

One of the most essential ways to protect your information from hackers is to prioritize the best practices and tools that can secure the login process for various devices and accounts. Passwords have been a particularly troubling aspect of cybersecurity in years past, because hackers can easily crack a password in seconds using highly advanced software that “brute forces” a password by trying millions of character combinations per second. Businesses have attempted to tackle this problem using the Zero Trust model. This model of network security seeks to give network operators a greater capacity to respond to unauthorized access during a cyber attack by throwing more obstacles in the way of hackers. Simply put, a password would need to be entered not just once, but a separate time for each separate task involved in a given operation. Another important method of combating the password problem that’s catching on for consumers is multi-factor authentication. MFA can either strengthen or replace a password, because it represents an alternative to the password. Typically, MFA services send a one time use, randomly generated code to the authorized user of a given account for each unique login attempt. Because these codes are random and set to expire quickly, the success rate for MFA is fairly high.

Cybersecurity Software

The other major area of cybersecurity is that of software that can help you handle cyberattacks when and if they occur. Because cyberattacks come in a variety of shapes and sizes, cybersecurity software also entails a wide array of different tools to combat different threats. At the most basic level are firewalls and antimalware software. Firewalls simply act as a barrier to accessing certain content or downloads that don’t have verified, safe sources attached to them. Antimalware serves the purpose of protecting you from such files in the event that they somehow get through your firewall and onto your system. While malware is often easy to avoid, it remains a common tactic among hackers because of their “set it and forget it” nature. Simply put, malware is lurking on many unsecure websites waiting for unsuspecting users to stumble upon them. Businesses find themselves beset on all sides by hackers looking to take advantage of the wealth of data an average company has at its disposal, and that means that the cybersecurity needs of a business far exceed those of consumers. For example, network security goes far beyond the login process. Intrusion prevention and detection are necessary pieces of software that can disrupt a cyberattack in progress, for example. Likewise, DDoS attacks can be incredibly damaging to a business, and they are notoriously difficult to stop. Therefore, DDoS prevention software is the only reliable way to combat this threat. Network traffic monitoring is important for anticipating attacks before they happen, and this requires not only monitoring software, but also the keen eye of a trained professional. E-commerce introduces some new cybersecurity problems, as well. A company’s website will need to be fortified with encryption and decryption protocols that can obscure any data that happens to fall into the wrong hands. 

Sponsor message - content continues below this message

2022 '17th annual' Global Contact Center World Awards NOW OPEN

Enter your Center, Strategy, Technology Innovation, Teams and Individuals into the ONLY TRULY GLOBAL awards program - regarded by many as being like the Olympics for the Contact Center World! Join the best from over 80 nations and compete for the most prestigious awards out there!


Content continues ….


Meanwhile, the APIs used to develop e-commerce apps on the cheap and in a timely fashion may carry with them security weaknesses that transfer to the final product. This gives hackers the means to find a backdoor into your system if you don’t invest in API security.

Publish Date: August 29, 2021 5:21 PM

About us - in 60 seconds!

Submit Event

Upcoming Events

The most important day of the year for the CC & CX industry in the world!

We are proud to announce the winners of The 2022 '17th Annual' Global Top Ranking Performers Awards, The World's Most Prestigious Awards in the industry! Read More...

Newsletter Registration

Please check to agree to be placed on the eNewsletter mailing list.

Latest Americas Newsletter
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
session cookie set = True
session page-view-total = 1
session page-view-total = 1
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =