Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

ContactCenterWorld.com

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used

Twitter

Facebook

LinkedIn

Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used

LinkedIn

This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties

OK
BECOME
A MEMBER
TODAY TO:
CLICK HERE
TELL A
FRIEND
[HIDE]

Here are some suggested Connections for you! - Log in to start networking.

The most common oversights in communications tech - TEO Technologies - ContactCenterWorld.com Blog

The most common oversights in communications tech

A great unified communications system hinges on its ability to seamlessly connect disparate employees in far-flung offices so they can collaborate and work together better. Unfortunately, convenience in the digital world often comes at the expense of security. No matter what line of work you do, ensuring privacy and safety in your communications runs directly against your simultaneous desire to conveniently connect with colleagues.

As you build out your UC environment, take note of some of these common blind spots where gaps can develop in your security practices and risk mitigation procedures:

Passwords and management

The most common causes of the biggest hacks or data breaches in any industry tend to cluster in a handful of soft targets: passwords, email and communications devices. Locking these down as much as possible will reduce the bulk of the risk faced by almost any business related to cybercrime, or simple carelessness.


Sponsor message - content continues below this message

2022 '17th annual' Global Contact Center World Awards NOW OPEN

Enter your Center, Strategy, Technology Innovation, Teams and Individuals into the ONLY TRULY GLOBAL awards program - regarded by many as being like the Olympics for the Contact Center World! Join the best from over 80 nations and compete for the most prestigious awards out there!

FIND OUT MORE HERE


Content continues ….

The easiest way for a criminal or unscrupulous client to do damage to any organization is to exploit password vulnerabilities. All it could take is just a single lucky guess or a dedicated hacker running a brute force attack to unlock an entire network of systems and confidential documents stored by one business. The prevalence of data breaches at large corporations recently only emphasizes the imperative of using strong passwords and managing them throughout an organization.

  • Follow best practices for password length and content. Generally, that means making them at least eight characters and a mixture of numbers and symbols.
  • The best passwords are incoherent as words or numbers that could be guessed. They also are completely unique from any password used before within the company.
  • Unfortunately, these guidelines make it difficult to remember passwords, let alone manage them for an entire company. Invest in an enterprise password management service to make it easier to generate, change and manage passwords across all devices and software.

Email

Within any one business, there could be thousands of emails being sent and received each day. Without following the best security practices and adopting the right tools, every one of these messages poses a potential risk of fraud, digital theft and more.

The first step to making email safer for everyone in your organization is to set strict standards for its use. These need to be adapted to the unique and evolving needs of employees to answer some important questions, including:

  • How should personal and business email account use be combined, if at all?
  • What is the correct way to safely open an email attachment?
  • Are employees aware of how to spot phishing emails or suspicious messages forwarded from a coworker?
  • Should there be limits or restrictions on sending and receiving emails from people outside of the organization?
  • Are there procedures in place to close accounts and change passwords after employees have left the business?

To go the extra mile in pursuit of email security, according to Marconet, businesses should utilize encryption like the SSL standard to protect their email servers from prying eyes. In addition to SSL encryption, look into enterprise spam filtering services to prevent malicious emails from ever reaching your inbox in the first place.

Unified communications networks need to be vigilant when it comes to security risks.

Devices in the field

Applying best-practice security standards to every device, for every employee and across all networks is no doubt an exhaustive, labor-intensive approach to reduce the risk of loss related to cybersecurity incidents. The importance and sensitivity of this task is constantly being highlighted, however, as in this recent report from Trend Micro on newly unearthed vulnerabilities in certain UC networks.

In particular, Trend Micro found that pagers, still in wide use throughout health care, law enforcement and other fields where workers need to be on-call, continue to display serious security flaws without intervention from security experts. 

Modern-day pagers are usually connected to an SMS or email network - a supervisor or automated system can send a page from anywhere and ensure it is delivered to its recipient almost instantly. But even when these messages are sent over secure channels, the opportunity to take advantage of them for malicious purposes still exists:

  • Someone could intercept page data to gather passwords, access codes or even textual information that could aid in the development of an attack.
  • Or, someone could pose as a legitimate authority and send a fraudulent page directing that worker to unknowingly commit a dangerous or harmful action.

These findings are relevant even in UC networks that don't use pagers, since they involve tactics known as "social engineering" that rely on the inherent difficulty of verifying someone's identity remotely. The prevalence of social engineering as a means to commit digital fraud only underscores the need for robust security in not only UC environments, but throughout all business systems.

Contact Teo Technologies to learn more about building a safer communications network for your business.

Source: https://www.teotech.com/research/news/the-most-common-oversights-in-communications-tech/

Publish Date: November 28, 2017 5:00 AM


2021 Buyers Guide Visual Communications

 
1.) 
SJS Solutions

Optymyse
Optymyse is a unique neuroscience-based approach which takes care of your most valuable asset - your people. Using a scientifically supported formula, Optymyse delivers stunning visuals which unlock the full potential of your contact centre whilst protecting the mental wellbeing of all of your employees.

2.) 
TeamViewer

Co-Browsing Integration
Co-Browsing is the practice of web-browsing where two or more people are navigating through a website on the internet. Software designed to allow Co-Browsing focuses on providing a smooth experience as two or more users use their devices to browse your website. In other words, your customer can permit the agent to have partial access to his/ her screen in real-time.
 



View more from TEO Technologies

Recent Blog Posts:
What to know about touchpoints: Improve the customer experienceMarch 15, 2018 5:00 AM
IP phones are key ingredients in VoIP telephony successMarch 9, 2018 5:00 AM
Call recording: An essential feature in VoIP call centersMarch 5, 2018 5:00 AM
Is it time to upgrade your UC?: Tips, considerations and best practicesFebruary 6, 2018 5:00 AM
4 ways unified communications solutions improve your cybersecurity postureJanuary 31, 2018 5:00 AM
Are chatbots necessary in UC contact centers?January 30, 2018 5:00 AM
3 features to focus on when evaluating unified communications solutionsJanuary 30, 2018 5:00 AM
Contact center modernization: The time is now January 19, 2018 5:00 AM
What to know about using instant messaging in an enterprise settingDecember 13, 2017 5:00 AM
Security Awareness: Top Threats to UC TechnologyNovember 30, 2017 5:00 AM

About us - in 60 seconds!

Submit Event

Upcoming Events

Everything You Want To Know About The Most Prestigious Awards In The Industry! Read More...
 768 

Latest Americas Newsletter
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
CMS =
session cookie set = True
session page-view-total =
session page-view-total =
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =