Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

ContactCenterWorld.com

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used

Twitter

Facebook

LinkedIn

Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used

LinkedIn

This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties

OK
BECOME
A MEMBER
TODAY TO:
CLICK HERE
[HIDE]

Here are some suggested Connections for you! - Log in to start networking.

MEMBER
Grace Natalia
Workforce Management
224
EXECUTIVE MEMBER
John Orton
Founder & CEO
45
MEMBER
Danny Singer
Founder& Chief Product Officer
354

Article : How to Create a Secure, Compliant Work-at-Home Environment

#contactcenterworld, @teamhgs

It’s no longer the news of that day that many organizations were pushed into work-at-home scenarios, some almost overnight, due to the coronavirus pandemic. But we’re not past the pandemic by any measure, which means many businesses continue to operate largely out of their employees’ individual homes — and with productivity levels still generally high, some may maintain a fully or partially remote workforce even when the crisis is past.

Yet balancing productivity and employee safety with security and compliance remains essential. Organizations can ensure a compliant virtual environment with a two-pronged approach that comprises both a technical solution and a people-process solution.

The Technical Side

Security controls are critical for compliance as well as to mitigate risks of fraud or breaches. This requires securing all endpoints — ideally through Virtual Desktop Infrastructure (VDI), which allows an organization to host desktop environments on a centralized server and securely deploy the virtual desktops to employees.

The technology a VDI partner provides must create a data-secure environment while being adaptable and scalable. Recommendations include:

  • Enabling data encryption and two-factor authentication (2FA);
  • Hardening browser settings;
  • Storing all data in the cloud rather than locally;
  • Restricting hours-of-operation accessibility; and
  • Disabling Wi-Fi and requiring hardwired internet access instead.

The People-Process Aspect

The other side of ensuring data security and compliance comes down to the bigger variable: the people. In a brick-and-mortar environment, contact centers are more easily able to mitigate the human risk factors that jeopardize data security. This is more difficult when everyone is in their home environments, but it’s not impossible.

To set the stage for a work-at-home employee’s success, follow a formalized process from the beginning, and reinforce best practices throughout all stages of the employee lifecycle.

During the recruiting and hiring stages, require that candidates supply photos or video of the proposed work area, either before or during the online interview process. This assessment will provide a company with a first view of an employee’s "clean-desk policy" compliance. Managers will be able to spot and immediately correct unsuitable factors such as screen reflections in mirrors or windows, extra devices such as personal phones or tablets, and people or pets in the background.

Following their hire, the employee should sign a compliance audit form agreeing that the requirements are understood, and that any required adjustments will be made upon request. Once the employee is officially performing the job, train and engage your operational teams to conduct 360-degree-view audits via webcam at prescribed intervals; ensure that the same forms are used; and track results for follow-up and compliance with governance requirements.

Work From Home the Right Way

Security and compliance are critical for any organization maintaining a work-from-home program, and having either technology or people policies is not enough; you need both.

Create a formalized approach by providing employees with the right technology and equipment; clearly defining your policies and ensuring employees understand them; and frequently auditing employees for compliance — and your organization will create a virtual environment as secure as that of any brick-and-mortar facility.

#contactcenterworld, @teamhgs


About Hinduja Global Solutions Ltd.:
Company LogoHGS is a global provider in consumer engagement, digital CX, and business process management (BPM).
  Company Blog   Company RSS Feed   Company Facebook   Company Twitter   Company Instagram   Company YouTube   Company LinkedIn   Company Profile Page

Today's Tip of the Day - Queue Settings

Read today's tip or listen to it on podcast.

Published: Monday, August 10, 2020

Printer Friendly Version Printer friendly version

2023 Buyers Guide Call Routing Optimization

 
1.) 
Eastwind Communications

Eastwind sells Oracle, Ribbon, and Dialogic SBC and routing solutions for both premise-based and cloud-based deployments along with Microsoft Teams integration. Eastwind offers managed service offerings and complete 7x24 support.

2.) 
Lieber & Associates

Call Routing and Contact Center Optimization
L&A provides consulting services to optimize contact centers, including call routing, skills-based routing, and multi-location routing. The firm's senior consultants have several decades of experience each in this area and work with all vendors' systems. L&A's president pioneered skills-based routing.

3.) 
OpsTel Services

SPEED
The SPEED solution solves for service level issues while cost optimizing the environment with automation.

Provides an enhanced way to speed up & optimize invoking temporary agent skills configuration changes into the contact center environment.

Speed allows you to schedule both future changes & temporary changes that auto-revert back to the original state when scheduled time expires.

Speed features:

*Automated / Scheduled Temporary Agent Skills Configuration Management
*Immediate Temporary or Reoccurring Schedule Skills Configuration Changes
*Easy to Use/Operations Administration Focused
*Descriptive Monitoring Activity Dashboard
*Detailed “End to End’ Audit Trail and Performance Monitoring
 

About us - in 60 seconds!

Join Our Team

Newsletter Registration

Please check to agree to be placed on the eNewsletter mailing list.

Latest Americas Newsletter
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
CMS =
session cookie set = True
session page-view-total = 1
session page-view-total = 1
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =