Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used




Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used


This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties


Upcoming Events



How To Enter the 2020 Members' Choice Awards - For Vendors



Article : Is Your Contact Center the Gap in Your Firewall?

#contactcenterworld, @sitel_worldwide

In this article, Chris Knauer, SVP and Chief Security Officer at Sitel Group, explores the potential security gaps that may exist in contact centers and how companies can combat these risks.

Data breaches and cybercriminals are the No. 1 threat to businesses’ IT systems. The average cost of a data breach in 2018 was $3.86 million, and it typically took about 266 days to detect and contain just a small breach. These costs can be crippling to companies who have not built cybersecurity into their operations budgets, and the odds of falling victim to a security breach are too high to ignore – more than 30% of organizations have experienced cyber attacks on their operational technology infrastructure. Investing in the technology to defend IT systems and infrastructure is, therefore, a core component of any business with a digital presence – but many businesses, particularly those who outsource, are unaware of security gaps that may exist in contact centers.

Security Gaps in Contact Centers

Customers’ experience with contact centers is often the deciding factor between a positive or negative experience with a brand. As a result, many businesses rationally prioritize the customer experience (CX) as the core function of their contact centers, striving to make customers’ exchange with the brand as friendly, efficient and seamless as possible. But in an effort to close client tickets in a timely manner some contact centers unknowingly leave themselves exposed to potential data breaches.

Call security is another issue; 72% of agents who collected payment data or other personal information over the phone still require customers to read their information aloud, exposing this sensitive information to agents, quality assurance call recordings and nearby eavesdroppers. Even when agents experience a breach attempt, either by company insiders or outsiders, 42% do not report the situation. The combination of exposure and underreporting creates an ideal environment for cybercriminals with malicious intent.

Ring2 Dashboards & Wallboards Free Trial

Transitioning Agents from Security Liabilities to Assets

Technology alone is not enough to handle security threats to businesses – nearly 70% of organizations do not believe the threats they see can be blocked by antivirus software. The most important contact center cybersecurity measure a business can take involves providing adequate training for employees. Properly trained and informed employees are the first line of defense for businesses against information security breaches. Armed with the right information and training, employees can work in sync with digital defense security procedures, closing gaps in company firewalls.

Social engineering is one example of an area in which proper training can mean the difference between a data breach and a secure system. Social engineering is a common tactic criminals use to manipulate contact center agents to release confidential information. The typical goal is to extract passwords or bank information by preying on the trust between customers and brands.

For example, a contact-center agent might receive an email supposedly from a customer, including a link to a webpage with which the "customer" claims to be struggling. A well-trained agent will know how to spot suspicious messages, verify the sender and details and avoid clicking on a link which may invite malicious downloads that infect the entire system. Once infected, the malware can go on to wreak further havoc by using customer data to masquerade as the brand and automatically call or email all the brand’s real customers in order to "verify" financial information and extract data. This corrodes trust between brands and customers, especially when the contact center tasked with managing customer experiences is the culprit.

Training to Know When Something is ‘Phishy’

Another common tactic similar to phishing is vishing. The objective is to try to connect with the contact center agent on an emotional level, with the ultimate goal of taking the agent off-script. Typically, the call script agents use controls the quantity and type of information agents can release. Once derailed by a cybercriminal, the agent may no longer operate within security guidelines and breach exposure is increased. This occurs more often where campaigns focus heavily on net promoter scores in which the agent is rewarded for caller satisfaction. The solution here is also training; agents trained to recognize emotionally charged attempts to take the agent off-script can redirect the conversation to return to the script.

The probability and cost of a security breach, both in terms of dollars and goodwill, means that robust employee training cannot be overlooked as part of a business’s security investment. Contact-center agents who are trained to support a brand’s digital infrastructure – from making sure sensitive information is securely recorded in the first place to recognizing malicious breach attempts – become a priceless asset to a business’s security. IT can support this with advanced AI that uses speech analytics and tracks calls in real-time to notice unusual call patterns. This can alert agents to potential fraud immediately. When agents and IT are in sync, businesses can improve their bottom lines in terms of saved expenses. But more importantly, brands with contact-center agents trained in security best practices can continue building the customer trust and positive experiences that are critical to business success.

#contactcenterworld, @sitel_worldwide

About Sitel:
Company LogoWe are a global outsourcing provider of customer experience management with 150 offices across 25 countries and more than 75,000 associates speaking 48 languages. Our contact center associates deliver customer experiences every day. We are here to help you with any business process outsourcing needs you might have.
  Company Blog   Company RSS Feed   Company Facebook   Company Twitter   Company Instagram   Company YouTube   Company LinkedIn   Company Profile Page

Today's Tip of the Day - Do Your Wall Boards Really Help?

Read today's tip or listen to it on podcast.

Published: Friday, February 28, 2020

Printer Friendly Version Printer friendly version

2020 Buyers Guide Computer Telephony Integration

Call Center Studio

Call Center Studio
Call Center Studio is the world’s first call center built on Google and is one of the most secure and stable systems with some of the industry’s best reporting. It is one of the most full-featured enterprise grade systems (with the most calling features, one of the best call distribution, outbound dialing features and integrations—including IVR, AI Speech Recognition, blended inbound/outbound calling and includes Google’s new Dialogflow and Speech API. Call Center Studio is the absolute easiest to use (with a 10 minute setup), and is the price performance leader with lower equipment cost and less setup time.
PH: +1 512-872-7565

ComSys S.A.

CLink for CRM and Call Center Integration
CLink by Comsys is a middleware that connects in real-time the CRM and the contact center applications. CLink enhances the CRM with interaction management capabilities from the contact center that allow agents to work more productively across all communication channels.
Comsys is a provider of οmnichannel customer engagement solutions that assist companies around the world in delivering unique customer experiences. For the last 15 years, Comsys designs and implements complex projects for clients from the outsourcing, financial services, telecommunications, and retail sectors. Comsys enjoys strategic partnerships with technology vendors like Cisco®, Aspect Software®, and Microsoft® for the delivery of innovative interaction management and contact center optimization solutions.
PH: +302109241486

IntraNext Systems

IntraNext Systems develops agent efficiency tools and data security software solutions for medium-to-large contact centers. Our Event Intelligence® Platform solutions include SmartCTI™, iGuard®, and SmartSIP™. SmartSIP is based on our patented SIP layer technology and provides a DTMF masking solution for VoIP environments.
PH: 888.638.6398


CRM integration
We know how important it is for a business to obtain data from its customers and to manage them effectively, so we help small to large companies by integrating their CRM with the Virtual Switchboard.

This type of integration will simplify the work of your team and improve the management performance of the contact list and its information.
PH: +34 952 667 511


NovelVox CTI Connector
NextGen Cisco Finesse, Genesys & Avaya Embedded CTI Connectors for Salesforce, Microsoft Dynamics, ServiceNow, Zendesk & more.
PH: (+1) 301 202 3672
Submit Event

Upcoming Events

15th annual Best Practice Conference - this is the contact center world's most highly rated event - a whopping 100% of delegates say they would recommend it!

100's of best practice tips and ideas from contact center professionals Read More...

Survey - Online Event

Latest Americas Newsletter
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
session cookie set = True
session page-view-total =
session page-view-total =
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =