Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

ContactCenterWorld.com

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used

Twitter

Facebook

LinkedIn

Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used

LinkedIn

This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties

OK
BECOME
A MEMBER
TODAY TO:
CLICK HERE
[HIDE]

Here are some suggested Connections for you! - Log in to start networking.

Industry Research : US Department of Homeland Security Survey Highlights

News that the US Department of Homeland Security has identified the weak link in IT security is the human element comes as no surprise to Idappcom, the data traffic analysis and security provider.

 

According to Ray Bryant, the firm's CEO, after DOHS staff quietly dropped data disks and USB sticks in the car parks of government agency and allied company buildings, they found 60 per cent of them were inserted into the company/agency's computer systems.

 

"What's even more ironic is that if the disk case had an official logo, then the `success rate' soared to 90 per cent, something that the DOHS notes as proving there is no device known to mankind that prevents people from being idiots," he said.

 

"This observation - the proof of anecdotal evidence if you will - has ramifications in all aspects of IT security, and especially, I believe, when it comes to network security, as it also shows you cannot rely on staff installing IT security systems properly," he added.

 

Bryant went on to say that, whilst many IT security professionals do install their IPS, IDS, UTM and firewall systems effectively, as well as configuring them correctly, there is a sizeable minority who do not, largely due to a lack of effective training.

 

And then the question becomes - how do you spot these incorrectly configured systems, whose insecurity tends to get worse as time goes by, often owing to patches and updates not `taking' as they should - another symptom, says the Idappcom CEO, of poor configuration.

 

The answer, he explains, is automated and effective auditing of the security appliance and allied systems, which then assists the IT security management about which areas of network/IT system security need tightening up on.

 

Automated pen testing and auditing systems cannot even hope to correct for the human failings identified in the US DOHS survey, but, says Bryant, that can compensate by acting as a real-world check on the efficiency of a given IT security system, quickly and efficiently identifying the areas where security needs to enhanced.

 

The fact that the test subjects were `infected' with an ET-call-home app - which could have been a trojan or similar piece of malware – clearly proves the case that human operatives make errors.

"IT systems, however - when properly configured - do not normally make such errors, so applying a safety net of IT security audit layer such as our TrafficIQ technology, makes a lot of sense," he said.

 

"TrafficIQ won't stop human error creeping into even the most effective of IT security departments, but it will help management compensate for configuration and similar consequential problems. To err is human, but to fail to compensate for those errors is an unnecessary risk," he added.

Today's Tip of the Day - Team Building

Read today's tip or listen to it on podcast.

Published: Friday, June 17, 2011

Printer Friendly Version Printer friendly version

2023 Buyers Guide Surveys

 
1.) 
Nuxiba Technologies

Reminder
Provide an unparalleled, engaging user experience for the creation of dynamic voice broadcasting campaigns. Its block-based interface enables you to develop easy to complex call flows aligned with given strategic business targets by simple drag and drop operations.

Mass Automated Telephone Surveys are based on a key-pad answering system that enables you to poll large audiences with your own custom questions. They are great for:

- Building Customer Loyalty
- Lead Generation
- Enhancement of Current Service Portfolios

Manage the platform with great ease and assess your results. Schedule your demo or request a quote today!

2.) 
Pointel

Survey360
Pointel Survey360 is a closed-loop feedback solution designed for business users to create and manage surveys. It is equipped with the ability to capture and analyze data in real-time.

Survey360 provides a competitive edge that improves our customers' business strategy with actionable intelligence. In addition to the details in the surveys themselves, Survey360 enables users to generate interactive reports on demand even without the hassle of coding to interpret their customers' feedback and translate survey results into improvement recommendations.
 

About us - in 60 seconds!

Submit Event

Upcoming Events

Europe's leading call & contact center event is now arriving at the U.S., showcasing the latest and most effective technologies, strategies and advancements to industry professionals who are looking to excel in the customer engagement world!

Disco... Read More...
 4568 

Newsletter Registration

Please check to agree to be placed on the eNewsletter mailing list.

Latest Americas Newsletter
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
CMS =
session cookie set = True
session page-view-total = 1
session page-view-total = 1
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =