Steps to Safeguard Your Contact Center

Updated: December 20, 2007

Issue

 

Whether it's a malevolent agent, a poorly protected VoIP connection or a highly vulnerable collaboration application, there are countless factors that can threaten the security of a contact center. Just ask Michael DeSalles. A strategic analyst with Frost & Sullivan, DeSalles said that it's not enough to simply have a security-minded IT department in place. Rather, he warned, companies must provide security at the network, application and desktop levels to ensure the protection of its highly sensitive customer data.

Here are some steps you can take to safeguard your contact center from today's security threats.

 

Strategies

 

1. Know the risks. Protecting your call center from threats may "look easy at the outset," said DeSalles, but "this is not your regular do-it-yourself project." Rather, DeSalles said that companies must ascertain the budgetary demands, compliance issues, risk-management programs and data requirements involved in securing a contact center's internal and external communication channels before opening its doors. What's more, a disaster-recovery plan will be needed in the event of a serious breach, such as a DoS (denial of service) attack, to ensure business continuity.

2. Know compliance issues. From PCI (Payment Card Industry) to HIPAA (Health Insurance Portability and Accountability Act of 1996), there's no shortage of certifications and regulatory-compliance issues governing today's call-center transactions. PCI compliance is particularly important, as it carries penalties. Without it, a company may not be able to process credit cards. For this reason, it's critical that organizations do their homework, investigating industry regulations and how to best ensure ongoing compliance.

3. Secure executive support. Ensuring a safe and secure contact center takes more than technology: It also demands money. That's why companies must make certain that senior-level management is on board when it comes to identifying — and purchasing — the right tools. But that's not all. If a company has a clean-desk policy requiring employees to lock up their drawers and toss out paper notes, managers must also be willing to commit. Said DeSalles, "You have to set up rules and enforce them. And the rules that apply for the agents are the rules that apply for the managers. So if you have a manager who's not enforcing a clean-desk policy, you fire them. A policy has to have teeth at that level."

4. Audit home agents. If you employ home agents in a virtual contact center, make sure that they're out of sight but not out of mind. When hiring, conduct thorough background, criminal and financial checks of potential home agents. And make sure that candidates are willing to sign legal documents absolving the company from any liability in the event of criminal wrongdoing. From a technological standpoint, companies should also introduce desktop applications that disallow users from loading unapproved applications. That way, said DeSalles, "You'll never have the issue of agents trying to download iTunes while they're handling a customer call."

5. Consider outsourcing. If taking the necessary steps to secure your call center seems overwhelming, consider outsourcing your customer-support capabilities altogether. "In the end, my research tells me it's easier to outsource," said DeSalles. Certainly, handing over this function to a third-party provider can give rise to control — and budgetary — concerns. But immediate access to qualified agents, low attrition rates and built-in security measures are often worth the added cost. "You factor all these considerations together, and outsourcing becomes a very economically viable model," DeSalles said.

 

Recommendations

 

Security is not static. Rather, it is a dynamic, constantly changing issue that businesses must take seriously. After using the above-listed defenses, companies cannot sit back and relax. Cybercriminals are continually developing new and more sophisticated methods of infiltrating different IT environments, ranging from call centers to virtual networks.

It's essential, then, that your company stays ahead of the security game. Keep updated on compliance laws, as they may change, and be vigilant about educating yourself on the latest threats. Proactively protecting your call center is the best guarantee that your business — and your clients — will stay safe.

Featured Research
  • 2017 Contact Center Software Trends

    Did you know that, according to Forbes, 86 percent of customers will pay more for a better customer experience? Customer satisfaction is always a worthy business pursuit, but to identify customer preferences and exceed expectations, you must keep pace with innovations in the technology your customers are using. more

  • How to Select Contact Center Software in 9 Steps

    Your choice of contact center software will affect the future success of your business. Don’t leave this important decision to chance. This guide provides nine actionable steps for the selection process. more

  • Hidden Costs of Contact Center Software

    Creating a great customer experience for each person who reaches out to your customer support center is vital to developing a loyal and ravenous customer base for your business. In fact, according to Walker Information, Inc., “By 2020, customer experience will overtake price and as the key brand differentiator.” more

  • Top 11 Contact Center Vendors in 2017

    With the ever-proliferating number of contact center software vendors, it can be difficult to determine which software application is right for your business. This guide for 2017 includes information about eleven top contact center vendors, including information on pricing, features, and strengths and weaknesses. more

  • The New 2016 Enterprise Contact Center Comparison Guide

    Is your business researching a new contact center solution? Complete with over 120 data points, 90 features, and over 45 contact center software providers, our comparison guide is an essential asset. more