Steps to Safeguard Your Contact Center

Updated: December 20, 2007



Whether it's a malevolent agent, a poorly protected VoIP connection or a highly vulnerable collaboration application, there are countless factors that can threaten the security of a contact center. Just ask Michael DeSalles. A strategic analyst with Frost & Sullivan, DeSalles said that it's not enough to simply have a security-minded IT department in place. Rather, he warned, companies must provide security at the network, application and desktop levels to ensure the protection of its highly sensitive customer data.

Here are some steps you can take to safeguard your contact center from today's security threats.




1. Know the risks. Protecting your call center from threats may "look easy at the outset," said DeSalles, but "this is not your regular do-it-yourself project." Rather, DeSalles said that companies must ascertain the budgetary demands, compliance issues, risk-management programs and data requirements involved in securing a contact center's internal and external communication channels before opening its doors. What's more, a disaster-recovery plan will be needed in the event of a serious breach, such as a DoS (denial of service) attack, to ensure business continuity.

2. Know compliance issues. From PCI (Payment Card Industry) to HIPAA (Health Insurance Portability and Accountability Act of 1996), there's no shortage of certifications and regulatory-compliance issues governing today's call-center transactions. PCI compliance is particularly important, as it carries penalties. Without it, a company may not be able to process credit cards. For this reason, it's critical that organizations do their homework, investigating industry regulations and how to best ensure ongoing compliance.

3. Secure executive support. Ensuring a safe and secure contact center takes more than technology: It also demands money. That's why companies must make certain that senior-level management is on board when it comes to identifying — and purchasing — the right tools. But that's not all. If a company has a clean-desk policy requiring employees to lock up their drawers and toss out paper notes, managers must also be willing to commit. Said DeSalles, "You have to set up rules and enforce them. And the rules that apply for the agents are the rules that apply for the managers. So if you have a manager who's not enforcing a clean-desk policy, you fire them. A policy has to have teeth at that level."

4. Audit home agents. If you employ home agents in a virtual contact center, make sure that they're out of sight but not out of mind. When hiring, conduct thorough background, criminal and financial checks of potential home agents. And make sure that candidates are willing to sign legal documents absolving the company from any liability in the event of criminal wrongdoing. From a technological standpoint, companies should also introduce desktop applications that disallow users from loading unapproved applications. That way, said DeSalles, "You'll never have the issue of agents trying to download iTunes while they're handling a customer call."

5. Consider outsourcing. If taking the necessary steps to secure your call center seems overwhelming, consider outsourcing your customer-support capabilities altogether. "In the end, my research tells me it's easier to outsource," said DeSalles. Certainly, handing over this function to a third-party provider can give rise to control — and budgetary — concerns. But immediate access to qualified agents, low attrition rates and built-in security measures are often worth the added cost. "You factor all these considerations together, and outsourcing becomes a very economically viable model," DeSalles said.




Security is not static. Rather, it is a dynamic, constantly changing issue that businesses must take seriously. After using the above-listed defenses, companies cannot sit back and relax. Cybercriminals are continually developing new and more sophisticated methods of infiltrating different IT environments, ranging from call centers to virtual networks.

It's essential, then, that your company stays ahead of the security game. Keep updated on compliance laws, as they may change, and be vigilant about educating yourself on the latest threats. Proactively protecting your call center is the best guarantee that your business — and your clients — will stay safe.

Featured Research
  • The Contact Center Conquers the Cloud

    Contact Centers have come a long way over the past few decades. Learn how this important asset has evolved into the cutting-edge offerings of today. more

  • Contact Center Software on a Budget

    Although contact center software is necessary for a modern contact center, it can be outrageously expensive. Many companies find that their budget bloats during the implementation process. more

  • The New 2016 Contact Center and Call Center Comparison Guide

    Your contact center and call center represent your business. With the right software, you can make a positive impact on your customers and clients. Are your customer service teams and sales teams setup for success with the latest tools? Find out with our guide. more

  • Contact Center Software Cost Guide

    The success of your contact center depends just as much on the software you use as it does on the performance of your agents. Selecting the right software could mean the difference between success and failure for your business. more

  • Implementing Web Chat in Your Contact Center

    Although contact centers used to be synonymous with call centers, those days are now behind us. More and more companies are now providing customers with the option to contact customer service representatives through web chat. This is a win-win. Customers receive service that better meets their needs, and companies reap the benefits of satisfied customers. more