logo
  • Industries
    • Healthcare
    • Telecom & Media
    • Retail
    • Technology
    • BFSI
    • Utilities
    Linkedin-new-icon Instagram-Icon Facebook-Icon Youtube-Icon
    Navigation-Bottom-Element

    Explore our Services

    Digital CX

    • Omnichannel CX
    • AI Operations & Bots
    • Social Experience Management
    • SupportPredict Self Learning Knowledgebase
    • SupportPredict Agent AI
    • SupportPredict Self Service & Bots

    Resolution-Centered CX

    • Customer Acquisition
    • Customer Care & Retention
    • Account Management
    • Complaints Management
    • Technical Support
    • Billing & Collections
    • Back Office Processing

    Analytics & Consulting

    • Data Visualization
    • Advanced Analytics
    • Speech Analytics
    • Business Process Optimization
    • Business Transformation
    • Customer Journey Mapping

    Healthcare

    • Member Acquisition
    • Member Services
    • Provider Services
    • Improving Health Outcomes
    • Healthcare Advocacy
    • CMS Stars
  • Outcomes

    Helping you drive competitive advantage

    Business Outcomes

    Revenue Acceleration

    • Sales Acceleration
    • LTV Maximization

    Cost Optimization

    • IntelliAgent
    • Workforce Management
    • Process Consulting & Excellence
    • AI & Data Ops
    • Performance Analytics
    • Agent Health & Wellness

    Enhanced Experience

    • Social Experience Management
    • Omnichannel & Intelligent Steering
    • NPS Predictor
    • Churn Reduction
    • FCR Booster
    Linkedin
  • Locations

    Discover our global network locations

    • United States
    • Honduras
    • Mexico
    • Work from home
    • EMEA
    • United Kingdom
    • Ireland
    • Bulgaria
    • South Africa
    • India
    • Philippines
    Linkedin Instagram-Icon Facebook-Icon Youtube-Icon
    Navigation-Bottom-Element
    Location1-img
    Location2-img
    Location3-img
    Location4-img
    Location5-img
    Location6-img
  • Insights

    Stay informed. Stay ahead.

    • All
    • Blogs
    • Case Studies
    • Healthcare Insights
    • Videos
    • Whitepapers
    • Glossary
    Latest whitepaper

    Reimagine Customer Experience Management on Social Media

    Download
    Navigation-Bottom-Element
    Linkedin Instagram-Icon Facebook-Icon Youtube-Icon

    Business outcomes
    that underpin your growth

    Watch video
  • Careers

    Experience a new world of work

    • Life @ ResultsCX
    • Our Values
    • Careers Blog

    Explore Opportunities

    • United States
    • Honduras
    • Mexico
    • Philippines
    • Bulgaria
    • India
    Navigation-Bottom-Element
    Linkedin Instagram-Icon Facebook-Icon Youtube-Icon
  • ESG

    For a better tomorrow

    • Environmental, Social, And Governance
    • Corporate Social Responsibility
    • R.E.A.L. Women
    Navigation-Bottom-Element
    Linkedin Instagram-Icon Facebook-Icon Youtube-Icon
  • Why ResultsCX

    The ResultsCX difference

    • About us
    • Our Story
    • Leadership
    • R.E.A.L. Women
    • Technology Partners
    • Awards
    • News
    • Technology & Security
    Navigation-Bottom-Element
    Linkedin Instagram-Icon Facebook-Icon Youtube-Icon

    Values that guide
    our teams everyday

    Watch video
  • UK / EMEA

    UK/EMEA

    • Banking
    • General Insurance
    • Consumer Credit
    • Fintech
    • Utilities
    • Private Equity
    • Start up/Scale up
    Navigation-Bottom-Element
    Linkedin Instagram-Icon Facebook-Icon Youtube-Icon

    Values that guide
    our teams everyday

    Watch video
talk to us

How Robust is Your Information Security Stance?

Resources

Blog

Date

May 9, 2023

BACK TO ALL POSTS
How-Robust-is-Your-Information-Security-Stance

How Robust is Your Information Security Stance?

Share

In early 2020, conventional wisdom predicted that customer support was going digital and that companies would largely transition back to in-house support for interactions requiring the human touch. However, COVID taught us differently. Not only did it become impossible to staff internal CX operations in a timely manner, but digital customer experience required more guidance and personal interaction than anticipated. Many brands with at-home footprints, found it challenging to ramp up to meet the escalating demand internally. However, they expected their CX partners to do so—and quickly.

Focus on People, Process, and Technology

The first few months of the pandemic were a sprint to get agents up and running at home. Some organizations decided to scale existing solutions to accommodate the growth in capacity. Others like ResultsCX, built a new platform from scratch, benefiting from the ability to incorporate far stronger security measures in a brand-new system. That’s when many organizations learned that there are three make-or-break components of home-based support: people, process, and technology – and security is a big part of all of them. First, you need people who understand how to work securely in a virtual environment. Then, operating processes must be completely shifted and adapted to match a virtual environment; security considerations must apply to every altered process, as well as to every change in the technology involved, which in many cases needed to be completely re-architected.

Think about the former contact center environment, where managing core security practices was systematized until it was practically effortless; everything, from a clean desktop to what showed up on agent PCs, was constantly monitored on the production floor. In the new remote world, every PC in a home becomes in essence a contact center, with its own network that must be kept secure. Every function needs to feed into a single secure platform. Systems for training, coaching, and monitoring had to be reimagined and scaled in ways that had never been done before. Many businesses skipped that necessary step, opening themselves up to security risks, as well as network penetration and hacking.

Managing all these networks also requires managing the increased risks—whether data leaks, privacy breaches, increased credit card fraud, or other serious threats. In many cases, clients used third parties as technology partners for the work-at-home transition. In essence the security threat quintupled overnight.

Web Log-In Access and VPN—What Can Go Wrong

One way that organizations accommodated their new remote workforces was to simply allow agents to access applications with web passwords and logins from home, without taking into consideration that this could now involve thousands of agents across multiple vendors. In many instances, there was no way to monitor access, which opened clients up to epic levels of fraud. In a situation like this, 1- 5% of agents are likely to do something inappropriate or potentially even break client, industry, state, or federal regulations. Once system access opened on the web, hackers across the globe were eager to take advantage of many organizations’ limited ability to block their access.

Scaling Existing Solutions to Accommodate Volume Growth Didn’t Work

Some companies entered the work-at-home era with VPN systems that supported general and administrative staff, but not customers. Many of the CRMs and primary software tools weren’t reconfigured for work-at-home. This meant an employee could work on a VPN, then log off to spend personal time on the internet. If the employee accidentally downloaded a virus, it now had an infection path straight into the company network the next time that employee used the VPN for system access.

During the transition to work-from-home, some large BPO providers were hit by ransomware. Almost without exception, these attacks entered through technology the business already used and assumed would scale effectively. What was thought to be a secure, stable platform really was a stable, but not universally secure platform. The vulnerability posed by VPN on home PCs was not recognized; bad actors caught on early and quickly seized on the opportunity.

 

Scaling-Existing-Solutions-to-Accommodate-Volume-Growth-Didn’t-Work

Helping Clients Handle Security

A strong security stance involves a deep commitment to security measures at the highest level. It means applying strict controls to your systems and processes and limiting access whenever and wherever necessary. It also requires frequent security reviews. For instance, several times a week, our security experts conduct reviews with our clients, examining their security configurations and offering guidance on implementing additional best practices.

Many clients realize that our daily diligence with managing security across multiple industries makes us a source of knowledge on new or unexpected threats, as well as trustworthy advisors on steps to take and tools to implement. Recently, a client reached out to our Information Security team with questions about adopting a new cloud ACD platform. Five years ago, such outreach by our clients was rare. Our success at maintaining a secure environment makes us an important security resource for our clients – allowing us to better position them against the onslaught of hacking, phishing, and other attempts to breach systems.

Learn more about building a stronger information security environment

Home
Outcomes
Insights
Careers
ESG
About Us
Contact

©2023 All Rights Reserved. ResultsCX

Privacy Policy
Site Map