Advertisment

Secured Contacts

author-image
VoicenData Bureau
New Update

Call centers were traditionally created in large warehouse environments, with

rows of agents dealing with customer queries via the telephone. This environment

was fairly easy to secure. The agents, systems and information were contained

within an enclosed physical location and traditional TDM-based telephony

networks were largely proprietary and difficult to compromise. Enabled by new

technologies and greater consumer demand, call centers have since evolved into

fully functional, multi-channel centers.

Advertisment

They are also becoming more distributed. For instance, Internet protocol (IP)

technology removes the need for agents to be confined to a single physical

location and enables systems and skills from around the organization to be

connected to the customer from any location.

However, greater access to information through multiple channels of

communication carries risks as well.

Convergence



The findings of Datacraft/Dimension Data's Global Contact Center

Benchmarking Report 2007, reveal that more than 60% of contact centers have

already introduced IP-based or hybrid IP PBX/ ACDs. In Asia Pacific, 67% of

organizations surveyed also ranked the adoption of Session Initiation Protocol

(SIP) in their plans versus 50% in North America. SIP allows the easy inclusion

of data to interactions. Examples of data relevant to contact centers could be

customer details, credit status, pricing, delivery status, etc.

Advertisment

IP technology allows contact centers to integrate previously disparate

systems to enhance customer experience and reduce response times. All customer

interactions via telephone, email, or web can now be accessed by the agent via a

single IP interface, providing a unified view of a particular customer

regardless the channels used. This enables agents to access customer information

faster, and ensures that the interactions are managed seamlessly by the most

appropriate agent.

However, this unification of systems and information also means that any

single security breach can have greater and far-reaching consequences.

Advertisment

Regulation and Legislation



Information processed by contact centers is heavily regulated and bound by

legislation. Personal information is governed by the Data Protection Act;

financial information may be bound by the Financial Services Industry

regulators; and credit card transactions are subject to Payment Card Industry (PCI)

regulations in the country. Sensitive information must therefore be secured

against exposure to third parties and its distribution should be fully audited.

Do not call (DNC) registers are expected to be introduced in countries like

China and Australia. Telecommunication Regulatory Authority of India had also

announced the same and penalties in 2007.

Multiple Interaction Channels



Most organizations have implemented multiple customer interaction channels.

According to the Datacraft report, voice remains the predominant channel in

contact centers, with respondents reporting that telephone and interactive voice

response account for 73% of total traffic.

However, new communication channels such as email and web are rapidly being

adopted as organizations understand the benefits of enhancing the information

they present to their customers. Participants in the study report that one in

ten interactions is now handled via emails. This is the second highest volume

channel, following agent-assisted telephone.

Advertisment

As the primary interaction channel for contact centers, organizations need to

ensure the security of voice. Traditional telephony networks are inherently

secure, being based on proprietary systems connected via private networks.

IP-based telephony, however, is based on well-publicized standards and

protocols, which make it more vulnerable to abuse and compromise. IP networks

are also highly interconnected, thus providing greater reach to customers,

suppliers and partners, but simultaneously open up potential access channels for

criminals and unscrupulous third parties. IP-based PBXs, voicemail and voice

recording systems-all common in contact center environments-are vulnerable to

attacks unless properly protected. This can lead to loss of service or privacy

violations. The IP voice communication itself is vulnerable to eavesdropping or

other tampering that compromises the privacy and/or integrity of the

communication.

Email is the most common route by which viruses are distributed, and contact

centers need to ensure that viruses are not received from or sent to the

customer during email exchanges. This could lead to business outages and

clean-up costs, or brand damage and potential litigation if the contact center

is responsible for infecting the customer. Contact centers also need to ensure

that they do not distribute sensitive, libelous or defamatory content to

customers and that the privacy of email communications is maintained. Web

content can also be a source of malicious code, and measures should be taken to

ensure that a contact center's web servers are not compromised or used as a host

for such content.

A Proactive Plan



Effective security cannot be achieved by implementing technology alone. It

relies heavily on managing a complex environment that also takes people and

processes into account. Many security systems fail because technology is seen as

the be-all and end-all of the security solution. But without policy and

well-trained, reliable operators, technology alone will fail to protect the

organization from security breaches.

Advertisment

To create secure contact center environments, we advise organizations to

focus on the following areas in particular: managing people, managing access and

managing information.

Managing People



Many contact centers have implemented quality management software suites

comprising voice recording at the basic level. Trainers use these recordings to

coach and evaluate the performance of contact center agents. In some countries,

voice recording is required as a part of industry compliance. By adding the

screen recording module, all key strokes and on-screen activity of the agents

can also be captured. Screen recordings can help validate process efficiency,

process compliance as well as setting alerts in the event of suspicious

activities performed by contact center staff from their desktops.

Technology should be installed at the internet gateway alongside firewalls

and intrusion etection/prevention devices to filter e-mail and web traffic and

prevent malicious code from entering the network. Software should also be

installed on agents' desktops to prevent infection which may be caused by data

being physically transported into the contact center and installed on the

desktop. This software includes antivirus, personal firewalls, host-based

intrusion detection/prevention, etc.

Advertisment

The desktop can be further locked down by deploying policy enforcement

software that will reset desktops to a standard configuration or 'gold build'

should it be altered in any way.

Apart from implementing IT systems, it is imperative that contact center

employees are effectively screened and their backgrounds are checked before they

are hired.

Moreover, a robust security policy should be created, documented and

communicated to all employees. The policy should define security roles and

responsibilities, access privileges, escalation paths and incident response

processes and the policy should be communicated to all staff, and compliance

monitored. Procedures should be defined for the processing and storage of

customer information and an acceptable use policy defined for the network.

Proper provisioning and de-provisioning of users is also critical to ensure that

correct levels of system, application and data access are granted for new

employees. This access needs to be revoked immediately once the employee has

left the organization.

Advertisment

Managing Access



Access to the contact center needs to be carefully controlled, with clear

demarcation lines drawn between internal systems (e.g. customer records) and

publicly available systems (e.g. the company's website).

IP-based Contact



Perimeter security is the cornerstone of access security and ensures that

the systems internal to the contact center are protected from unauthorized

external access. Firewalls and intrusion detection/prevention technology are

essential as the first line of defence and access control is also essential to

control network and information access for employees and agents

Additionaly, there are several strategies that contact centers can implement

to identify and classify an agent and the device they are using, and control

access to the system:

  • User ID and password: Hardware tokens or smart cards; Software tokens;

    Biometric identification; Network Admission Control.
  • Managing Information: Protecting the contact center from information

    leakages is always a top priority for organizations and we would recommend an

    approach that combines Information Leak Prevention (ILP) software and

    encryption. ILP software technology is used to control how information is used

    on the desktop and if/how it is allowed to be distributed beyond the desktop.

    In this way, sensitive data can be prevented from being copied to portable

    media devices such as CDs/DVDs, memory sticks and PDAs, etc, or reproduced in

    other ways such as printing, cutting and pasting or screen scraping.

ILP technology prevents sensitive information from ending up in the hands of

criminals, thereby reducing the growing risk of identity theft. The software

provides the necessary controls and also monitors user behavior at the desktop

and alerts or takes action against violations of the organization's corporate

policy. Access management and encryption are the most effective ways to achieve

security for this stationary data. Access management enables access only to

those authorized to view the data and encryption renders the information useless

to anyone who manages to break into the system. Encryption should also be used

on agent desktops in a virtual contact center.

The contact center industry has transformed dramatically over the last

decade. Contact centers form the heart of the organization today, and are often

the primary or only point of contact with the customer. New opportunities,

however, also result in a new set of security challenges. Although technology

plays a role, a secure contact center effectively implies the need for ongoing

monitoring of people and processes.

Nagi Kasinadhuni



The author is GM, Converged Communications Solutions.



vadmail@cybermedia.co.in

Advertisment