Bertrand Deroubaix at Odigo looks at how to improve security risk management in contact centres, as adopting a cloud-based Contact Centre as a Service (CCaaS) solution can raise questions around data storage, control, accessibility and protection. What are the security risks? How can contact centres protect customer data?
Security and protecting customer data should be a priority for contact centre risk management and for this reason access to CCaaS solution services should be controlled. In order to do so, however, contact centre risk management needs to be an integral part of company strategy.
What Risks do Companies Face if They Don’t Control Their Data?
Businesses, and by extension their contact centres, need to manage key risk areas to prevent gaps in security. These can make data vulnerable, including that of customers, and the causes can be varied:
- Poorly configured platforms or solutions,
- Lack of vigilance over IT system access rights,
- Agents’ oversight or lack of training around security issues,
- Cyber attacks that can compromise data security.
A Gemalto survey of 10,500 enterprise customers and 1,050 IT decision-makers from 11 countries revealed a startling finding: Companies Struggle to Control Their Data.
Only 54% of companies know where their sensitive data is stored, and 91% of IT decision-makers believe they could and should be better prepared to take advantage of the growing volume of data available.
Despite Brexit UK specific GDPR remains law; though EU law still applies to UK companies dealing with EU customers. GDPR has some positive influence on security through better data management but it also increases customer trust.
When it was first introduced in 2018 however uptake was slow despite the annual UK government cyber security breaches survey identifying that 43% of businesses had identified a cyber attack. This had dropped to 39% by March 2022 but these numbers still reveal the all-too-real need for contact centre risk management.
Contact Centre Data and Risk Management Concerns
Today, a growing number of companies are choosing to migrate to a cloud-based contact centre solution to improve customer experience. This move sparks two questions: how to control data and which people should have access to it.
Data Accessibility
Guaranteeing the Data’s Accessibility to the Right People is Essential in a Contact Centre. To achieve this, access to the company’s services should be with individual access profiles.
For example, an agent should log onto cloud services with a unique ID and password. This should follow the identity and access management process implemented by the organisation to manage user authorisation to the system, information or applications.
Controlling the Data
Contact centres need to keep control of data to prevent security risks, but how? First, CCaaS providers should provide data encryption services to prevent data from leaving the cloud and being immediately intelligible.
Second, contact centres should also segregate data from different customers, which is made possible by the architecture of cloud-based solutions.
Data Security Risk Management in Contact Centres
How can Contact Centres be Sure a Cloud-based Solution Provider has the Necessary Data Security Expertise?
- Check that providers have ISO-27001 and ISO-9001 certifications (information security and quality management systems) and comply with specific industry standards (e.g., PCI DSS for payment card processing or SOC 2 certification).
- Audit service providers to ensure that their infrastructure and solutions meet security policies and that there are no known vulnerabilities.
Even using a provider that has some expertise in terms of data security does not change the importance of daily vigilance during customer interactions.
Securing Personal Customer Data During Interactions
Customer service and conversations must be secured. In fact, with each interaction, customers share personal and, sometimes, confidential information with agents. It is Therefore Essential for Contact Centres to Guarantee the Security of This Information and to Reassure Customers of That Fact.
The use of artificial intelligence (AI) and the implementation of an IVR help by allowing intelligent data transfer according to the caller’s needs.
An important example is maintaining the security of payment details which are a high-value target for criminals. Secure IVR payments allow customers to bypass call queues but not peace of mind.
Provide Agents with Ongoing Data Security Training
Finally, agents should also be part of a security strategy to protect contact centre data. Investing in data security training for agents is critical to ensure reliable operations and prevent mistakes.
Maintaining customer trust is important in a world where those who lose confidence in one company can easily find another.
An example of the difficulty building trust was highlighted in 2018 in the 6 months after GDPR was introduced, 49% of customers said they did not feel any more in control of their personal data. Companies should be aware of this and use contact centre risk management to do more to earn customer trust.
Technology and Risk Management in Contact Centres
Technological innovation makes it possible to optimise data protection in contact centres by using specific tools and actions.
Identify Gaps in Data Management
Before establishing a data protection policy, it is useful to identify potential gaps in a contact centre’s risk management.
This can be done through daily security and intrusion testing, which can be conducted by some providers. Additionally, a Cloud Solution and AI-based Technologies Allow Safe Migration of Data and quick detection of any attempted data leak.
The Proper Tools to Ensure Data Security
In order to ensure data security in contact centres and to detect possible breaches, it is imperative to Restrict Access to Sensitive Data and to set up a Tracking System That Monitors Activities.
Technology can help minimise some of the risks, for example using a solution with anti-malware software, but also SIEM (Security Information and Event Management) software that monitors, detects and alerts on security events or incidents. In addition to these tools, continuous vulnerability scans and early vulnerability detection capabilities can help protect data.
Another occasionally utilised tool is the security assessment survey, however, caution is needed as these can be very misleading. Indeed, filling out these long surveys, sometimes out of context, is not considered good practice, as they are often generic and do not take into account company size or their specific security risks.
It is more appropriate for a company’s data security and protection teams to start an ongoing dialogue with a new provider as soon as the service is contracted. The goal is to address issues directly through risk, not compliance. Service Analysis is a Better Guarantee to Understanding the Security of Your Data.
This blog post has been re-published by kind permission of Odigo – View the Original Article
For more information about Odigo - visit the Odigo Website
Call Centre Helper is not responsible for the content of these guest blog posts. The opinions expressed in this article are those of the author, and do not necessarily reflect those of Call Centre Helper.
Author: Odigo
Published On: 23rd May 2022
Read more about - Guest Blogs, Odigo