Calling for the cloud

August 2016 Information Security, Infrastructure

With any IT infrastructure within a contact centre comes risk. And while this risk should not paralyse operations, it should be investigated carefully and practically to find the safest and most appropriate solution.

Jed Hewson, 1Stream.
Jed Hewson, 1Stream.

According to Jed Hewson, co-founder of cloud-based call centre technology provider, 1Stream, there are a few key considerations that should inform a business owner’s decision around what solutions and systems to implement in their business call centre.

Get advice from the professionals

Finding the right service provider and implementing the appropriate systems becomes an easier task once the right questions have been asked and the necessary information extracted.

The important thing is not to guess at this yourself, but rather enlist the expertise of a security professional to ascertain exactly what level of security is required to meet the needs of your business and to make the best investment of costs and time. Armed with this information, you will be better equipped to approach and engage with your cloud solution service provider and ensure the most effective solution and features are implemented.

How much security is enough?

It’s true that security is a major consideration for all businesses who are connected online and collect data, and the importance of this should not be minimised. However, implementing security measures that best fit your business and that will save you money and provide peace of mind, requires a full assessment of your real security needs.

What is the information being collected? What is the value of this information and therefore the likelihood of unauthorised access? And possibly most importantly: What risks are involved should this information be accessed without authorisation?

The reality is that calls where bank account information is shared should be dealt with very differently to calls where little or no personal information is collected.

Based on the likelihood as well as the severity of the threat, the appropriate measures can be put in place. These can range from basic password protection all the way through to out-of-scope data verification, depending on the need identified.

Cloud vs legacy systems

To some, embracing cloud-based technology might feel like an unwelcome risk. But when looking from another perspective, a very different picture emerges. In the past, remaining in control of data meant being in control of the hardware – a simple enough task with a static IT infrastructure. Servers and devices, previously bulky and venue reliant, were confined to the office and easy to monitor and control, along with the data that they contained.

But mobility is now the standard – laptops, tablets and mobile phones with access to business data can be used anywhere and legacy systems are simply not sufficiently capable of managing and securing these. A mobile IT infrastructure is best suited to cloud-based solutions, that are specifically built and tailored for this purpose.

While the threat of external hacks is a significant concern to businesses, often the biggest threat comes from within. Cloud solutions limit this risk by removing the locality of sensitive information. Instead, this data is stored and secured in such a way that internal staff are unable to tamper with or remove it, without being noticed.

As an added comfort, cloud-based solutions for contact centres offer full audit trails, giving call centre managers and business owners full oversight of operations and a clear understanding of processes and efficiency.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
Hydrogen is green but dangerous
Fire & Safety Infrastructure Power Management
Hydrogen infrastructure is developing quickly, but it comes with safety challenges. Hydrogen is flammable, and its small molecular size means it can leak easily. Additionally, fires caused by hydrogen are nearly invisible, making them difficult to detect and respond to.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
A whole-site solution to crack the data centre market
Fire & Safety Infrastructure Facilities & Building Management
Fire safety consultants and contractors who can offer a comprehensive fire safety solution to the data centre market can establish themselves as a supplier of a key safety features that help guarantee the smooth operation of critical infrastructure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.