Calling for the cloud

August 2016 Information Security, Infrastructure

With any IT infrastructure within a contact centre comes risk. And while this risk should not paralyse operations, it should be investigated carefully and practically to find the safest and most appropriate solution.

Jed Hewson, 1Stream.
Jed Hewson, 1Stream.

According to Jed Hewson, co-founder of cloud-based call centre technology provider, 1Stream, there are a few key considerations that should inform a business owner’s decision around what solutions and systems to implement in their business call centre.

Get advice from the professionals

Finding the right service provider and implementing the appropriate systems becomes an easier task once the right questions have been asked and the necessary information extracted.

The important thing is not to guess at this yourself, but rather enlist the expertise of a security professional to ascertain exactly what level of security is required to meet the needs of your business and to make the best investment of costs and time. Armed with this information, you will be better equipped to approach and engage with your cloud solution service provider and ensure the most effective solution and features are implemented.

How much security is enough?

It’s true that security is a major consideration for all businesses who are connected online and collect data, and the importance of this should not be minimised. However, implementing security measures that best fit your business and that will save you money and provide peace of mind, requires a full assessment of your real security needs.

What is the information being collected? What is the value of this information and therefore the likelihood of unauthorised access? And possibly most importantly: What risks are involved should this information be accessed without authorisation?

The reality is that calls where bank account information is shared should be dealt with very differently to calls where little or no personal information is collected.

Based on the likelihood as well as the severity of the threat, the appropriate measures can be put in place. These can range from basic password protection all the way through to out-of-scope data verification, depending on the need identified.

Cloud vs legacy systems

To some, embracing cloud-based technology might feel like an unwelcome risk. But when looking from another perspective, a very different picture emerges. In the past, remaining in control of data meant being in control of the hardware – a simple enough task with a static IT infrastructure. Servers and devices, previously bulky and venue reliant, were confined to the office and easy to monitor and control, along with the data that they contained.

But mobility is now the standard – laptops, tablets and mobile phones with access to business data can be used anywhere and legacy systems are simply not sufficiently capable of managing and securing these. A mobile IT infrastructure is best suited to cloud-based solutions, that are specifically built and tailored for this purpose.

While the threat of external hacks is a significant concern to businesses, often the biggest threat comes from within. Cloud solutions limit this risk by removing the locality of sensitive information. Instead, this data is stored and secured in such a way that internal staff are unable to tamper with or remove it, without being noticed.

As an added comfort, cloud-based solutions for contact centres offer full audit trails, giving call centre managers and business owners full oversight of operations and a clear understanding of processes and efficiency.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...