Calling for the cloud

August 2016 Information Security, Infrastructure

With any IT infrastructure within a contact centre comes risk. And while this risk should not paralyse operations, it should be investigated carefully and practically to find the safest and most appropriate solution.

Jed Hewson, 1Stream.
Jed Hewson, 1Stream.

According to Jed Hewson, co-founder of cloud-based call centre technology provider, 1Stream, there are a few key considerations that should inform a business owner’s decision around what solutions and systems to implement in their business call centre.

Get advice from the professionals

Finding the right service provider and implementing the appropriate systems becomes an easier task once the right questions have been asked and the necessary information extracted.

The important thing is not to guess at this yourself, but rather enlist the expertise of a security professional to ascertain exactly what level of security is required to meet the needs of your business and to make the best investment of costs and time. Armed with this information, you will be better equipped to approach and engage with your cloud solution service provider and ensure the most effective solution and features are implemented.

How much security is enough?

It’s true that security is a major consideration for all businesses who are connected online and collect data, and the importance of this should not be minimised. However, implementing security measures that best fit your business and that will save you money and provide peace of mind, requires a full assessment of your real security needs.

What is the information being collected? What is the value of this information and therefore the likelihood of unauthorised access? And possibly most importantly: What risks are involved should this information be accessed without authorisation?

The reality is that calls where bank account information is shared should be dealt with very differently to calls where little or no personal information is collected.

Based on the likelihood as well as the severity of the threat, the appropriate measures can be put in place. These can range from basic password protection all the way through to out-of-scope data verification, depending on the need identified.

Cloud vs legacy systems

To some, embracing cloud-based technology might feel like an unwelcome risk. But when looking from another perspective, a very different picture emerges. In the past, remaining in control of data meant being in control of the hardware – a simple enough task with a static IT infrastructure. Servers and devices, previously bulky and venue reliant, were confined to the office and easy to monitor and control, along with the data that they contained.

But mobility is now the standard – laptops, tablets and mobile phones with access to business data can be used anywhere and legacy systems are simply not sufficiently capable of managing and securing these. A mobile IT infrastructure is best suited to cloud-based solutions, that are specifically built and tailored for this purpose.

While the threat of external hacks is a significant concern to businesses, often the biggest threat comes from within. Cloud solutions limit this risk by removing the locality of sensitive information. Instead, this data is stored and secured in such a way that internal staff are unable to tamper with or remove it, without being noticed.

As an added comfort, cloud-based solutions for contact centres offer full audit trails, giving call centre managers and business owners full oversight of operations and a clear understanding of processes and efficiency.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Managed security solutions for organisations of all sizes
Information Security
Cyberattackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Multiple IoT devices targeted
Information Security Residential Estate (Industry)
Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Sophos launches advisory services to deliver proactive cybersecurity resilience
Information Security News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts.

Read more...
Kaspersky highlights biometric and signature risks
Information Security News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Stronger cloud protection
Kaspersky Information Security Products & Solutions
Kaspersky has announced the release of an enhanced version of its Kaspersky Cloud Workload Security, delivering advanced protection for hybrid and multi-cloud environments.

Read more...
AttackIQ enters South Africa with key appointment
Information Security News & Events
AttackIQ, a provider of continuous security validation and exposure management, has announced its entry into the South African market with the appointment of Luke Cifarelli as its country manager.

Read more...
Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.