Contact Center Solutions Featured Article

Security Outside the Office

February 25, 2013
By TMCnet Special Guest
Kevin R. Kammer and Steven Parker, Vice President and General Manager and Director of Information Security for Arise Virtual Solutions Inc.

The work-from-home model provides a number of business benefits including improved agility, better access to superior talent, decreased capital expenditures, and lower total cost of ownership (TCO). In fact, experts at ITAC have calculated as much as a $25,000 annual savings for each at-home agent as compared to a traditional call center resource. Yet despite the advantages, instances of fraud and identity theft are still causing executives to be wary of outsourcing customer service to a solution that utilizes a distributed, work-from-home network. But as nineteenth-century theologian William Shedd astutely pointed out, “fear of a storm is not a justification for keeping a ship in harbor when ships are made to sail.”

Confidence in any work from home solution starts with protecting the data and applications that connect a company with its customers. While the most secure approach is simply to restrict all access, growing customer demand for real-time transactions has eliminated that as a viable option. In fact, sensitive customer data is already readily accessible from any PC, tablet, laptop or cell phone. The key to developing an effective work from home solution, however, is to not add to this risk by further exposing sensitive data during storage, transmission or actual servicing.

Below are four security recommendations for executives who want to enjoy the benefits of the work-from-home model and still sleep soundly at night.

1.       Avoid Creating Additional Storage for Data

Whenever possible, do not create additional storage for customer data. If working with an outsource partner, consider leveraging your existing, in-house data storage by using a “thin client” approach for any work from home access. Tools such as Citrix XenApp, Microsoft (News - Alert) Terminal Server or other virtual machine applications will allow users to securely connect to corporate computing platforms through a simple graphical user interface. Inputs are redirected over the network to existing centralized servers, where application execution takes place in a secured location. The same applies to any voice, chat or e-mail applications such as voice switching devices (an ACD or PBX (News - Alert)), on-line engagement tools, quality management software and operational data stores. 

If additional hosted support is needed (such as a hosted ACD, QA monitoring tools, or a Citrix farm for hosting the secure applications), verify that the partner’s infrastructure and procedures meet all applicable government and industry standards including the Payment Card Industry Data Security Standard (PCI (News - Alert) DSS) or the Health Insurance Portability and Accountability Act (HIPAA).

2.       Protect Data Transmissions

It is also important to protect any transmissions to or from the work-from-home agent. Data communications should always be encrypted. Additionally, voice communications, if applicable, should leverage the Public Switched Telephone Network (PSTN) using a dedicated phone line in the home. If you prefer Voice over Internet Protocol (VoIP), use advanced session border controllers to properly authenticate callers and agents. This will reduce the risk of fraudulent or unauthorized calls. It’s important to note that protections targeted at securely storing or transmitting sensitive information are only effective if coupled with a program and the tools to actively monitor and prevent intrusions or disruptions to the environment. Arise uses a proactive intrusion prevention and detection system to deliver the most advanced network awareness in the industry, including superior threat protection up to Layer 7.

3.     Control Access and Usage at the Workspace

Ensuring proper use and access of data begins with requiring a dedicated environment at the home workspace with equipment that doesn’t introduce additional risk. Avoid wireless communications, including keyboard and mouse, and, if supporting a voice channel, require a dedicated home phone line without advanced features. Other useful security strategies for the workspace end-point include:

  • Multi-factor Authentication. When logging in, work-from-home agents should use multi-factor authentication to access a secure network. Multi-factor authentication takes advantage of a combination of several inputs when verifying someone’s identity.  Although password-based authentication is well-suited for website or application access, it is not secure enough for online financial transactions.
  • Virtual Private Network. Providers with established work from home solutions have long incorporated secure virtual private network (VPN) access but should also consider specialized tools to monitor and authenticate online activities in real time by correlating behavioral analysis, device profiling and inputs from community-based fraud repositories. RSA’s (News - Alert) Adaptive Authentication is an example of such a tool that is currently used by over 8,000 organizations in the healthcare, financial services, government, insurance, automotive, real estate, manufacturing, and pharmaceutical industries to protect more than a quarter of a billion users worldwide through risk-based authentication. 
  • Desktop and Browser Controls. A secure work from home solution should also incorporate tools for restricting or “locking down” what agents see and do via their desktops. Along with limiting the desktop’s functionality -- disabling copy, paste, and print functions – companies need to consider technologies that also protect the environment and restrict where the agent can navigate while they are servicing. 

4.       Work with Quality Talent

Finally, eliminating security risk from any work from home solution, especially potential internal fraud or misconduct, is certainly affected by the quality of the individual agent. In addition to performing background checks on 100 percent of the work from home agents, consider business approaches that deflect applicants interested in work from home opportunities strictly for the intention of committing fraud.  Work from home approaches that require more effort, in time and money, to complete their application or certification processes create a natural barrier to fraudsters.

As mentioned at the outset, firms in all industries can effectively leverage work from home without taking on any additional or unnecessary risks as long as they have a comprehensive discovery plan and tight adherence to security best practices. As you evaluate how you build work from home into your customer service, sales or back office solutions, make sure to identify the upfront investments in infrastructure and tools or consider partnering with an expert that understands the risks and has developed the processes and technologies to address them.

For a complete copy of Arise’s White Paper (News - Alert) on “Security Outside the Office”, visit the Resources tab at www.arise.com.

Kevin Kammer, Vice President and General Manager at Arise Virtual Solutions Inc., is responsible for delivering Undisputed Top Performance™ for the company's clients in the Banking, Financial Services and Insurance industries. Prior to joining Arise, Kevin was Vice President of Strategic Business Development at West Corporation, Chief Operating Officer at Artios and President of Debit Services at First Data Corporation.

Steven Parker is the Director of Information Security for Arise Virtual Solutions Inc.  Steven has over twenty years of professional experience in IT, information security, risk management and converged information security environments, and he is certified in the following areas: CCNP, CISSP, CISM, CISA, ITIL, and ASIS CPP. Prior to joining Arise, Steven was Vice President, Manager Information Security Services at First Citizens Bank, and previously held senior executive roles at Cisco, Mizuho Financial Group, INT Technologies, TSL Corporate Security Services, Century 21, and NYC Department of Investigation. 




Edited by Rich Steeves

Article comments powered by Disqus

Related Contact Center Solutions Articles

Lowe's Opens New Customer Support Center

Lowe's, a home improvement company serving approximately 15 million customers in the United States, in collaboration with the State of Indiana and the City of Indianapolis is ready to open a Customer Support Center in Indianapolis. This new Customer Support Center will create up to 1,000 new jobs by 2016. [ Read More ]
07/24/2014

Contact Centers in Africa-Engaging Citizens and Engine for Economic Development

The recognition of the value of modern contact centers is a global phenomenon in terms of enabling governments to better engage and serve their citizens and as a driver of economic growth. This has been exemplified over the years by the enormous impact of the contact center business in places like the Philippines and India, and is of growing importance in Eastern Europe and the Middle East. And, now it can and should be Africa's turn according to Christopher Bell, Interactive Intelligence's Chan… [ Read More ]
07/24/2014

Interactive Intelligence INTERACTIONS 2014 Draws 2,200-Plus Attendees from 42 Countries

It is always a sign of company health, and typically an indicator of overall market vitality as well, when an annual gathering of customers, partners and leading industry subject matter experts by a recognized industry continues to expand. A case in point is customer experience solutions provider Interactive Intelligence's recently concluded INTERACTIONS 2014. [ Read More ]
07/24/2014

Aviva Augments Operations with New Vodafone Contract

When a vendor has been supplying a company for 17 years, that's no small feat, particularly in these days of rapid change and economic turmoil. But the association between Vodafone and Aviva has been going on that long itself, and is set to continue as Aviva, the global insurance firm, brings back Vodafone to set up a new array of communications services to keep the company on the leading edge of contact capability. [ Read More ]
07/24/2014
Subscribe here for your FREE Contact
Center Solutions
enewslettter.

Events

Weekly Live Demo
Contact Center Solutions

Register Today!


Weekly Live Demo
CaaS Small Center

Register Today!