{"id":1136,"date":"2012-04-19T09:03:49","date_gmt":"2012-04-19T09:03:49","guid":{"rendered":"https:\/\/blogs.poly.com\/contact-centred\/?p=1136"},"modified":"2012-04-19T09:03:49","modified_gmt":"2012-04-19T09:03:49","slug":"home-working-security","status":"publish","type":"post","link":"https:\/\/blogs.poly.com\/home-working-security\/","title":{"rendered":"Home Working Security"},"content":{"rendered":"

I’ve been spending a fair amount of time looking at home working recently, and the one big topic that comes up regularly is security.\u00a0 Interestingly, the\u00a0feedback that has come up from organisations who are more experienced in this area, is that a lot of the issues are perception rather than actual.\u00a0 Companies who have tried home working have actually experienced the same or lower number of security issues compared to those who kept people onsite.\u00a0 This appears to be driven by two reasons<\/p>\n

1)\u00a0\u00a0\u00a0\u00a0\u00a0 The demographic of a home agent is very different to that of an onsite agent (on average).\u00a0 Home agents are 38 (15yrs older than onsite agents) and have higher than average education<\/p>\n

2)\u00a0\u00a0\u00a0\u00a0\u00a0 Working at home is seen as a very big benefit for people, and the threat of losing this benefit is in many cases a very good deterrent to criminal behaviour.<\/p>\n

\u00a0Sensible precautions still need to be taken though, so I\u2019ve split these up into 3 areas<\/p>\n

\u00a0Data Security<\/strong><\/p>\n

This is about making sure the transport of data to the home, and its use on a PC is secure.\u00a0 It is a familiar area for IT managers, as it encompasses using a VPN to securely transport data, and using a thin client session to display the CRM data.\u00a0 The thin client sessions are set-up to stop any other activity on the PC at the same time to ensure that data cannot be copy\/pasted into other applications. \u00a0\u00a0\u00a0<\/p>\n

\u00a0One area that is less familiar to IT managers is PCI (Payment Card Industry) compliance.\u00a0 The PCI rules are complex<\/a>, but relate to ensuring that the 16 digit credit card number and the 3 digit security code are not stored or accessible to unauthorised people.\u00a0 The best solution I\u2019ve seen to this so far is from a company called Veritape<\/a> that asks the end user to enter their credit details using the phone keypad.\u00a0 The tones made are then masked so that the agent cannot hear them, and the system enters the details on screen as **** (the same way that passwords work).\u00a0 This way the agents never see the credit card details. \u00a0<\/p>\n

\u00a0Are you who you say you are?<\/strong><\/p>\n

This is about ensuring that the person signing onto the computer or phone is the agent, rather than an imposter.\u00a0 Again, its mostly an area that is familiar to IT managers, and covers basic steps such as asking for password or sign-in data on a more regular basis (compared to when in the office), up to fingerprint scans to authorise sign-in.\u00a0 Some companies are also looking at using web-cams and regularly turning these on to make sure that the correct person is visible.<\/p>\n

Who else is in the room?<\/strong><\/p>\n

This is the one that is most troubling for organisation, the perimeter security that a building provides is lost in the home environment, so how do I know that someone isn\u2019t looking over the shoulder of the agent and taking down the sensitive notes. \u00a0\u00a0The webcam approach described above is being reviewed by some companies, but is generally an extreme view.<\/p>\n

For companies that have implemented home working, the realities are less daunting that the upfront perceptions.\u00a0 With the right recruitment approach, a trial period onsite for 6 months, and the implied threat of losing the benefit of home-working, then most companies are comfortable with home workers as long as the sensible steps of data security are addressed.<\/p>\n","protected":false},"excerpt":{"rendered":"

I’ve been spending a fair amount of time looking at […]<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[509],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/1136"}],"collection":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/comments?post=1136"}],"version-history":[{"count":0,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/posts\/1136\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/media?parent=1136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/categories?post=1136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.poly.com\/wp-json\/wp\/v2\/tags?post=1136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}