Posts

Shields Up in 2024 – Recommended Cybersecurity Guidance for DC Region Organizations

As the nation’s cyber defense agency, CISA helps organizations prepare for, respond to, and mitigate the impact of cyberattacks.

CISA’s Shields Up campaign is a heads-up to every organization—large and small— to adopt a heightened posture when it comes to cybersecurity and protect your most critical assets against disruptive cyber incidents. Important recommended actions to protect your organization include:

Reduce the likelihood of a damaging cyber intrusion

  • Validate that all remote access to your organization’s network and privileged or administrative access requires multi-factor authentication.
  • Ensure that software is up to date, prioritizing updates that address known exploited vulnerabilities identified by CISA. Details: https://www.cisa.gov/known-exploited-vulnerabilities-catalog/
  • Confirm that your IT personnel have disabled all ports and protocols that are not essential for business purposes.
  • If you’re using cloud services, ensure that IT personnel have reviewed and implemented strong controls outlined in CISA’s guidance.
  • Sign up for CISA’s free cyber hygiene services, including vulnerability scanning, to help reduce exposure to threats.
  • Leverage CISA resources at https://www.cisa.gov/resources-tools

Take steps to quickly detect a potential intrusion

  • Ensure that cybersecurity/IT personnel are focused on identifying and quickly assessing any unexpected or unusual network behavior. Enable logging to better investigate issues or events.
  • Confirm your entire network is protected by antivirus/antimalware software and that signatures in these tools are updated.
  • If working with Ukrainian organizations, take extra care to monitor, inspect, and isolate traffic from those organizations; closely review access controls for that traffic.

Ensure you’re prepared to respond if an intrusion occurs

  • Designate a crisis-response team with main points of contact for a suspected cybersecurity incident and roles/responsibilities within your organization, including technology, communications, legal and business continuity.
  • Assure availability of key personnel; identify means to provide surge support for responding to an incident.
  • Conduct a tabletop exercise to ensure that all participants understand their roles during an incident.

Maximize your organization’s resilience to a destructive cyber incident

  • Test backup procedures to ensure that critical data can be rapidly restored if the organization is impacted by ransomware or a destructive cyberattack; ensure that backups are isolated from network connections.
  • If using industrial control systems or operational technology, conduct a test of manual controls to ensure that critical functions remain operable if the organization’s network is unavailable or untrusted.

By implementing this guidance, you can make near-term progress toward improving cybersecurity and resilience.

We also recommend a visit to www.StopRansomware.gov – a centralized CISA webpage providing ransomware resources and alerts.

If you’re not confident about how secure or compliant your Voice communications are, TCI can help. Call us today at (703) 321-3030 or GetHelp@tcicomm.com.
 

Safeguard Your Customers and Data with Advanced Unified Communications Security

The bad guys will not stop… Cybersecurity challenges are never-ending.

This is a big concern in virtually every industry, especially those where most interactions have gone digital to meet customer preferences for self-serve and engagement through the channels they prefer – at the time they want.

While this is convenient for customers, it has created significant operational and cybersecurity challenges for contact centers. To provide excellent customer service experiences, contact centers must authenticate a customer’s identity, address questions and concerns, and process transactions quickly and efficiently.

Throughout the process, customers must feel like every interaction is secure, and companies must ensure they protect customer privacy during and after a call. With the proper unified communications (UC) tools, organizations can streamline and secure all contact center conversations to meet omnichannel service expectations before, during, and after a customer connects with a live agent.

Voice Authentication personalizes Service and Reduces Fraud

Large and small organizations are implementing digital transformation strategies designed to streamline contact center interactions. Since only some customers need the help of a contact center agent, these efforts are focused on automating processes with self-serve channels that lower costs. For example, chat and voice bots are being introduced to act as virtual agents, deliver services, promote new products, and provide personalized customer experiences — all without connecting the customer to an agent.

But regardless of which digital self-serve path is available, chances are that a caller will eventually want to go beyond simple questions to discuss a specific account. At that point, a live connection with an agent will be needed. When that happens, the agent must be assured of the caller’s identity before dealing with personal account information. While security questions were enough to protect the customer and the business in the past, today’s cybersecurity landscape is a lot more complicated. A disembodied voice on the other end of the line may not be who it claims to be.

Speech recognition systems can be integrated with existing UC platforms to add a layer of cybersecurity protection. These systems can identify the caller’s intent, authenticate the customer using voice biometrics, and then segment and route the call to the best agent to handle the request. With these digital workflows, companies can streamline the call management process and enable a more personalized interaction because the agent will spend less time authenticating the person on the other end of the call and more time dealing with the customer’s specific questions.

Integrated Voice Response and Recording Capabilities enable Advanced Cyber Protection

TCI offers contact center solutions that include an embedded, self-service Interactive Voice Response (IVR) system with an optional speech recognition feature that enables authentication before an agent is connected. With our customized UC platforms, businesses get a complete communications, collaboration, and customer experience solution designed to maintain the security of contact center interactions for any organization.

Organizations that want additional cyber protection for contact center calls can opt for Interaction Recording (IR) to record all calls and then search for, play, and interrogate call recordings for security and privacy regulation compliance. Advanced speech analytics capabilities built into the system enable companies to analyze recordings for potential fraud, categorize calls as “high risk,” and then suggest countermeasures that can be taken to avoid losses.

TCI’s advanced solutions can be applied to support both centralized contact center operations and decentralized organizations with multiple branch offices that manage customer calls.

Privacy Features that ensure Regulatory Compliance

Of course, in addition to maintaining a high level of cyber protection for all contact center interactions, companies must also comply with data protection regulations designed to protect the privacy of customer data. The changing and complex regulations surrounding data privacy and security compliance have created another challenge for both centralized and decentralized operations.

TCI offers solutions built to protect personal data captured during a call by contact center agents either on an agent’s screen or a voice recording. For example, information collected by workflows can be masked to protect personal data as it is being collected. To control access to stored data, information required by the system to perform certain functions (name, phone number, email address, and voice and multimedia transcripts) can be automatically deleted when no longer required to provide service. Plus, multi-level security privileges can be applied to limit access to all data based on user profiles.

Enable Great Customer Service while optimizing Cybersecurity

Ultimately, the cybersecurity protection that businesses build into their contact center processes should be seamless and efficient. Self-serve options should authenticate a customer’s identity before connecting to a live agent. Agents should be able to address customer questions and manage transactions quickly and efficiently without being bogged down by cybersecurity protocols. UC tools enable enterprises to achieve this level of protection without compromising omnichannel service objectives.

Learn how TCI can help your contact center thrive in the digital age, improve your bottom line, and adhere to security, compliance, and fraud mitigation requirements.

Call us today at (703) 321-3030 or GetHelp@tcicomm.com.
 


Stay Safe and Keep it Simple… 4 Essential Actions to Take During Cybersecurity Awareness Month

The theme of CISA’s, the Cybersecurity and Infrastructure Security Agency, Cybersecurity Awareness Month is “Secure Our World.” They are asking all of us to do our part.

CISA offers helpful tips, videos and resources to protect yourself, your family, and your business from online threats here:

https://www.cisa.gov/secure-our-world

CISA recommends all of us – individuals, families and businesses – to keep it simple and focus on these four critical actions this month – and all year long.

  • Use Strong Passwords – Strong passwords are long, random, unique, and include all four character types (uppercase, lowercase, numbers and symbols). Password managers are a powerful tool to help you create strong passwords for each of your accounts.
  • Turn On MFA – You need more than a password to protect your online accounts and enabling MFA makes you significantly less likely to get hacked. Enable MFA on all your online accounts that offer it, especially email, social media and financial accounts.
  • Recognize & Report Phishing – Be cautious of unsolicited messages asking for personal information. Avoid sharing sensitive information or credentials with unknown sources. Report phishing attempts and delete the message.
  • Update Software – Ensuring your software is up to date is the best way to make sure you have the latest security patches and updates on your devices. Regularly check for updates if automatic updates are not available.

Your UC and Voice Communications need to be protected too. Need help with your UC or Voice communications security?

Contact TCI today at (703) 321-3030 or GetHelp@tcicomm.com.
 


What to Look for in a Secure Senior Living Community or Hotel UC Solution

Caregiving, Hospitality and Security go hand in hand… Every resident in a Senior Living Community has unique needs, just as the hospitality industry strives to offer personalized experiences to every guest.

No business can afford to lose the confidence of its customers, but lost confidence comes at an even higher cost when families have placed their loved ones in your care – and every hotel guest expects to be as secure as they are in their homes.

Yet the reality is that senior living communities and hospitality providers have a lot to focus on behind the scenes to deliver that level of security.

  • Cybersecurity efforts include preventing data breaches from outside the corporate network (including data stored in the cloud) and protecting residents and guests from man-in-the-middle attacks and other forms of phishing and espionage when using the property’s Wi-Fi network.
  • Then there is the physical security of residents and guests, which can be enhanced through digital keycards and IP-based security cameras.
  • Real-time security during emergencies is another critical consideration, involving everything from real-time text alerts to ensuring that 911 services work in every room or location.
  • Finally, there is the simple right to private communications, from encrypted voice calls to messages immediately erased when a guest checks out of a hotel.

What to Look for in a Senior Living or Hospitality UC Solution

While no single vendor can address all security touchpoints, it’s essential to partner with providers that are vigilant in bringing the latest security technologies and compliance requirements to bear on their solutions.

When you choose unified communications (UC) and voice solutions, whether a single phone or a complete UC platform, you should be assured that those solutions meet the most stringent security standards for your industry:

  • The best solutions meet the compliance requirements for both Kari’s Law, which mandates that every multi-line telephone system (MLTS) can easily make 911 calls from any phone, and the Ray Baum Act, which ensures that location information such as room number is passed on to emergency dispatchers during a 911 call.
  • During emergencies, a mass notification messaging solution supporting real-time alerts via multiple possible outlets (desktop messaging, email, text, billboard signage, paging, voice-activated loudspeakers, mobile or SIP-DECT) keeps residents, guests, and staff safe and informed.
  • Details matter… Most cyberattacks and data breaches are the results of little things that were overlooked, from outdated software to setting up weak security passwords.

Residents and guests deserve great accommodations and excellent service. If they don’t feel safe, they won’t be comfortable, and they may not return.

Learn how Mitel solutions can provide your residents, guests, and staff with a comfortable, secure communications experience. Contact TCI at (703) 321-3030 or GetHelp@tcicomm.com.