{"id":17439,"date":"2021-03-26T07:18:27","date_gmt":"2021-03-26T07:18:27","guid":{"rendered":"\/gb\/en\/blog\/?p=17439"},"modified":"2023-01-16T17:25:57","modified_gmt":"2023-01-16T17:25:57","slug":"cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe","status":"publish","type":"post","link":"\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/","title":{"rendered":"Cybersafety for the Remote Revolution &#8211; Keeping Call Centre Workers Cybersafe"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Experts project the permanent remote workforce to grow from<\/span><a href=\"https:\/\/www.weforum.org\/agenda\/2020\/10\/permanent-remote-workers-pandemic-coronavirus-covid-19-work-home\/\"> <span style=\"font-weight: 400;\">16.4 per cent in 2020 to 34.4 per cent in 2021<\/span><\/a><span style=\"font-weight: 400;\">. With more personnel decentralisation, companies will face more cybersecurity challenges.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Remote call centres will particularly be highly vulnerable due to the type and amount of data they handle. Therefore, IT must heighten security protocols and ensure that teams observe the best practices to<\/span><a href=\"https:\/\/preyproject.com\/blog\/en\/what-are-cyber-threats-how-they-affect-you-what-to-do-about-them\/\"> <span style=\"font-weight: 400;\">address cybersecurity threats<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#8217;s discuss why your remote <a href=\"https:\/\/www.ringcentral.com\/gb\/en\/contact-centre\/overview.html\">call centre<\/a> is a hot target for fraudsters and how you can enhance cybersafety in the department.<\/span><\/p>\n<h2><b>Data Security Risks in Call Centres<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Intruders attack organisations through the easiest loopholes, irrespective of the department. However, call centres have certain aspects that increase their risk to internal and external threats. Let&#8217;s see why they are a magnet for data thieves.<\/span><\/p>\n<h3><b>Sensitive Customer Data<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Call centres handle sensitive customer data, something that fraudsters work day and night to find. At the least, call agents have direct access to personally identifiable information (PII), used to verify customer identities. This can include credit card numbers, bank details, SSNs, healthcare records, email addresses, passwords, dates of birth (DoB), and more.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Masters of social engineering often contact unsuspecting call centre representatives and lure them into exposing such information. If successful, they exploit it to commit fraudulent activities, like illegally transferring funds from bank accounts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Identity theft and fraud cases have been rising steadily over the past few years.\u00a0 According to data by the Federal Trade Commission (FTC), <\/span><a href=\"https:\/\/www.ftc.gov\/news-events\/press-releases\/2018\/03\/ftc-releases-annual-summary-complaints-reported-consumers\"><span style=\"font-weight: 400;\">complaints shot from 2.9 million in 2017<\/span><\/a><span style=\"font-weight: 400;\"> to just over 3.2 million in 2019.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of the 1.7 million fraud-related cases in 2019, 23 percent of the complainants reported having lost money. Consumers lost at least $1.9 billion to fraud.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-17443\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-3.jpg\" alt=\"preyproject (3)-753\" width=\"1999\" height=\"1333\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-3.jpg 1999w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-3-300x200.jpg 300w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-3-640x427.jpg 640w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-3-768x512.jpg 768w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-3-1536x1024.jpg 1536w\" sizes=\"(max-width: 1999px) 100vw, 1999px\" \/><\/p>\n<h3><b>Entry-Level Employees<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Some companies hire entry-level call centre representatives who demand relatively low wages. While this is a viable cost-cutting measure, it introduces other risks in call centres.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First off, some people take entry-level contracts only to gain experience, after which they look for greener pastures elsewhere. They don&#8217;t approach their jobs passionately since they aren&#8217;t long-term careers. Such workers don&#8217;t have much employer loyalty.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Second, a low-income worker might lack the motivation to work diligently. If they are struggling financially, a little incentive from external agents can have them selling customer information. Considering all the<\/span><a href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/the-definitive-guide-to-working-in-a-call-centre\/#ring-uk\"> <span style=\"font-weight: 400;\">work involved in call centres<\/span><\/a><span style=\"font-weight: 400;\">, unmotivated agents can even misuse the data for personal gain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Does that sound like your call centre? Your organisation and clients might be in trouble. You have a team of insiders who can assist intruders in harming your organisation without a second thought.<\/span><\/p>\n<h3><b>The Impact of Insider Threats<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A <\/span><a href=\"https:\/\/www.ponemon.org\/news-updates\/blog\/security\/data-breaches-caused-by-insiders-increase-in-frequency-and-cost.html\"><span style=\"font-weight: 400;\">study by The Ponemon Institute<\/span><\/a><span style=\"font-weight: 400;\"> indicates that insider threats are on the rise. Since 2018, cybersecurity incidents due to rogue insiders increased by a staggering 47 per cent. The cost of the said threats increased by 31 per cent over the period.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you thought that all insider-caused breaches are intentional, you are wrong. Data shows that most of the incidents occur due to mistakes by negligent employees and contractors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While organisations lose a lot of money in dealing with negligent insider cases, the cost per incident is relatively low. The amount per breach involving insider criminals and credential thieves is two to three times.<\/span><\/p>\n<h3><b>High Attrition in Call Centres<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Most workplace crimes by employees happen when they are about to quit or after leaving. The reason is simple \u2013 it&#8217;s hard to implicate an outsider for a crime that occurs inside your company. For this reason, organisations with a high turnover of employees who handle sensitive data face the risk of serious data breaches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sadly, attrition has been increasingly high in almost all sectors, call centres being among the most affected. <\/span><a href=\"https:\/\/techsee.me\/blog\/call-center-attrition-rate-problem-symptoms-cure\/\"><span style=\"font-weight: 400;\">Based on data from 2008 to 2017<\/span><\/a><span style=\"font-weight: 400;\">, call centre attrition fell gradually from 42 per cent in 2008 to 27 per cent in 2011. It started rising again from 2013 to reach 30 per cent in mid-2017.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If these statistics are something to go by, CISOs and IT managers have a reason to worry. Maybe it&#8217;s time for HR to raise the entry requirements for call centre employees and compensate them generously to retain them. Organisations should also<\/span><a href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/supporting-staff-difficult-times\/#ring-uk\"> <span style=\"font-weight: 400;\">support staff in difficult times<\/span><\/a><span style=\"font-weight: 400;\"> to give them peace of mind and boost employer loyalty.<\/span><\/p>\n<h3><b>Tech Vulnerabilities in Remote Call Centres<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Modern contact centres rely on digital systems to communicate with customers, and the technology is ever-evolving. However, criminals are continually finding ways to circumvent intrusion prevention and data security mechanisms.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The invention of chip and pin technologies heightened payment card security to almost foolproof levels. Fraudsters had to find alternative workarounds, one of which was exploiting the phone channel.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s not uncommon for <a href=\"https:\/\/www.ringcentral.com\/gb\/en\/office\/features\/voip\/overview.html\">VoIP<\/a> providers to allude that their services are secure, but is that the case? While vendors can apply the highest cybersecurity protocols in their systems, there&#8217;s always a chance that a criminal will break them. Hackers are fast learners who scrutinise software systems and exploit the smallest loopholes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As you can see, technology is vulnerable, and <\/span><a href=\"https:\/\/preyproject.com\/blog\/en\/how-to-educate-employees-about-cybersecurity\/\"><span style=\"font-weight: 400;\">employees can expose data accidentally<\/span><\/a><span style=\"font-weight: 400;\"> or maliciously. So, what can a data breach bring? Let&#8217;s discuss the damaging outcomes of a cybercrime.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-17441\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-1.jpg\" alt=\"preyproject (1)-409\" width=\"1999\" height=\"1333\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-1.jpg 1999w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-1-300x200.jpg 300w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-1-640x427.jpg 640w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-1-768x512.jpg 768w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-1-1536x1024.jpg 1536w\" sizes=\"(max-width: 1999px) 100vw, 1999px\" \/><\/p>\n<h2><b>Consequences of a Data Breach<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The repercussions of a data breach are hard-hitting. They can even wipe a successful business out of existence. Below are some of the most damaging consequences.<\/span><\/p>\n<h3><b>Financial Loss<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A data breach, especially one that exposes PII, can lead to untold financial implications. If customers lose money, you have to compensate them. You&#8217;ll also spend on incident response, investigations, legal fees, and setting up better security measures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Penalties for non-compliance are costly. In healthcare,<\/span><a href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/technology-and-the-future-of-healthcare\/\"> <span style=\"font-weight: 400;\">technology and healthcare are inseparable<\/span><\/a><span style=\"font-weight: 400;\">, but stakeholders have to comply with strict regulation such as the Health Insurance Portability and Accountability Act (HIPAA) in the USA. Although the UK doesn\u2019t have a HIPAA equivalent per se, any <\/span><a href=\"https:\/\/www.isdecisions.com\/healthcare\/compliance-research-executive-summary.htm\"><span style=\"font-weight: 400;\">companies in the UK that do business in the US will need to abide by HIPAA laws<\/span><\/a><span style=\"font-weight: 400;\">. Fines due to negligence can cost<\/span><a href=\"https:\/\/www.ama-assn.org\/practice-management\/hipaa\/hipaa-violations-enforcement\"><span style=\"font-weight: 400;\"> $100 to $50,000 per violation<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>Legal Action<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The law requires organisations to demonstrate their ability to protect personal data from unauthorised access and misuse. If such information gets compromised, its owners can sue your business. Many victims in Europe and America have taken companies to court seeking compensation for data loss.<\/span><\/p>\n<h3><b>Forensic Investigations<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A company that has suffered a data breach is responsible for investigating the cause of the incident. The findings are useful in creating a more reliable defence strategy to avert future cybercrime attempts. However, the associated expenses, which are often unanticipated, are costly in the short term.<\/span><\/p>\n<h3><b>Reputational Damage<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A successful<\/span><a href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/customer-retention-strategies-your-guide-to-the-art-of-keeping-your-customers-coming-back\/\"> <span style=\"font-weight: 400;\">customer retention strategy<\/span><\/a><span style=\"font-weight: 400;\"> requires a lot of time, effort, and resources. However, one data breach incident is enough to ruin your reputation and ruin your business. Once you&#8217;re a victim of a cyberattack, most customers will lose trust with your company and stop shopping with you.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The worst part is that they will spread the word, either by telling others, protesting on social media, or commenting on your business website. You&#8217;ll lose out to competitors in no time.<\/span><\/p>\n<h3><b>Operational Disruptions<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Cyberattacks interfere with business operations in incredible ways. A distributed denial of service (DDoS) incident, for example, prevents legitimate users from accessing websites and online resources.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The<\/span><a href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cost-unplanned-outage\/\"> <span style=\"font-weight: 400;\">cost of unexpected IT outage<\/span><\/a><span style=\"font-weight: 400;\"> is high. A <\/span><a href=\"https:\/\/www.bbc.co.uk\/news\/technology-35204915\"><span style=\"font-weight: 400;\">2015 attack brought the BBC domain down<\/span><\/a><span style=\"font-weight: 400;\"> for three hours, taking the on-demand radio and TV offline. It took the broadcasting giant about two weeks to recover.<\/span><\/p>\n<h2><b>Cybercrime Prevention in Remote Call Centres<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Organisations have to implement a multi-layer data security strategy to stop intruders from accessing sensitive information illegally. If you run a call centre, consider the following information security measures.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-17440\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-5.jpg\" alt=\"preyproject (5)-336\" width=\"1999\" height=\"1334\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-5.jpg 1999w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-5-300x200.jpg 300w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-5-640x427.jpg 640w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-5-768x513.jpg 768w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-5-1536x1025.jpg 1536w\" sizes=\"(max-width: 1999px) 100vw, 1999px\" \/><\/p>\n<h3><b>Heighten Physical Security<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Given a chance, bad actors would steal files right from their physical storage instead of struggling with sophisticated technologies. For this reason, safeguarding your data storage assets should be on top of your list. It revolves around physical controls.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ensure that only authorised staff can visit restricted areas such as server rooms. Only the employees on duty should use office computers. Install a reliable surveillance system and employ qualified personnel to monitor your offices.<\/span><\/p>\n<h3><b>Apply Data Security Basics<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">There are some fundamental security practices that every department using computer systems should implement. These include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Antivirus and firewall protection<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Long, non-default passwords<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">One password for one account<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Two-factor authentication<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Software updates and patches<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitoring privileged users<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">While these bare minimums aren&#8217;t sufficient, they will at least give intruders a challenge trying to access your data assets stealthily.<\/span><\/p>\n<h3><b>Staff Training<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Employees can only protect data if they understand its value and what can happen if it lands in the wrong hands. Therefore, organisations should sponsor staff training programs focused on data security. Teach your agents how to identify social engineering and <a href=\"\/gb\/en\/blog\/definitions\/vishing-voice-or-voip-phishing\/\">phishing<\/a> messages to avoid getting duped by imposters.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the knowledge of<\/span><a href=\"https:\/\/gdpr-info.eu\/\"> <span style=\"font-weight: 400;\">GDPR<\/span><\/a><span style=\"font-weight: 400;\"> and other regulations affecting your company, employees will be careful about the information they disclose to callers. The IT security officer should ensure that workers only access the data they need to complete work-related tasks.<\/span><\/p>\n<h3><b>Back Up Important Data<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Data loss impedes productivity and can cost you business, whether it happens accidentally or due to an attack. It robs you of clients&#8217; trust and reverence, yet you have to disclose the incident to your customers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, it&#8217;s advisable to back up all your customer data in secure cloud storage where you can retrieve it on demand. Choose a service provider with robust security features, including but not limited to, password-required entry, two-factor authentication, and security certificates. The backup will help you get back to business quickly if a breach compromises or destroys your data.<\/span><\/p>\n<h3><b>Use Advanced Encryption<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The good thing about multi-layer security is that it increases the barriers an intruder has to break to access your information. Encryption is an effective way to frustrate an attacker who manages to steal confidential information since it converts data into an unintelligible form. Only an authorised person with a decryption key can decrypt the data to make it useful.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Advanced encryption and decryption systems work in the background without human involvement. It&#8217;s a must-have for organisations that are serious about preventing data breaches.<\/span><\/p>\n<h3><b>Avoid Oral Q&amp;A<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In this age, no call centre should require customers to provide sensitive details about themselves orally. Adopt a dual-tone multi-frequency (DTMF) system that clients can enter PII as text via phone keypads. The system should encrypt messages and deter interception.<\/span><\/p>\n<h3><b>Bypass Rogue Insiders<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">DTMF doesn&#8217;t benefit callers who cannot use the keypad. So how can you prevent rogue insiders from accessing sensitive data about customers? One solution is a cloud-based telephone system that routes confidential information directly to the service provider.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For instance, you can route cardholder data to the Payment Service Provider (PSP) through a secure cloud-based system. The call should be muted to the call centre representative when the customer is providing their information via Automatic Speech Recognition Software (ASR). The data doesn&#8217;t need to enter the call centre.<\/span><\/p>\n<h3><b>Use a VoIP Firewall<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Unprotected VoIP systems can be vulnerable to Telephony Denial-of-Service (TDoS) attacks. TDoS can overwhelm your remote call centre with endless illegitimate calls, preventing customers from reaching your agents.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fortunately, there are firewalls exclusively designed for VoIP connections that can detect and redirect calls flagged as possible threats. They can preempt DDoS attacks aimed to paralyse your call centre. Additionally, looking into <\/span><a href=\"https:\/\/www.ringcentral.com\/gb\/en\/technology\/security.html#ring-off-uk\"><span style=\"font-weight: 400;\">VoIP solutions which provide extra security<\/span><\/a><span style=\"font-weight: 400;\"> measures is also key.\u00a0<\/span><\/p>\n<h3><b>Clean Your IVR<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Interactive voice response (IVR) is a telephony technology in remote call centres that lets businesses and callers interact through automated menus. It facilitates self-service, hence, faster resolution of customer issues. If uncontrolled, it can expose private data to other users.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To avoid accidental exposure of customer information, erase all data from the previous call before availing IVR resources to a new user. Interactions should take place in real-time, when possible, to avoid saving confidential information in hidden areas.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-17444\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-4.jpg\" alt=\"preyproject (4)-335\" width=\"1999\" height=\"1334\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-4.jpg 1999w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-4-300x200.jpg 300w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-4-640x427.jpg 640w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-4-768x513.jpg 768w, \/gb\/en\/blog\/wp-content\/uploads\/2021\/03\/preyproject-4-1536x1025.jpg 1536w\" sizes=\"(max-width: 1999px) 100vw, 1999px\" \/><\/p>\n<h3><b>Run Penetration Tests<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The best way to enhance cybersecurity in your call centre is by looking at your company through the eyes of a cybercriminal. After setting up your physical and logical security controls, conduct a vulnerability assessment to test the reliability of your network security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In-house IT professionals can do it, but <\/span><a href=\"https:\/\/www.bugcrowd.com\/resources\/reports\/the-ultimate-guide-to-penetration-testing\/\"><span style=\"font-weight: 400;\">a consultancy is the best bet to eliminate bias<\/span><\/a><span style=\"font-weight: 400;\">. Seal any discovered loopholes before attackers find and exploit them.<\/span><\/p>\n<h3><b>Keep Learning and Improving<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">No system is entirely secure as cybercriminals keep devising new tactics. Update yourself with the latest cybersecurity practices and be among the first to implement them to stay ahead of cybercriminals.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Wrapping it Up<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Overall, the remote revolution has been a massive change for the entire world. Moving businesses that are traditionally in-office to remote work locations has brought with it a myriad of possible vulnerabilities as well as some great work-life balance.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Creating a company policy for keeping your clients and your employees cybersafe will provide you and your team with added security and peace of mind in an ever-changing world.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Experts project the permanent remote workforce to grow from 16.4 per cent in 2020 to 34.4 per cent in 2021. With more personnel decentralisation, companies will face more cybersecurity challenges. &hellip; <a href=\"\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;Cybersafety for the Remote Revolution &#8211; Keeping Call Centre Workers Cybersafe&#8221;<\/span><\/a><\/p>\n","protected":false},"author":244,"featured_media":17487,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersafety for the Remote Revolution - Keeping Call Centre Workers Cybersafe | RingCentral UK Blog<\/title>\n<meta name=\"description\" content=\"xperts project the permanent remote workforce to grow from 16.4 per cent in 2020 to 34.4 per cent in 2021. With more personnel decentralisation, compa\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersafety for the Remote Revolution - Keeping Call Centre Workers Cybersafe | RingCentral UK Blog","description":"xperts project the permanent remote workforce to grow from 16.4 per cent in 2020 to 34.4 per cent in 2021. With more personnel decentralisation, compa","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":":\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/#article","isPartOf":{"@id":"\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/"},"author":{"name":"RingCentral Team","@id":"\/gb\/en\/blog\/#\/schema\/person\/cc4f043d2b478862a8622c28b0ebd08c"},"headline":"Cybersafety for the Remote Revolution &#8211; Keeping Call Centre Workers Cybersafe","datePublished":"2021-03-26T07:18:27+00:00","dateModified":"2023-01-16T17:25:57+00:00","mainEntityOfPage":{"@id":"\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/"},"wordCount":2161,"commentCount":0,"publisher":{"@id":"\/gb\/en\/blog\/#organization"},"articleSection":["UC - Collaboration"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":[":\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/#respond"]}]},{"@type":"WebPage","@id":"\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/","url":":\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/","name":"Cybersafety for the Remote Revolution - Keeping Call Centre Workers Cybersafe | RingCentral UK Blog","isPartOf":{"@id":"\/gb\/en\/blog\/#website"},"datePublished":"2021-03-26T07:18:27+00:00","dateModified":"2023-01-16T17:25:57+00:00","description":"xperts project the permanent remote workforce to grow from 16.4 per cent in 2020 to 34.4 per cent in 2021. With more personnel decentralisation, compa","breadcrumb":{"@id":":\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":[":\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/"]}]},{"@type":"BreadcrumbList","@id":":\/gb\/en\/blog\/cybersafety-for-the-remote-revolution-keeping-call-centre-workers-cybersafe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"RingCentral Blog","item":"\/gb\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"UC - Collaboration"}]},{"@type":"WebSite","@id":"\/gb\/en\/blog\/#website","url":"\/gb\/en\/blog\/","name":"RingCentral UK Blog","description":"RingCentral News and Tips","publisher":{"@id":"\/gb\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/gb\/en\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"\/gb\/en\/blog\/#organization","name":"RingCentral UK","url":"\/gb\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/","url":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","contentUrl":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","width":1921,"height":416,"caption":"RingCentral UK"},"image":{"@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"\/gb\/en\/blog\/#\/schema\/person\/cc4f043d2b478862a8622c28b0ebd08c","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/person\/image\/","url":"https:\/\/rcbloguk.wpengine.com\/gb\/en\/blog\/wp-content\/plugins\/rc-profile-photo\/images\/default-avatar.png","contentUrl":"https:\/\/rcbloguk.wpengine.com\/gb\/en\/blog\/wp-content\/plugins\/rc-profile-photo\/images\/default-avatar.png","caption":"RingCentral Team"},"url":"\/gb\/en\/blog\/author\/ringcentral-team\/"}]}},"_links":{"self":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/17439"}],"collection":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/users\/244"}],"replies":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/comments?post=17439"}],"version-history":[{"count":0,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/17439\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media\/17487"}],"wp:attachment":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media?parent=17439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/categories?post=17439"},{"taxonomy":"post_tag","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/tags?post=17439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}