Isaac Kohen

Contact Centers Take On Remote Employee Management Challenges

It has been a year since COVID-19 hit the Western world, bringing most of our in-person interactions to a grinding halt. As face-to-face commerce became far less tenable at the old brick-and-mortars, more of our businesses moved to the virtual. With companies no longer...

Four Tips for Call Centers to Embrace Long-Term Remote Work Productively

After months of wide-spread lockdowns in response to the novel Coronavirus, many countries and companies are beginning to lift restrictions.  As this process begins, it’s clear that many things will look different than before the pandemic. This is especially true for the workplace, where many...

Time to Take 10: Is Your Business Ready for CCPA?

Stay compliant with CCPA with these top 10 critical factors While most are well on their way to making good on their new year's resolutions, many CEOs and CTOs are anxiously devising strategies and tactics to stay compliant with the California Consumer Privacy Act...

Five Ways to Improve Customer Service Today, Tomorrow, and For Years to Come

The modern business landscape is more competitive than ever before. Traditional differentiators for brick-and-mortar shops including seasonal discounts, storefront accessibility, or product quality are less relevant as everything from price match guarantees to ubiquitous access to quality products via the internet have leveled the...

10 Tips for Protecting Your Company’s Data Against Insider Threats in 2019

Perhaps because of their incredible scope or their shocking prevalence, data breaches are creating a lot of buzz right now. It seems that a new event happens every week, and even though companies rightly fear an attack from an external source, internal threats pose...

October Is Cybersecurity Awareness Month: Time to Revisit Your Data Loss Prevention Strategy [Infographic]

As we are quickly approaching the end of 2018, the prevalence and pervasiveness of data breaches are at an all-time high. As Wired reported earlier this year, “Corporate security isn’t getting better fast enough, critical infrastructure security hangs in the balance, and state-backed hackers...

5 Breakthrough Technologies to Combat Insider Threats in 2018

Across all companies and departments, insider threats are on the rise. When companies traditionally look outwards for security threats, they should be looking inwards towards their most trusted asset, employees. Employees have access to sensitive information, especially in customer service. Employees can have...

Data Breach Cost: When You Lose Your Customers

While the average total cost of a data breach may be trending downward, the average cost of $3.62 million remains a hefty price tag. Data breach cost is made up of several factors, including engaging experts, providing hotline support, offering free credit monitoring, and...

Protect Your Customers’ Data: Steps to Take to Beat the Insider Threat in 2018

Hackers get the headlines, but a data breach is more likely to originate inside your own office walls, all too frequently in customer service departments. Errors, negligence and malicious intent by employees are the leading causes of security incidents but remain the least reported. Why...

7 Ways Employees Benefit from Employee Monitoring

Donuts can have sprinkles, be jelly-filled or plain. This is usually the three criteria we ponder on our way to a weekly employee staff meeting. It’s the highlight, because usually the meeting is filled with fancy deadlines, project updates and awkward manager jokes. These...

PCI Data Breaches: Keeping High-Risk Employees at Bay

PCI (Payment Card Industry) breaches are everywhere, and they’re not necessarily due to external hackers. Many of the top breaches in credit card information have occurred because of internal data leaks due to employee negligence, or malicious insider jobs. Whatever the cause – the damages...

Are Insider Threats in Your Call Center? Say Good-Bye to Costly Data Breaches with...

Sage: An odious breach On August 15, 2016, an unauthorized user logged into the internal database of Sage, a successful UK based accounting software firm, valued at £1.3bn. The technological breach compromised the personal banking details of employees in over 300 accounting firms across the...

New Posts