{"id":439857,"date":"2022-07-11T20:28:31","date_gmt":"2022-07-12T03:28:31","guid":{"rendered":"https:\/\/www.genesys.com\/blog\/post\/data-security-in-the-cloud-protecting-your-contact-centre"},"modified":"2022-12-15T15:12:29","modified_gmt":"2022-12-15T23:12:29","slug":"data-security-in-the-cloud-protecting-your-contact-centre","status":"publish","type":"blog","link":"https:\/\/www.genesys.com\/en-sg\/blog\/post\/data-security-in-the-cloud-protecting-your-contact-centre","title":{"rendered":"Data Security in the Cloud: Protecting Your Contact Centre"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css=&#8221;.vc_custom_1657598123461{margin-top: 30px !important;}&#8221;][vc_column][vc_column_text]Keeping your customers\u2019 data secure is one of your top priorities. Internal security protection and compliance measures that are less-than-rigorous leave your contact centre vulnerable to a wide range of cyberattacks or data breaches. And those breaches can do irreparable damage to your reputation \u2014 and your bottom line.<\/p>\n<p>According to the Identity Theft Resource Centres<a href=\"https:\/\/www.idtheftcenter.org\/post\/identity-theft-resource-center-2021-annual-data-breach-report-sets-new-record-for-number-of-compromises\/\" target=\"_blank\" rel=\"noopener\"> 2021 Data Breach Report<\/a>, the number of reported US data breaches increased 68% year-over-year in 2021 \u2014 the highest total ever. And those breaches are hurting companies financially. A study by<a href=\"https:\/\/newsroom.ibm.com\/2021-07-28-IBM-Report-Cost-of-a-Data-Breach-Hits-Record-High-During-Pandemic\" target=\"_blank\" rel=\"noopener\"> IBM and the Ponemon Institute<\/a> found the average cost of a data breach in 2021 reached $4.24 million, its highest in 17 years. The study also found that when remote work was implicated in the event, data breaches, on average, cost over $1 million more than non-remote incidents.<\/p>\n<p>Our \u201cnew normal\u201d of a remote or hybrid contact centre workplace likely is here to stay. Contact centres that fail to modernise and protect customer data in this new paradigm with the right technologies remain at risk.<\/p>\n<p>In this blog, we\u2019ll look at some ways a data security breach could negatively affect your business \u2014 and why partnering with the right cloud contact centre technology provider is some of your best protection.<\/p>\n<p><strong>A Damaged Reputation<\/strong><\/p>\n<p>How companies respond to a data breach is important. Optics matter in an age of constant public scrutiny. And one industry might suffer greater brand reputation damage than another.<\/p>\n<p>According to a study conducted by <a href=\"https:\/\/www.varonis.com\/blog\/company-reputation-after-a-data-breach\" target=\"_blank\" rel=\"noopener\">security platform provider Varonis<\/a>, 42% of the 1,000 Americans surveyed would still shop with a retail store after a breach, 17% would use a bank afterward and just 7% would patronise a rideshare service following a data leak.<\/p>\n<p>The survey also found that millennials are less likely to trust businesses after a breach, compared to Baby Boomers and Generation X consumers.<\/p>\n<p><strong>Loss of Consumer Trust<\/strong><\/p>\n<p>Sixty-three percent of consumers believe a <a href=\"https:\/\/www.pingidentity.com\/en\/resources\/content-library\/misc\/3464-2019-consumer-survey-trust-accountability.html\">company is always responsible for protecting its customer data<\/a>. So it\u2019s not surprising consumer trust plummets following a data breach. And that loss of trust could mean more than just a temporary downturn for a company; it could lead to financial ruin. And that same report found that 81% of consumers would stop engaging with a brand online if it experienced a data breach.<\/p>\n<p>Consumers are nearly as likely to blame the company (46%) as they are to blame the hackers (54%) for data breaches. This puts the onus to ensure the data security of the entire operation squarely on your company\u2019s shoulders. Consumers expect you to protect them and their data. And meeting those expectations<a href=\"https:\/\/www.genesys.com\/en-sg\/company\/trust\" rel=\"noopener\"> builds trust<\/a>.<\/p>\n<p><strong>Lawsuits and Fines<\/strong><\/p>\n<p>No company is impervious to data breaches \u2014 not even the largest corporations. At some point, all industry leaders have been subject to some of<a href=\"https:\/\/www.csoonline.com\/article\/3410278\/the-biggest-data-breach-fines-penalties-and-settlements-so-far.html\" target=\"_blank\" rel=\"noopener\"> the biggest, most punitive fines<\/a> in US legislative history because of data breaches.<\/p>\n<p>Regulators are becoming more serious about pursuing, to the full extent of the law, companies who neglect compliance measures and fail to protect consumer data, evinced by the magnitude of recent fines: $124 million for a major hotel chain, $200 million for a large home improvement company, a staggering $575 million for a credit monitoring agency.<\/p>\n<p>This more punitive turn is likely to become the norm. According to the<a href=\"https:\/\/www.natlawreview.com\/article\/2021-year-review-data-breach-and-cybersecurity-litigations\" target=\"_blank\" rel=\"noopener\"> National Law Review<\/a>, \u201c2021 heralded several developments in data breach and cybersecurity litigations that may reshape the privacy landscape in the years to come.\u201d<\/p>\n<p><strong>Financial Headaches<\/strong><\/p>\n<p>While companies can gain customer trust after a breach, the immediate effects take a serious toll on the bottom line. For example, when Target announced a major data breach in 2014, its stock immediately dropped more than 10% \u2014 and it lost 46% of its revenue in the following quarters. All told, the data breach cost a major retailer <a href=\"https:\/\/redriver.com\/security\/target-data-breach\">over $200 million<\/a> of which only $18.5 million was the fine itself.<\/p>\n<p>And breaches also negatively affect stock prices \u2014 in the short and long term. Research on 113 companies that experienced data breaches found their<a href=\"https:\/\/www.centrify.com\/media\/4772757\/ponemon_data_breach_impact_study_uk.pdf\"> average stock prices declined 5%<\/a> immediately following disclosure of the breach. According to Comparitech, stock decline<a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/data-breach-share-price-analysis\/\"> gets progressively worse over time<\/a>, reaching a loss of 15.6% after three years.<\/p>\n<p><strong>Securing Your Future with the Right Contact Centre Technology Partner<\/strong><\/p>\n<p>Just as innovative technologies emerge and change how we work and live, so do the tools and tactics needed to secure those technologies. Security technology moves fast; failing to adapt with the right solutions \u2014 or neglecting new technologies \u2014\u00a0 leaves your contact centre vulnerable to costly data breaches.<\/p>\n<p>As a series of new security threats infiltrate business operations, many companies are ill-fitted to tackle even basic security challenges. Some are saddled with legacy, on-premises call centre software \u2014 and many lack the resources for a much-needed tech overhaul. In fact, <a href=\"https:\/\/unctad.org\/page\/data-protection-and-privacy-legislation-worldwide\" target=\"_blank\" rel=\"noopener\">137 out of 194 countries have put legislation in place to secure the protection of data and privacy<\/a>.<\/p>\n<p>Partnering with a cloud service provider that\u2019s better positioned and equipped to offer modern, digital contact centre solutions and know-how that enable them to meet higher cloud security standards and leverage the power of data to improve customer and employee experiences.<\/p>\n<p>With their seamless ability to deliver secure cloud operations, data encryption at rest and in transit, full regulatory compliance, transparency in data processing and intentions, and an unwavering commitment to data privacy, the right technology partner should be a fundamental cornerstone to your contact centre security.<\/p>\n<p>Hackers are getting more savvy every day. Choosing the <a href=\"https:\/\/www.genesys.com\/en-sg\/cloud-platform\" target=\"_blank\" rel=\"noopener\">right cloud contact centre technology partner<\/a> will ensure you stay one step ahead of them to keep your data secure \u2014 and maintain your customers\u2019 confidence in you.[\/vc_column_text]<a class=\"component card w-100 bgc-navy vertical text-start nomedia  vc_custom_1657598369104  \" href=\"https:\/\/www.genesys.com\/en-sg\/article\/7-security-promises-your-contact-centre-vendor-should-keep\" target=\"\" rel=\"\" ><div class=\"card-body\"><h4>Learn how to choose a partner to help you meet your cloud security challenges now and into the future.<\/h4>\n<\/div><div class=\"card-footer text-end\"><div class=\"btn-container \"><div class=\"small mt-0 chevron arrow arrow-primary \" href=\"#\" target=\"\" rel=\"\">Read the article<\/div><\/div><\/div><\/a>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1657598123461{margin-top: 30px !important;}&#8221;][vc_column][vc_column_text]Keeping your customers\u2019 data secure is one of your top priorities. Internal security protection and compliance measures that are less-than-rigorous leave your contact centre vulnerable to a wide range of cyberattacks or data breaches. And those breaches can do irreparable damage to your reputation \u2014 and your bottom line. According to the [&hellip;]<\/p>\n","protected":false},"author":260,"featured_media":437412,"template":"","tax_priority":[],"tax_blogtype":[17756],"tax_blogcategory":[13117],"tax_contenttheme":[14902,14904],"tax_bundle":[],"tax_contenttheme2":[],"tax_capability_sitewide":[],"tax_products_programs":[],"tax_buying_job":[16633,16651],"tax_buyer_persona":[16887],"tax_sector":[],"tax_segment":[17079,17104,17125],"class_list":["post-439857","blog","type-blog","status-publish","has-post-thumbnail","hentry","tax_blogtype-genesys-en-sg","tax_blogcategory-cloud-en-sg","tax_contenttheme-improve-customer-experience-en-sg","tax_contenttheme-level-up-your-technology-en-sg","tax_buying_job-job-1-problem-identification-en-sg","tax_buying_job-job-2-solution-exploration-en-sg","tax_buyer_persona-business-en-sg","tax_segment-enterprise-en-sg","tax_segment-midsized-en-sg","tax_segment-smb-en-sg"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/blog\/439857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/users\/260"}],"version-history":[{"count":4,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/blog\/439857\/revisions"}],"predecessor-version":[{"id":461423,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/blog\/439857\/revisions\/461423"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/media\/437412"}],"wp:attachment":[{"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/media?parent=439857"}],"wp:term":[{"taxonomy":"tax_priority","embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/tax_priority?post=439857"},{"taxonomy":"tax_blogtype","embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/tax_blogtype?post=439857"},{"taxonomy":"tax_blogcategory","embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/tax_blogcategory?post=439857"},{"taxonomy":"tax_contenttheme","embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/tax_contenttheme?post=439857"},{"taxonomy":"tax_bundle","embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/tax_bundle?post=439857"},{"taxonomy":"tax_contenttheme2","embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/tax_contenttheme2?post=439857"},{"taxonomy":"tax_capability_sitewide","embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/tax_capability_sitewide?post=439857"},{"taxonomy":"tax_products_programs","embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/tax_products_programs?post=439857"},{"taxonomy":"tax_buying_job","embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/tax_buying_job?post=439857"},{"taxonomy":"tax_buyer_persona","embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/tax_buyer_persona?post=439857"},{"taxonomy":"tax_sector","embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/tax_sector?post=439857"},{"taxonomy":"tax_segment","embeddable":true,"href":"https:\/\/www.genesys.com\/en-sg\/wp-json\/wp\/v2\/tax_segment?post=439857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}