1. Protect Against Social Engineering
Social engineering attacks are the easiest way for an attacker to compromise a contact center and get a foothold in a government network. Whether it’s someone pretending to be a boss, a crying coworker or an irate customer, people are people, and everyone wants to be helpful, especially when that’s their job.
The standard advice against social engineering is training, but if that worked perfectly, social engineering attacks wouldn’t be so famous for their rate of success. Instead, IT teams must go beyond basic training to more intensive approaches. Launching social engineering attacks and penetration tests against agency staff may sound mean and a bit unfair, but people learn in one of two ways: repetition or dramatic effect.
When social engineering is successful, the silver lining to an awful incident is that it becomes a learning moment for everyone. Turn the unfortunate example into a compelling story and people will listen and learn from it, even if it means slight embarrassment for the agency or executive who fell victim to the attack. Examples, real ones, drive the point home in a way that a hypothetical never can.
READ MORE: Why a strong cyber resilience strategy is critical.
2. Protect Against Phishing
Training is great, but throwing some technology at the problem of contact center security is also a big help. Contact center workstations must be locked down, and personal computers should be avoided. If people are working from home, use desktop virtualization tools to deliver applications to contact center staff while completely blocking any personal applications between client and virtual desktop windows.
Contact center networks also need hefty protections. This is where unified threat management or next-generation firewalls’ URL filtering, reputation-based IP rules, anti-malware filtering and built-in intrusion prevention system all come into play. Locking down the desktop with endpoint protection suites and filtering email is just a starting point. Adding additional layers, even if they seem redundant, helps match security investment to organizational risk.
Zero-trust zealots may not favor this defense-in-depth approach, but there’s good justification for it: These are staff members who interact directly with the public and who we know are primary targets for attack. Extra protection is appropriate for contact center team members.