Can Your Organization Balance Content Security with Customer Excellence?

By

Today, everything is digitized, from banking and social media to more avant-garde cases like the television or the car you buy. This makes security a dicey issue, what with the majority of end users being unaware of the myriad of things that can happen each and every time a laptop is opened or a smartphone is powered up. Content security is a must for enterprises that are looking to stay out of the crossfire—the kind that Target recently encountered and made headlines for—but concrete security processes can also throw a wrench into achieving a seamless customer experience. Too tightly restricted processes can hinder productivity on the customer’s end.

So, how can enterprises strike a balance of ensuring that their data is protected and that their customers are satisfied? That was the topic of the today’s panel session, “Why Content Security is Critical to User Experience,” which took place today during ITEXPO 2014, happening now through August 14 at the Rio in Las Vegas.

Panelists included: Adam Boone, Certes Networks; Erik Knight, SimpleWan; Mike McAlpen, 8x8, Inc. TMC’s own Eric Lebowitz serving as moderator.

“To protect content or consider content to be secure, you must protect its confidentiality, its integrity and its availability,” Boone said, nicknaming this combination “CIA.”Some major enterprises will simply turn off their security protocols because they found it negatively impacted their performance. In other words, they would rather put their organization at risk for being attacked than jeopardize the customer experience in any way. It’s a tricky balance to strike, but it’s a necessary one.

Knight added that most companies do actually have the correct policies in place but somehow, something goes awry along the way. He revisited Target as a prime example. “It was three months before somebody even noticed something was wrong,” he says. “They were in the hands of the attackers for three months and it was six months down the line until customers were getting new credit cards.” Simply put: the company got hit too hard to wait so long to begin countering the horrendous effects of the breach. Therefore, a huge piece in solving this security debacle lies in how long it takes organizations to detect these issues—rapidity is the name of the game.

Additionally, a contributing factor lies in too many organizations resting on their laurels: “A lot of organizations stick to what they know,” Knight said, “they’re stuck in their own ways and they don’t want to adapt—that’s when security problems emerge.”

So, what can your business do to ensure optimum security and customer loyalty? Do not let the prospect of customer churn or dissatisfaction deter you from taking all of the necessary security precautions. And, if something does happen, be open, transparent and honest with your customers—it will help significantly streamline the resolution process at the end of the day, as your customers will be working with you as partners, as opposed to victims of theft or fraud. 




Edited by Maurice Nagle

Managing Content Producer

SHARE THIS ARTICLE
Related Articles

Learn about Benefits of Blogging for Small Business

By: Special Guest    6/26/2019

Blogging is one of the effective ways to promote your small business. It helps businesses in developing their brand awareness among the people, by pro…

Read More

Why the Use of VPNs is Becoming so Popular

By: Special Guest    6/25/2019

In Australia in 2014, around 200,000 people were said to be accessing Netflix. Not a huge number, you'll agree, but it represent about 0.8% of Austral…

Read More

5 Trends that are Reshaping the Future of Project Management

By: Special Guest    6/18/2019

Creating a project plan and executing it is challenging enough. This has led to the rise of a number of tools to make the job easier. The project mana…

Read More

Samsung's Bixby Creating New AI-driven Engagement Opportunities

By: Erik Linask    6/14/2019

Everywhere you look these days, voice is becoming the dominant enablement medium. Whether in a car, at home, in the office, or anywhere else, voice is…

Read More

The Most Important Features of Any Security Policy

By: Special Guest    5/29/2019

Advances in technology mean that a cybersecurity policy is as important as a physical security policy. Companies are now more vulnerable to attacks on…

Read More