Can Your Organization Balance Content Security with Customer Excellence?

By

Today, everything is digitized, from banking and social media to more avant-garde cases like the television or the car you buy. This makes security a dicey issue, what with the majority of end users being unaware of the myriad of things that can happen each and every time a laptop is opened or a smartphone is powered up. Content security is a must for enterprises that are looking to stay out of the crossfire—the kind that Target recently encountered and made headlines for—but concrete security processes can also throw a wrench into achieving a seamless customer experience. Too tightly restricted processes can hinder productivity on the customer’s end.

So, how can enterprises strike a balance of ensuring that their data is protected and that their customers are satisfied? That was the topic of the today’s panel session, “Why Content Security is Critical to User Experience,” which took place today during ITEXPO 2014, happening now through August 14 at the Rio in Las Vegas.

Panelists included: Adam Boone, Certes Networks; Erik Knight, SimpleWan; Mike McAlpen, 8x8, Inc. TMC’s own Eric Lebowitz serving as moderator.

“To protect content or consider content to be secure, you must protect its confidentiality, its integrity and its availability,” Boone said, nicknaming this combination “CIA.”Some major enterprises will simply turn off their security protocols because they found it negatively impacted their performance. In other words, they would rather put their organization at risk for being attacked than jeopardize the customer experience in any way. It’s a tricky balance to strike, but it’s a necessary one.

Knight added that most companies do actually have the correct policies in place but somehow, something goes awry along the way. He revisited Target as a prime example. “It was three months before somebody even noticed something was wrong,” he says. “They were in the hands of the attackers for three months and it was six months down the line until customers were getting new credit cards.” Simply put: the company got hit too hard to wait so long to begin countering the horrendous effects of the breach. Therefore, a huge piece in solving this security debacle lies in how long it takes organizations to detect these issues—rapidity is the name of the game.

Additionally, a contributing factor lies in too many organizations resting on their laurels: “A lot of organizations stick to what they know,” Knight said, “they’re stuck in their own ways and they don’t want to adapt—that’s when security problems emerge.”

So, what can your business do to ensure optimum security and customer loyalty? Do not let the prospect of customer churn or dissatisfaction deter you from taking all of the necessary security precautions. And, if something does happen, be open, transparent and honest with your customers—it will help significantly streamline the resolution process at the end of the day, as your customers will be working with you as partners, as opposed to victims of theft or fraud. 




Edited by Maurice Nagle

Managing Content Producer

SHARE THIS ARTICLE
Related Articles

Generative AI Expo Launches as Newest Event in the ITEXPO #TECHSUPERSHOW

By: TMCnet News    1/27/2023

Generative AI Expo is the starting point for you research the countless potentially game-changing pillars that may solidify generative AI as THE indis…

Read More

Can Machine Learning Models Help Fight Cybercrime?

By: Contributing Writer    1/25/2023

A machine learning model is a mathematical representation of a system or process that is trained to make predictions or decisions based on data. It is…

Read More

What Are the Risks of Continuous Deployment?

By: Contributing Writer    1/25/2023

Continuous deployment (CD) is a software development practice where code changes are automatically built, tested, and deployed to production without h…

Read More

The Benefits of Implementing a Master Data Management Platform

By: Contributing Writer    1/19/2023

A master data management (MDM) platform is invaluable for any business. By centralizing data into one cohesive system, companies can improve their ope…

Read More

What Is an SBOM and Why Is It Critical for Software Compliance

By: Contributing Writer    1/17/2023

An SBOM, or software bill of materials, is a list of all the components and dependencies that make up a piece of software. This can include things lik…

Read More