It’s not every day the United States National Security Agency (NSA) leads you through a step-by-step guide on how to hack. When they talk about these kinds of things, it’s important to listen – if they are sharing, the knowledge isn’t secret, and hackers are likely running the playbook with equal proficiency.
At a recent Usenix’s Enigma conference, Rob Joyce, head of Tailored Access Operations (TAO), the elite hacking division of the NSA, gave a rousing speech about the six-stage process of breaking into your enterprise.
It’s scary, but the how-to-hack guide for the NSA isn’t as cryptic as you’d expect. Many companies have wide open doors with proverbial welcome signs for unwanted guests. Locking down the obvious openings is a step many companies aren’t even bothering with. This lackadaisical attitude toward security is especially concerning in today’s age of global security threats.
In his keynote, Joyce explained that companies need to pay particular attention to cloud service providers. Handing them data is also handing over keys to that data’s security. Due diligence is especially important – not a given – when selecting cloud vendors.
When we started NewVoiceMedia, security was a top priority. To many customers the cloud was this new ethereal thing that, though full of potential, was shrouded with unknowns. We knew that we needed to build trust and protect our customers' data; so we set out to make our service the MOST secure of its kind.
For many organizations, security is still the final hurdle that needs to be cleared before business systems are moved to the cloud. At NewVoiceMedia security of customer data is of critical importance to the operation of our contact center platform.
To date, NewVoiceMedia is the only cloud contact center provider that is ISO27001 certified and has Level 1 PCI DSS compliance.
In layman’s terms, we locked it down – like the Google/Amazon level of lock down.Find out more about why we started NewVoiceMedia and our six rules of the cloud.