Good Data Security Begins with Users

Most people understand the importance of data security, but many don’t appreciate the critical role they play in protecting vital information.      

These five steps will go a long way.

  1. Make sure user names and passwords are not being shared with family or friends … or posted on sticky notes on monitors!
  2. Require strong passwords:
    1. At least eight characters
    2. Capital and lower case letters
    3. Numbers
    4. Special characters
    5. Passwords should not include the user’s name, numbers or letters in sequence (e.g., 12345, abcde), etc.
  3. Require passwords to be changed on a regular basis; e.g., every 60 days
  4. Establish a two-step authentication process where appropriate

Limit data access only to the employees who need it, by segmenting servers and requiring appropriate credentials.

Global UC Systems: Transforming Communication for Modern Businesses

In our globally connected modern world, expanding a business internationally brings a host of exciting opportunities, but also introduces complex...

Read More

1 min read

Why Training Must Be Built into Your Deployment Plan (Not Added on Later)

Deployment.That magical, stressful period of an implementation where the rubber hits the road.You’ve done all you can to make this moment as smooth...

Read More

Unlocking the Power of Conversational and Agentic AI in Contact Centers

Artificial intelligence (AI) is rapidly changing the game for contact centers. Fromvirtual agents handling routine customer questions and agent...

Read More