emite’s Dedication to Cybersecurity
“ One thing we can do is provide our customers and the markets we serve with the steps we are taking as a global software creator and distributor to better protect our own software, customers, and partners from the risks of cyber attacks. “
– – –
Trusting emite As a Part of Your CX Technology Stack
Today’s cyber landscape is being tested more than ever in terms of security and trust. Security teams, risk management teams, IT leaders, and the C-Suite are thinking about supply chain security as a direct impact to their brand reputation and revenue vs a line item on budget delivered from a CISO or IT Director.
We have gotten to a place where globally, it is not a matter of ‘if’ but ‘when’ your company will become victim of a cyber attack – either directly or via your supply chain – and brands cannot risk the reputational damage and costs of a data breach.
One thing we can do is provide our customers and the markets we serve with the steps we are taking as a global software creator and distributor to better protect our own software, customers, and partners from the risks of cyber attacks.
Why Trust emite & The Steps We Are Taking to Protect Our Customers
- Sovereign Capability & The Five Eyes – Prophecy International is headquartered in Australia and all regional offices are located in countries that are a part of the Five Eyes – an intelligence alliance comprising of Australia, Canada, New Zealand, the United Kingdom, and the United States. Being a part of this community means we have common values and trust levels.
- Regular Pen Testing – emite does regular penetration testing on our software, which is crucial to security. Pen testing helps us better understand how to handle any type of break-in from a malicious entity and also identify and remedy any vulnerabilities.
- We take security seriously – emite is ISO27001 certified with our development environment. The issuance of this certificate reaffirms our commitment to internal control and data protection.
Things to do right now that help mitigate a cyber breach or attack
- Evaluate your cyber vendors for vulnerabilities and geography to assess the stability as a supplier to your business. Essentially, you should know where your vendors are headquartered and where key personnel (including developers) are located.
- Mitigate concentration risk. When companies invest in a single vendor to manage multiple parts of their business (contact center data, analytics, workflows, etc…), there is a tremendous impact on the business in the event that single vendor is breached, has an unplanned outage, or if your simply want to migrate platforms – you lose your negotiation power if they hold all your data. Having emite in your tech stack not only provides a reliable way to validate your data, but it provides a reliable back-up plan to ensure your valuable contact center data is still being captured if your contact center platform partner is breached or goes down.
- Make sure your risk assessments are up to date and you know all your critical systems and data locations.
- Patch, patch, patch. Make sure you are patching all critical systems. Many system hacks are from poor cyber hygiene and lack of regular system and application patching.
- Make sure all of your backups are working, kept secure, and test them regularly. If things go bad from a zero day, some compromise or corruption, you need to know you can recover the systems and data quickly.
- Make sure you are logging from everything. Know all the entry and exit points on your network and systems and make sure you have the forensics to know what happened if things go bad. Make sure you are reviewing this data daily so you know what is normal and what is not. Early detection is key to thwarting an attacker.
Reliable CX Data
Sovereign Capability
Global Commitment to Security