Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/28/2010
05:07 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Teleperformance Launches Fraud Risk Assessment Solution

Service to help identify and quantify the business impact of fraud risks within many phases of a call center agent's work

SALT LAKE CITY, June 28 /PRNewswire/ -- Teleperformance, the world's leading provider of outsourced CRM and contact center services, today announced the launch of its Teleperformance Fraud Risk Assessment Solution, a new service intended to help identify and quantify the business impact of fraud risks within many phases of a call center agent's work. It reviews processes, applications, daily monitoring and reporting activities to provide a comprehensive assessment of risks. The primary goal of the Fraud Risk Assessment is to identify detectable vulnerabilities so that they can be removed or to implement early detection indicators for vulnerabilities that cannot be removed.

Teleperformance leads the industry with world-class, award-winning security measures in contact center information defense. Teleperformance Fraud Risk Assessment relies on knowledge of fraud trends, common and known vulnerabilities among client applications, and some of the ways an agent could circumvent controls within an application or process.

The Fraud Risk Assessment Solution includes reviewing a client's past incidents of fraud prior to the program moving to Teleperformance, application vulnerabilities, environmental controls, recruiting, training goals, operation expectations and compliance and regulatory requirements. Benefits of the discovery can:

-- Reduce many fraud risks -- Provide early warning indicators when the risk cannot be eliminated -- Reduce the risk of fraud and data theft -- Protect a company's brand from a public data breach -- Build a security-conscious culture -- Reinforce customer trust and reduce churn -- Uncover gaps that may put intellectual property at risk -- Inform and improve internal compliance efforts -- Improve security and efficiency of data flows -- Reduce the risk of regulatory action, fines and lawsuits

Teleperformance's team of security professionals who conduct the Fraud Risk Assessments have extensive training and hold the following credentials:

-- CISSP Certified Information Systems Security Professional www.isc2.org -- CFA Certified Fraud Examiner www.acfe.com

"Preventing fraud today is more complicated than ever before," said Dominic Dato, executive chairman of Teleperformance USA. "Organized crime has become incredibly sophisticated, with multiple ways of penetrating the contact center, committing fraud and identity theft. The damage to a company's bottom line as well as brand can be staggering. The Teleperformance Fraud Risk Assessment is a critical first step to mitigating the monetary risk and protecting the brand."

"We're proud to be the leader in contact center security prevention and thrilled to be offering our Clients this superior new program," adds Brent Welch, CEO of Teleperformance USA. "Teleperformance Fraud Risk Assessment offers an unparalleled approach to fraud prevention, leveraging the world's best talent, technology and processes."

"The Fraud Risk Assessment is another example demonstrating Teleperformance's commitment to offer our clients a program that is typically significantly less at risk than before the Fraud Risk Assessment," said Bruce Wignall, Chief Information Security Officer Teleperformance Group.

The Teleperformance Fraud Risk Assessment is part of a four-phase security-enhancing program. Proceeding phases include intensive employee selection, thorough employee education, and program launch with anti-fraud controls.

About Teleperformance

Teleperformance (NYSE Euronext Paris: FR 0000051807), the world's leading provider of outsourced CRM and contact center services, has been serving companies around the world by developing and managing customer acquisition, customer care, technical support and debt collection programs on their behalf. In 2009, the Teleperformance Group achieved euro 1.848 billion revenues (US$2.6 billion - average exchange rate at December 31, 2009: euro 1 = US$1.39). The Group operates about 83,000 computerized workstations, with more than 100,000 employees (Full-Time Equivalents) across 270 contact centers in 50 countries and conducts programs in more than 66 different languages and dialects on behalf of major international companies operating in various industries. www.teleperformance.com.

CONTACT: Elizabeth Gordon 1-408-840-9883

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25159
PUBLISHED: 2020-11-24
499ES EtherNet/IP (ENIP) Adaptor Source Code is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution.
CVE-2020-25654
PUBLISHED: 2020-11-24
An ACL bypass flaw was found in pacemaker before 1.1.24-rc1 and 2.0.5-rc2. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went throu...
CVE-2020-28329
PUBLISHED: 2020-11-24
Barco wePresent WiPG-1600W firmware includes a hardcoded API account and password that is discoverable by inspecting the firmware image. A malicious actor could use this password to access authenticated, administrative functions in the API. Affected Version(s): 2.5.1.8, 2.5.0.25, 2.5.0.24, 2.4.1.19.
CVE-2020-29053
PUBLISHED: 2020-11-24
HRSALE 2.0.0 allows XSS via the admin/project/projects_calendar set_date parameter.
CVE-2020-25640
PUBLISHED: 2020-11-24
A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.