
Seven Essential Guidelines For Creating A Secure CX Work-At-Home Environment
by Wayne White, Chief Information Officer and Art Burt, Chief Information Security Officer
In early 2020, conventional wisdom across the BPO industry predicted that CX was going digital. As a result, companies would largely return to in-house customer support thanks to a sweeping decrease in the need for customer contact requiring human interaction. However, when COVID hit, we all learned differently. Not only did it become impossible to staff internal CX operations in a timely manner, but even as the customer experience went digital in a big way, much more guidance and personal interaction were needed. Many outsourcing brands which already had at-home footprints found it challenging to ramp up to meet demand. However, clients did expect their CX partners to do so — and quickly.
Focus on People, Process, and Technology
Those first few months of the pandemic were a sprint to get agents up and running at home. Some organizations, especially those with significant at-home operations, made the decision to scale existing solutions to accommodate the growth in capacity. Others like ResultsCX built a new platform from scratch, benefiting from the ability to incorporate far stronger security measures in a brand-new system. That’s when many organizations learned that there are three make-or-break components of home-based support, and security is a big part of all of them: people, process, and technology. To start, you need people who understand how to work in a virtual environment. Then, operating processes must be completely shifted and adapted to match a virtual environment; security considerations must apply to every altered process, as well as to every change in the technology involved which, in many cases, needed to be completely re-architected.
Think about the former contact center environment, where managing core security practices was systematized until it was practically effortless; everything, from a clean desktop to what showed up on agent PCs, was constantly monitored on the production floor. In the new world, every PC sitting in a home is in essence a contact center, with its own network that must be kept secure. Now, every function needs to feed into a single secure platform. Systems for training, coaching, and monitoring have had to be reimagined and scaled in ways that had never been done before. Those who skipped this necessary step opened themselves up to security risks, as well as network penetration and hacking.
Managing all these networks also requires managing the increased risks, whether data leaks, privacy breaches, increased credit card fraud, or other serious threats. In many cases, clients used third parties as technology partners for going to work-at-home, which means BPO companies had to integrate with many more partners. In essence, the security threat quintupled overnight.
Helping Clients Handle Security
Having established a strong security stance involves the commitment to security measures at the highest level. It also means that you apply strict controls to your systems and processes and limit access whenever and wherever necessary. A beneficial effect is that you become a resource for your clients. Several times a week, ResultsCX holds security reviews with our clients where we examine their security configurations and offer expert guidance on implementing additional security and compliance best practices.

Many clients realize that our daily diligence with managing security across multiple industries makes us a source of knowledge on new or unexpected threats, as well as trustworthy advisors on steps to take and tools to implement. Recently, a client reached out to our Information Security team with questions about adopting a new cloud ACD platform. Five years ago, such outreach by our clients was almost unheard of. Typically in the past, a client led the charge when it came to security requirements. Now, they have seen our success at maintaining a secure environment and want our advice on how to always be prepared for the inevitable attacks of hackers, phishing, and other attempts to breach system protections.
Web Log-In Access and VPN — What Can Go Wrong
One way organizations accommodated their new remote workforces was to simply allow agents to access applications with web passwords and logins from home, without taking into consideration that this could now involve thousands of agents across multiple vendors. In many instances, there was no way to monitor access, which opened up clients to epic levels of fraud. In a situation like this, one to five percent of agents are likely to do something inappropriate or potentially even break client, industry, state, or federal regulations. Once system access was opened up on the web, hackers across the globe were eager to take advantage of limited ability to block their access.
Many organizations entered the work-at-home era with VPN systems that supported standard general and administrative staff, but these VPNs are not designed for working with customers and in patient accounts. Many of the CRMs and primary software tools weren’t even reconfigured for work-at-home. This meant an employee could work on a VPN for a while, then log off to spend personal time on the internet. If the employee accidentally downloaded a virus, it now had an infection path straight into the company network the next time that employee used the VPN for system access.
During the transition to widespread working from home, large BPO providers have been hit by ransomware and brought down by malware left and right. Almost without exception, these attacks entered through technology the business already used and assumed would scale effectively. What had been thought to be a secure, stable platform really was a stable, but not universally secure platform. The vulnerability posed by VPN on home PCs was not recognized; bad actors caught on early and quickly seized on the opportunity.
A Fundamental Focus on Security
Building a new platform from scratch allows you to focus on security at a fundamental level. Even end users become part of the security team, watching for indications that an interaction or transaction isn’t legitimate. At ResultsCX, security is at the core of everything we have built. For example, we were almost completely launched on Windows Virtual Desktop (WVD) 1.0. for our at-home agent interface when security considerations gave us pause. Ultimately, our choice was to leapfrog to a higher level of security effectiveness. We instead chose to work directly with Microsoft as a strategic development partner to build out our own platform on WVD 2.0. The collaborative build with WVD, now known as Azure Virtual Desktop, was so robust that it has taken on a life of its own. In this same vein, we’ve also realized the value in bringing on a certified chief information security officer into decisions that affect processes and technology. Security is always the first consideration now whenever changes are planned.

Seven Essential Guidelines for Creating a Secure CX Work-at-Home Environment
ResultsCX has successfully created a secure virtual CX environment, earning a near-perfect 800 score from BitSight and the number one ranking among our competitors for more than 20 months running. Underpinning this track record are the following guidelines that can help other CX providers who hope to follow in our footsteps.
- Tighten up overall enterprise security and permissions. Look at the technology layers you’ve built out and ensure each one is rock solid. Every new tool builds on this foundation, and existing problems will be magnified when you add an at-home workforce to the mix. A crack in
the foundation can quickly result in tens or hundreds of thousands of people experiencing the same issue or vulnerability. - Stop trying to balance security against openness and communication. Communication tools can create significant security risks. Help employees figure out how to connect, but securely.
- Make security the very beginning of every conversation. Discuss security first before you deploy an individual tool, and again with each layer that you build out.
- Stop thinking you need to save all that data. Large amounts of saved data can be a massive source of threat. Lower risks by removing any non-essential data. If you don’t save data on a widespread basis, you are a less interesting target for hackers. Conduct an overall review of your data retention and find ways to limit it.
- Examine every potential risk point in your service environment. When it comes to the systems that support your work environment, know which are absolutely required for operations. Everything else needs to be eliminated to make your operations far more secure.
- Undergo regular third-party risk assessments. Find an outside company to regularly assess risk on your actual platform. ResultsCX also performs risk assessments for multiple clients, looking at their technology to find holes in it. Four eyes are always better than two when assessing the security of your base infrastructure, especially when it comes to at-home infrastructure.
- Make security a mandatory employee responsibility. All employees need to know their obligations when it comes to maintaining security. If you can’t get buy-in from the whole company, you’re always going to have issues. Backing the commitment to security is a decision that begins in the C-Suite decision and extends all the way to frontline employees.
A common misconception in many organizations is that if they lock everything down, they can’t do business. That’s not true. You can restrict access, follow stringent security practices, achieve stability, and still operate successfully as a company. But inevitably, companies that try to negotiate on security practices fall prey to the same mistake. They build their solutions and only then try to apply security. Making security the first consideration when building your technology stack is the key to successful scaling and shifting. It’s an essential approach that can no longer be treated as optional.
Finally, choose partners who are every bit as security-conscious as you are. If you’re dealing with a partner who has a low security rating, ask yourself why you are doing business with them. With the interconnectedness of the world, having a vendor that doesn’t take security at least as seriously as you do increases your vulnerability regardless of your practices. We all must operate on the assumption that we will get attacked at some point, and our security systems need to be as strong and prepared and possible.
Wayne White |
About the Author:Wayne leads all information technology functions for ResultsCX. He brings a broad spectrum of experience from more than 25 years in technology. Wayne’s core areas of expertise include the development of new IP and network designs, processes, products, and tools to enhance business solutions and client offerings. |
|
Arthur Burt |
About the Author:Arthur leads Security & Compliance for ResultsCX and is a proven high-level manager of security teams and programs. He has 30 years of BPO experience that includes 20 years in IT leadership as IT Chief of Staff, CISO, and Solutions Architect Team Leader, in support of 50K+ employees and 300+ clients. |

For more information, visit: ResultsCX
Go Back to All Articles. Have a story idea? Submit to [email protected].
Want to get this publication in your inbox? Subscribe here!
The Rise of Multimodal Customer Experience: Are We Moving Too Fast?Omnichannel was promised as the solution to a fragmented customer journey. While it delivered in many ways a new paradigm is taking shape, one defined by multimodal experiences powered by AI, automation, and real-time context. Customers can now move fluidly between voice, chat, video, and digital channels, often without a visible transition. For some, this represents the ideal journey. For others, it can feel as though the human element of customer care is slipping away. As organizations race to innovate, many are unintentionally creating gaps, not just between channels, but between themselves and key segments of their customer base. With varying levels of digital fluency and generational differences, and varying expectations, a one-size-fits-all approach to CX no longer scales. So, the question becomes: In our pursuit of the future, are we leaving parts of our customer base behind? In this candid and forward-looking discussion, CX leaders will explore:
|
CX Livewire: Consumer Voices, Real-Time ReactionsCustomer expectations are constantly evolving, and understanding how consumers perceive service, support channels, and emerging technologies is critical for shaping effective CX strategies. In this fast-paced and interactive session, panelists will explore key insights from Execs In The Know’s latest research findings, capturing the perspectives and expectations of CX leaders and consumers. Throughout the discussion, panelists will react to both the research findings and live polling of the CRS audience, creating a dynamic comparison between what consumers say they want and how organizations are currently approaching service delivery. These real-time insights will allow attendees to benchmark their own thinking against the room, while panelists share practical perspectives from inside their organizations on how they interpret, and respond to, shifting consumer expectations. Expect candid reactions, engaging audience participation, and thought-provoking contrasts between consumer sentiment and operational reality. This high-energy session is designed to spark conversation, challenge assumptions, and highlight where CX leaders may need to adapt in order to meet the evolving demands of their customers. |
Agent-Facing AI for CX: Through the Eyes of the AgentFor decades, contact center agents have been expected to act as human search engines navigating complex knowledge bases, policy documents, and fragmented systems to find the right answer for customers. But the emergence of agent-facing AI is beginning to shift that paradigm. Instead of simply retrieving information, modern AI tools can now interpret context, surface relevant guidance, and recommend next-best actions in real time. This panel will explore how CX leaders are deploying AI to transform the agent role, and what this experience is like from the agent’s perspective. Panelists will discuss how tools such as AI copilots, real-time knowledge synthesis, contextual assistance, automated summarization, and predictive assistance are helping agents navigate complex conversations more effectively while reducing cognitive load. At the same time, organizations must carefully balance automation with human judgment, ensuring agents remain empowered decision-makers. Panelists will also address the operational and cultural challenges of introducing AI into the agent workflow including trust, training, governance, and change management. Attendees will hear practical insights (and hopefully firsthand feedback from agents) on what’s working, what’s not, and how agent-facing AI can simultaneously improve efficiency, enhance employee experience, and deliver better outcomes for customers. |
The Next Gen CX Business Plan: Preparing for the Next 3–5 YearsFor years, organizations have piloted AI-powered support, automation, proactive service models, and intelligent self-service. Now, the industry is reaching an inflection point: what happens when these capabilities mature into the standard operating model? The question for leaders is no longer if these technologies work, but how to architect a business plan that thrives once they are fully integrated. Moving from pilot to scale requires a fundamental shift in how we lead. It demands a roadmap for workforce evolution, a commitment to data integrity, and a new definition of “success” that balances efficiency with the human connection customer still crave. What does workforce strategy look like when AI handles a significant portion of interactions? How do roles evolve? What investments must be made now in data quality, governance, and systems integration to support intelligent, proactive service? How is success measured? How do organizations deliver the trust, clarity, and the confidence that define Customer Assurance? In this discussion, CX leaders will explore:
|
Customer Assurance: A Leadership Decision, Not a DepartmentCustomer Assurance is not a department or a checklist. It is the confidence customers feel when they know a company will show up with clarity, competence, and care. It is built through leadership decisions that shape how the organization communicates, operates, and responds when something matters most. In an era defined by automation, AI, and no-reply emails, customers are tired of simply being processed. They are asking deeper questions: Do I feel safe doing business with you? Do I trust this experience? Do I believe this company will take care of me when it counts? True assurance is what turns a transaction into trust. It requires more than strong service design. It takes leadership alignment, clear decision-making, and systems that make confidence possible at every stage of the customer journey. That includes how expectations are set, how issues are owned, how employees are empowered, and how technology is used to support rather than distance the customer relationship. In this discussion, CX leaders will explore:
|

