Communication Security: The Hesitation Concerning Reliable Identity Solutions

Information securityAlthough there are better methods for securing communications, like printed newspapers, the password simply won’t concede defeat and pass into oblivion.

Despite the fact that we have become a society of connected users, the password is still the security method of choice as our last line of defense.

Resistance to other methods of personal identity security are fueled by our culture, one in which protecting our anonymity is paramount. We would rather be anonymous than secure, which is the driving reason we cling to a fixed character password – even if that password is as insecure as “password123.”

Missed Opportunities

One method of identity protection available is called a digital cryptographic key. The digital key encrypts communications. However, due to our culture of anonymity, no one wants to use it. In fact, many people don’t employ encrypted e-mails, even in a corporate setting, because they fear an encrypted email will act as a beacon for hackers – a sign broadcasting, “This is an important communication, someone should try to infiltrate it.”

There have been countless opportunities in the past to implement transport protocols that would have encrypted all web traffic. Those methods, however, involved key-based encryptions – the encryption required certifications, which would establish identity. Developers, who understood that the majority of potential users would be too uncomfortable relinquishing online anonymity, did not pursue development.

Viable Options in a Mobile Environment

There are viable authentication systems available now, but these rely on identification. In the past, users could assert their identity through device ownership. However, increased mobility, multiple devices, and the evolution of workspaces into virtual constructs, has basically eliminated the practice of authentication through device ownership.

What it means

Although our culture makes it increasingly hard to discuss, securing communications through a system that identifies the user explicitly is a workable solution to security breaches. However, until our culture is ready to concede online anonymity, exploitations of data and information will continue as is – with security experts struggling to develop solutions as quickly as hackers create new threats.

A Business Phone System Memoir – Music on Hold

Hi, I’m your new business phone system. I’ve done my due-diligence by answering calls, recording important messages, forwarding my direct calls to your cell phone, and have even taken the time to show you who’s on another call! But, what about when you put me on hold; why is it so silent?

Studies have shown that 50% of callers hang up after 20 seconds of silence, and 90% of callers hang up after 40 seconds of silence. Most callers will assume silence for disconnection. Music on hold can help to reiterate your companies’ impeccable customer service, intrigue your clientele to stay and wait for you, as well as ensure no miscommunication has occurred in the process. Can you afford to lose a sale due to complete and utter silence?

According to Maratona Communications (a dedicated partner company), U.S. laws currently in tact protect copyright owners from unlawful use of their music; using music on hold requires permission from the owner of the copyrighted music. Amy Johnson (2013) states, “If you want to use copyrighted music, you must obtain permission from the owner. This includes playing CDs, MP3s and the radio. Currently, performance rights societies such as ASCAP, BMI and SESAC will sell blanket permission to use music titles in their catalog for MOH purpose, for an annual fee that is calculated by size of your business and the frequency of usage” (Maratona Communications). However, “side-stepping” these incredulous music licenses and fees is made easy with the customizable music oh hold Maratona Communications purchases directly from the composer – they are able to convert the music into any digital format to be integrated seamlessly with your current business phone system. Johnson (2013) continues, “Our writers can also record custom messages using our in-house voiceover talent, using your existing script or one we write for you. Many companies offer canned royalty free songs for you to choose from. At Maratona, we do have our standard music options, but we will also customize a song to meet your individual needs, making your on-hold music unique to your company” (Maratona Communications).

 

Call Integrated Communications today @ 763-201-8028 to set-up a live demo of Maratona Communications’ music on hold and the many customizable options offered for your business phone system!