Our Thinking

Is Your Genesys Environment Secure? (Part One)

Posted by Alex Boisseau on Sep 28, 2016 1:41:42 PM

With Genesys G-Force 2016 only days away, we have been walking you through some of the security challenges organizations face when using the world’s number one customer experience platform.

Previously we spoke about the unconventional ways that Genesys components use or integrate with existing technology. We also described how Genesys uses a combination of proprietary and industry standard protocols and configurations throughout their applications, and the challenges this presents to standard testing procedures.

Read More

The Challenges of Securing Genesys CX

Posted by Jay Gunnell on Sep 23, 2016 3:46:48 PM


As the countdown begins towards Genesys G-Force 2016, we thought it was a good time to review some of the security challenges organizations may face when using the world’s number one customer experience platform.

Today’s realities have made security and the protection of personal identifiable information (PII) of paramount importance for every organization across all of the technologies they operate. There is no shortage of methodologies and tools for testing for vulnerabilities in network environments and applications, but none of them are designed to address the unique characteristics of a fully integrated customer experience platform like Genesys provides. There are two important challenges that are often overlooked.

Read More

I've Been Pwned! Now What?

Posted by Michael Lines on Sep 20, 2016 9:30:00 AM


In May 2016, LinkedIn had 164 million email addresses and passwords exposed. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site four years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data.

Read More

Topics: Security

Be prepared! What to do if you’re compromised

Posted by Dan Lapierre on Sep 15, 2016 9:04:40 PM

Dan Lapierre, Online Business Systems’ Senior Security Consultant, discusses Visa’s recently released and updated guide on “What To Do If Compromised” (WTDIC). The updated guide can be located on Visa’s website by clicking here.

Read More

Topics: Security

Prepare, Mon Frère, Against Ransomware

Posted by Chris Lincoln on Sep 8, 2016 10:02:51 AM

There is no question that we have become heavily dependent on computerized systems to “do more” through automation and to “do more better” by connecting and analyzing data in ways we couldn’t do previously. Ransomware takes advantage of an organization’s reliance on these systems by denying access to their systems or data for financial gain.  Ransomware attacks occur daily and are a real threat that shouldn’t be ignored.  Fortunately, there are a few techniques we can use to defend against ransomware.

Read More

Topics: Security

What is "Reasonable" Security?

Posted by Michael Lines on Sep 8, 2016 9:55:41 AM


"If organizations choose to amass data, and then fail to uphold their responsibilities as data stewards, they are also culpable."

California Attorney General 2016 Data Breach Report

Read More

Topics: Security

Delta is Ready When You Are...But Are Their Systems?

Posted by Steve Levinson on Aug 11, 2016 10:49:33 AM

By now you have likely heard about, or worse yet, been impacted by the glitch that crippled Delta Airline’s network and reservations system on Monday that forced them to cancel about 1,000 flights worldwide. Delta has stated that a power control module malfunctioned, causing a surge that cut off power to their main computer network. Normally, the systems would switch to backup computer systems almost instantaneously, however in this case something didn’t go right. Confidentiality, Integrity, and Availability (CIA) are the foundational cornerstones of information security, and in this case, availability was on the wrong flight path. It is safe to say that this problem, which will ultimately cost the airline millions of dollars, could have been avoided through scenario planning.

Read More

Topics: Security

Where in the World is "The Cloud"?

Posted by William Mabley on Aug 10, 2016 1:57:48 PM


Data is the lifeblood of most modern businesses. One of the key benefits we often mention about the  Cloud is that the data is not tied to hardware that could fail – your data is simultaneously everywhere and nowhere. Things become a bit more complicated if you are in a regulated industry that dictates controls and conditions around where your sensitive data is allowed to live. Data Sovereignty refers to the concept that data is subject to rules and regulations of the country where the data resides; it is an important consideration in your Cloud planning. 

Read More

Topics: Cloud Computing

What is the Cloud and why Should my Organization be Using it?

Posted by William Mabley on Jul 29, 2016 2:16:04 PM

Technology is always changing, but it is safe to say that few technological advancements have had as big an impact on organizations as the Cloud. So, what exactly is the Cloud and what services does it provide? Well, it is a little bit marketing and a lot technology.

Read More

Shanty or Fortress? How Application Development is Like Building a House

Posted by Steve Levinson on Jul 25, 2016 3:12:12 PM

If you’ve ever gone through the process of building a new home, or know someone who has, you know that it’s a major process. It’s something that you hope to live with (and in!) for a long time. And in the case of application development, you might even have possibly millions of visitors!

Read More

Topics: Security

Our Thinking - The Online Blog is a source for insights, resources, best practices, and other useful content from our multi-disciplinary team of Onliners.

Subscribe to Blog Updates