
It’s 3:10 a.m. and your home phone rings.
The assistant security specialist in your global company is sorry to wake you but it couldn’t wait. You open your eyes and you already know: he has spotted what he is calling “highly” suspicious activity over the company network. Although they are working on the problem, the situation is expected to get worse. You get dressed and go to the office.
In the meantime, customer service representatives are reporting numerous complaints of unauthorized debits to their credit cards and banks, your customer service department is overloaded with irate customer calls and the backlog is mounting. What do we tell customers?
Continue reading at
Posted in Articles