Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementFire & Life SafetyPhysical Security

We hear you loud and clear: Addressing the nuances of audio security and compliance

By Jordan Domash
microphone

Image from Pixabay

December 19, 2022

Call recording, monitoring and surveillance of voice, and electronic communications have long been required for regulatory compliance for financial firms. With the shift to remote work and hybrid work environments continuing to be the norm, voice communications and communications over video collaboration platforms have become even more important for compliance teams to function successfully and remain proactive. FINRA, the FCA, and the SEC are clear that compliance teams must monitor communications to remain compliant. 


A study by the National Center for Biotechnology Information found that video conferencing services, like Zoom, have seen a ten times increase in usage compared to pre-lockdown levels. When we take a closer look at the numbers, it is even more dizzying: In an average workday, a person makes eight calls (30 minutes each) which equates to four hours of audio, or 12,000 words, per person each day.


As remote work increases globalization, how are teams to ensure compliance with the volume of audio calls and the diversity of languages and lingo? From multilingual complexities to data volume concerns, monitoring audio can be one of the most challenging communications to monitor.


Audio is Complex

Depending on the industry, regulation varies differently — but they all have one thing in common: You must monitor all communications, including audio, in order to guarantee proper surveillance and compliance. Random sampling has been a standard practice, as sifting through data and consistent monitoring is a daunting and time-consuming task. However, with the volume of data we have and the amount of time it takes to listen to a call, audio surveillance can take a lot of effort and leave firms open to too much risk.


Given the multifaceted nature of audio, compliance teams must find a way to balance the complexities of audio itself with the explosion of data sources. However, audio isn’t just another data source, it belongs in a category of its own — with many characteristics that are vastly different from e-comms surveillance — the biggest being transcription is not an exact science. 


When it comes to monitoring audio, we are not able to simply read the transcript and expect to understand the context as easily as we would an email. Words transcribed on paper can have an entirely different meaning than that of their spoken context, as the emotions and gestures are unable to be accurately captured. 


On average, 80% to 90% accuracy in an audio transcription is considered “good.” That means that 10% to 20% of the words in your transcription can be misused, missing, or just plain wrong. A scary thought, considering that some of those words might be important keywords.


Transcription also neglects to consider different languages and common vernaculars in different cultures. There are 23 main languages for more than half of the population, which would be a logistical nightmare to try to capture. Not forgetting that language switching is common in voice communication and being able to understand all languages in one conversation is critical for compliance. 


Tackling the Complexities of Audio

We know that elements like context and languages matter, so now what? We can take all of our comprehensive communications surveillance, where all recorded communications — voice, email, chat, e-comms, video and others — are brought together into a single data lake and are analyzed holistically. When selecting platforms, GreySpark’s report shows that 75% of the sample deemed this approach most likely to be an end objective.


With all the nuances of audio, integrated monitoring is the most practical and efficient way to review this rapidly growing data source. AI can help teams review one hour of audio in one minute rather than spot listening or listening to the entire conversation. Teams don’t have time to spend on the audio recording sections that are not relevant. 


A best-in-class solution would be one that unites transcripts and audio in one place so that teams can search by keyword and playback only on risky sections. This would help teams prioritize the riskiest content to help them make decisions on the next steps in order to find misconduct and keep it from escalating. 


As the world becomes more and more connected, we can confidently say that audio isn’t going anywhere, and regulations are only increasing. No matter the industry, security and surveillance teams must understand the nuances and employ communication surveillance tools that accurately identify the risks, no matter the type of communication. 


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: audio security physical security risk management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordan Domash is General Manager of Relativity Trace.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Will We See You at the Security 500 Conference?

    See More
  • remote work

    Addressing security risks of personal business in the workplace

    See More
  • 900x550_G4S_ESRM_0006_Metrics_Report_2.jpg

    Addressing the cyber metrics challenge

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing