There are many IT security concerns in the world today. This is why we’re starting a new series of articles detailing why, when it comes to CRM, you need not have such worries with Pipeliner.
Trust
To begin with, a critical factor is trust. Who can we trust today? Trust is a word that is liberally abused, not only by governments but by many others. An example is that you trust someone who claims to be covid-vaccinated, and they’re showing you a stolen vaccine card.
In the area of data, trust is extremely critical. Not only must we trust the data, but we also must secure it. There is an endless number of criminal forces worldwide engaging in the 21st-century version of piracy: that of stealing data.
In the last two weeks alone, I received several phone calls from people claiming to be Amazon representatives, informing me that my credit card had been used to purchase an iPhone 13. The “Amazon rep” says that if I have not made this purchase, they can guide me through getting the charge reversed. They do a pretty convincing job, sounding like they’re from a legitimate office. Of course, they ask clever questions designed to allow them to get inside my phone. I didn’t fall for it, but unfortunately, there will be many that do.
Keeping Data Safe
For Pipeliner, we have chosen a very safe environment with Amazon Web Services (AWS).
We have four different locations throughout the world where data is kept. This is especially important when, for legal and other reasons, data cannot be shared from one geographical location to another.
This wasn’t an issue back at the beginning of the internet. Companies kept data everywhere and anywhere. But today, there is strict concern over what entities have access to data. Risk factors must be kept to a minimum.
Hackers
Today, you often must be concerned over whether the data you are receiving is correct because data can be so easily manipulated through hacking. We hear far too many stories today about profiles being stolen. This just cannot happen with SaaS companies, as their most valuable asset is their customer data.
I am constantly amazed at the sheer number of emails I receive every week, offering me customer data from my CRM competitors. I have to wonder how they’re obtaining these names. This activity is not even legal, as people would have to opt-in for us to contact them.
Risk Assessment
Therefore you have to take into account numerous factors when performing risk assessment in data protection. There are many regulations and standards that must be adhered to, such as international standards ISO 27001 and ISO 22301, and GDPR for Europe. Your data must be wholly segregated between clients and, as we noted above, between geographical areas. Is your technical architecture secure?
Within your company you should also ask, are your employees who handle data restricted by contracts and confidentiality agreements?
We will be taking up each of these topics in detail. Stay tuned!
Comments