Customer Relationship Management (CRM) software, by its very nature, invites security concerns. The information wrapped into a CRM solution can be the heartbeat of a company, and is ripe for plucking. Whether you use a hosted CRM solution or an onsite solution, you need to take care to make sure that your data is protected.
A major concern with hosted solutions is that the customer’s data is not on their own premises, and that someone else has access to it. Customers need to be concerned about what kind of security the host is providing to protect against this. What types of protection are in place to prevent someone from hacking into the host? Is there monitoring going on to make sure that employees of the host are not accessing data that should be off limits to them?
Another concern that customers have simply deals with the connection to the Internet. If a piece of the hosted solution can work without connecting to the Internet, customers would prefer it that way. Any opening to the Internet on either side provides some sort of vulnerability that could be exploited. The host needs to provide solutions to prevent unauthorized access from the outside, either into the host itself or to the customer while connected to the host.
Thankfully, online vendors recognize that their reputation is built on security, and that any type of breach could be potentially fatal to their business. Many vendors house their solutions in Fortune 500 data centers, something that most customers would never be able to afford on their own. A vendor can sell a customer on the security of their hosted solution by pointing out to them that they are offering a superior security system than they could ever afford on their own.
Because hosting vendors can offer superior data centers, companies keeping their data onsite need to be concerned about what kind of security they have in place to prevent attacks from the Internet. Some of the security issues a business could be exposed to include:
To guard against these types of concerns, several methods can be employed. A good firewall should be in place. Businesses should have a good password policy, enforcing both long passwords and encryption. An anti-virus program should be running on both workstations and servers. A VPN connection providing a secure channel when transferring data will help with security as well.
Security will always be a concern, and there is no perfect solution. Criminals will always be looking for new ways to continue to disrupt businesses. Whether using a hosted solution or one that is onsite, companies should do their due diligence in both cases. Research your hosting vendor and be comfortable with the security measures being offered. Make sure you have strong measures in place if you’re going to be hosting the data yourself. While at the very least you’ll be certain to encounter some sort of virus or malware at some point, at least you’ll be comfortable that you took every reasonable step you could to protect your business.
This whitepaper describes why the shift from a traditional to a social intranet is imperative to staying competitive, and analyzes the costs and benefits associated with implementing one. You will also find useful KPIs to measure performance and further leverage your intranet's success, raising employee engagement and boosting your competitive advantage. more
Customer Relationship (CRM) software has become one of the most important business tools in today’s world. By allowing you to better connect with new and existing customers, CRM is an indispensable tool for sales teams and customer service teams alike. But with so many choices available, it can be difficult to decide on a solution. more