Main Menu
Home |
ACT! |
KnowledgeSync |
Training |
Articles |
Things you need to know! |
Zoho |
News |
Contact Us |
Testimonials |
SwiftPage Drip Marketing
Trusted Email Marketing
and Online Surveys
Is Your Customer Data Secure? |
A new study by the Ponemon Institute says that many ex-employees are walking off with companies' sensitive and confidential data when they leave their job. An of those, most have either used or plan to use the data for their next job or at another company.
The survey, as reported in CBCNew Technology & Science , covered 945 participants who had been laid off or otherwise changed jobs in the last year. The result: 59% admitted to taking company data with them. And what did they take with them?
This is very similar to a survey by Cyber-Ark . Their report of IT processionals indicated 52% of US respondents would take their employer's Customer and Contact database when they left that company.
These surveys tell us two things... 1) your customer and contact data is a very, very valuable commodity, and 2) it is also very easy to steal. Did I say steal? Absolutely! Taking customer data without the permission of the owner is theft!
How long did it take you to build that database of customers and contacts? Did you have notes and contact history attached to those contact records? How about quotes, invoices or other confidential information. Devastating to say the least!
So how can we go about protecting our customer and contact data?
First of all, we can't provide 100% protection for our data any more that we can provide 100% protection and safety for our home or business. But we can make it more difficult by limiting our exposure.
Use your existing software security tools to limit access to only those contact / account records that are necessary. Sometimes that means 'all of the database" and it that is what it takes to do a great job, have at it. You can also limit or restrict the ability to download customer data into spreadsheets or text files. Printout data only when necessary. Change passwords frequently and limit access from the outside whenever possible.
|
Next > |
---|