We all know the importance of making sure the third party systems you share your business data with provides the maximum security for your data within their environment – but how can you tell?
For example Mobilize Mail offers an Integration Server that allows clients to send eDM subscriber data to their account via FTP(s). This service is great for clients who do not expose their systems via the standard Internet protocols such as HTTPS, HTTP.
Using secure protocols such as FTPS is great when transferring data between systems but it does not make the data secure once the data resides on a server.
To secure the client’s data while it resides on a Mobilize Mail server the use of encryption can be applied.
The client can encrypt the data within the CSV file on their server then send the data to Mobilize Mail’s Integration server where the CSV file can be unencrypted, processed then deleted. If, for any reason, the CSV file is obtained by an unauthorised person the data is useless due to the strong encryption process used.
Don’t trust or assume that any third party system is securing your data – ask for proof that they are.
We have all read about hackers stealing passwords and data from some of the major businesses so make sure you are not a victim. Ask the business to provide documentation regarding their security policies which should include how they store your account data (passwords etc..), how your business data is secured and protected and what security checks are in place to make sure the system has not been hacked.