Modern life is creating a flood of information—16 trillion gigabytes of data were created in 2016 alone, and that number is expected rise tenfold by 2025. Mobile devices allow brands to gather more nuanced customer data than ever before, providing actionable insights into what people value and how they engage, the kinds of insights that strong customer relationships are built on.
But these relationships are also built on trust: your customers’ trust that you’ll keep their data safe and private and use it responsibly. To earn that trust, you need a security philosophy, a plan to identify and address security needs, and a clear roadmap.
Putting privacy and security at the core of your business
Keeping data private means being vigilant about managing access to information and ensuring that you always understand where data is coming from and when it can and can’t be used. That’s much easier if you emphasize data privacy/security across your organization from the very start. In turn, strong security requires a smart development process—if your company is pushing out code that isn’t being adequately reviewed, that’s just as big a security risk as lacking traditional safeguards like firewalls and virus protection.
Demonstrating a commitment to security/privacy, step by step
Securing your data is essential—but it’s just as important to demonstrate to customers and partners that your data security house is in order. To get there, consider putting together a security attestation roadmap featuring some of these common certifications and actions:
- Engage a security vendor to carry out digital security audits and penetration tests
- Evaluate security controls against the SANS Institute’s Cybersecurity Risk Framework
- Implement the U.S.’s Health Insurance Portability and Accountability Act (HIPAA)’s data privacy/security rules
- Complete the Service Organization Control (SOC) 2 Type 1 examination, developed to protect systems against unauthorized access
- Update data policies and contracts with technical partners to ensure material compliance with the EU’s General Data Protection Regulation (GDPR) by May 25, 2018
Some of these steps can be accomplished in a matter of weeks; others—such as the SOC 2 examination—can take more than 18 months from start to finish. At Braze, we see SOC 2 certification as the gold standard because it touches practically every element of security—from physical infrastructure to software safeguards, from the procedures a company has in place to the people given access to its systems—making it a major investment in time and resources, but a key one for our business. Find the certifications that are key for your business, invest in expert legal and security guidance, and you can level up your data privacy/security, while showcasing your commitment to data protection.
How to embrace a privacy/security practice
To know what to focus on, take a holistic view of your organization, and use that understanding to complete your security risk assessment.
For digital security, embrace traditional measures like firewalls, encryption, and virus scanners (and two-factor authorization and IP whitelisting, for that matter) to prevent unauthorized access. But digital security isn’t just about keeping data safe from outside intruders; it also means using things like role and permission management to ensure that the right members of your team have access—and no one else. Physical security matters, too. You can have world-class cybersecurity protections, but if you don’t secure your company’s physical assets (installing security cameras, requiring ID badges, maintaining maintenance logs, making sure that guests can’t just roam around your offices unescorted) you’re not really securing your data.
Security isn’t just about safeguards; policies and processes matter, too: role-based permissioning can’t work effectively, for instance, without a process for terminating access when employees leave the company. And if your brand shares customer data with technical partners, you need to fully understand their security measures.
Privacy and security—It’s a journey
True security doesn’t stand still. Technology keeps shifting, new threats keep cropping up, and last year’s secure system may suffer from previously unknown vulnerabilities today. Stay ahead of the curve by keeping security and privacy in mind every day, instituting strong processes, staying alert to the changing security landscape, and choosing partners with the same mindset.