KEY TAKEAWAYS

  • Security isn’t an afterthought; it’s a business builder.
  • Taking action shows customers that you’re invested in their protection.
  • Bolster your defenses ahead of a potential attack and be proactive in identifying weaknesses to reap the benefits of customer retention.
SIGN UP FOR UPDATES

Let’s face it: Security isn’t an afterthought; it’s a business builder. The last thing you want to do is break the trust of your customer base, and nobody knows this better than Apple.

Last year, the technology giant refused to comply with an order from the FBI to create a backdoor to encrypted data on its iPhones. The debate brought privacy and security issues into the forefront, with the company standing up for its customers.

Apple refused to compromise their security, and you shouldn’t either.

Change the locks to your database — keep the key

We know it sounds rudimentary, but you need to ensure users that data both in transit and at rest is encrypted. While reviewing countless “what-if” scenarios is helpful doomsday prep in the event of a breach, you’re better off doubling down on your encryption key protocols.

For example, rather than embedding your encryption key within your application, you can store it on a hardware security module (HSM) to add another tier to accessing your database. According to Security Intelligence, the HSM serves as an offline host for your encryption key and protects against invading hackers by moving off the web.

Taking action shows customers that you’re invested in their protection and value their contributions beyond cashing checks every month.

Never lower the drawbridge to a Trojan

What cues should you take away from the Apple case? Where should you draw the line between security and privacy? These questions are critical to maintaining your business and widening the gap between yourself and your competitors. With hackers devising more sophisticated methods to lift your customers’ secured data, it’s imperative to stay ahead of their efforts.

By refusing to compromise security, you can be the George Clooney from “Ocean’s Eleven” rather than the George Clooney of “The Perfect Storm.” Take a closer look at your protocols, bolster your defenses ahead of a potential attack and be proactive in identifying weaknesses to reap the benefits of customer retention.

In an interview with The New York Times, former National Security Agency analyst Jay Kaplan said, “Apple is a business, and it has to earn the trust of its customers. It needs to be perceived as something that can fix this vulnerability as soon as possible.”

In a forest of silver maples, be the Apple tree above the competition.

[addtoany]

MSP Edge Staff Writer

MSP Edge staff writers are characterized by years of experience in the security and managed services marketplace. They don’t shy away from tough topics, and have the knowledge to write informatively on the business of managed services, best practices for staying ahead in the industry, and how to more effectively work with your customers.