Any software can have vulnerabilities and problems sometimes. The key factor is how fast they are reacted to.
It is more and more common for information technology to be in the center of marketing and communications. But only a handful of marketing professionals come to think of what an important role security plays for a web service.
If security issues arise on a company's website or other services, it is a serious impediment to the company's image as well – other financial effetcs aside. Therefore it is important to know what information security is made up of.
It all starts with well-developed and well-maintained software. Any software can have vulnerabilities and problems sometimes, but the key factor is how fast they are reacted to. Thus, always make sure that software updates are done daily and that there is a person in charge of things and a clear process in the background. The majority of security issues is due to software that has not been updated.
Make sure that at least the company's public web services and websites are always up-to-date. It is also wortwhile to be certain of the software development practices of the software in use and for example, that OWASP TOP10 principles have been followed. Demand a description of their information security from your suppliers – and it doesn't hurt that it also has been audited by a third party.
Also the security of the servers in use must be actively taken into consideration and the data preferably be updated daily. It's not enough that the software of different applications is up-to-date if the servers themselves are not taken care of. It pays off to use cloud-based services nowadays because the service provider automatically makes sure that the servers are secure and the data backed up.
The monthly cloud-based service payment is also a compensation for your peace of mind when you know that everything is being handled professionally.
All of the company's public services must be actively monitored and surveilled so that no problems occur. The surveillance has to be 24/7, because often the problems don't surface during the office hours in Europe, for example, but in the daytime in the USA. There are ready-made tools for web service surveillance – but the easiest way is to check that monitoring and surveillance are part of the cloud-based service package.
Information security issues can also be found in well-maintained web services. For example, the recent Heartbleed SSL vulnerability hit almost all the web services in the world. In these cases it's good to be sure that a reaction order is planned out. Phone numbers to technical liaisons and sources are at hand and the company has the means to inform customers about possible problems or alternative arrangements. It's beneficial to gather the clientele's email and SMS contacts for crisis communication and have a service that handles the communication in a crisis situation. In our email marketing guide you will find a chapter dedicated to crisis communication.
We cover more of informartion security next month by listing the 5 most important things that marketing can do for information security.
The writer of the article is one of Liana Technologies' founders and has been the CEO of the company since the start (year 2005). Samuli's own background is in software design, and he already has 15 years of experience in communications and marketing software and a strong vision of how to put digital marketing into practice.
Subscribe to our monthly newsletter to get the latest interesting articles in your own mailbox.
Liana Technologies conducted an international survey about marketing automation in May 2017. The survey was sent to marketing and communications specialists and 421 company representatives in total completed the survey.Read More
Email marketing still remains one of the most effective marketing measures. But why is it particularly important for hotels? Read our tips on how you can take advantage of it and build guest loyalty.Read More
Email marketing is definitely a relationship worth investing in. But what criteria should a good newsletter software actually fulfil? And how do you choose your perfect match among all of those who want to date you?Read More
Due to the rise of smartphones, the number of mobile services exploded at the beginning of the decade. In the past five years we've seen mobile devices go from an additional gadget to the most used online device. Which factors and concepts shape the development of mobile services from now on and what is their meaning to marketers?Read More
Can analytics provide information on where the reader's attention is focused on in newsletters? Where should a CTA or Read More link be placed and how does it affect the click-through-rate of the letter? These questions were being examined by assistant professor Ashis Kumar from the Aalto University and marketing professor Jari Salo of the Oulu University.Read More