All About CRM's (a constant balancing act)

Passiveness Concerning Security Features

Home
Roles of Operational and Analytical CRM's
Components of Analytical CRM
What Makes CRMs Attractive?
Strategy
Internet Privacy And Security
Issues
Misuse of Data
Passiveness Concerning Security Features
Solutions
References

No matter how many security features are available there are no guarantees to ensure that customers will use them to protect their data.  Some individuals value time over efficiency and turn off or disable certain security features in order to speed the performance of their systems. Many people seem to have the " problems won’t happen to me attitude" and this can lead to a pandora's box a potential problems.

 

The complacency of individuals within organizations and at home is one reason why security breaches occur. One particular problem occurs when employees use company computers for personal use, and as a result, opening up the systems to outside risks.

 

 Misrepresenting Compliance

The fact that a privacy or security logo is displayed on a business's website does not necessarily ensure compliance with the regulations governing its use. In fact, the BBBOnLine Reliability logo images located on The Solutions page were copied from unauthorized sites listed by the Better Business Bureau. The BBB listings of unauthorized use of their logo is dated 2003; the websites (http://melancor.com/html/hmw.html and http://www.aquariumplants.com) are still active and still display the logo. Ironically, a Google search of "aquarium plants" returns the company Aquarium Plants as a sponsored link from the search engine.

 

 Security Issues

     - In the spring of 2006, the SANS Institute released a list of the eight major trends affecting Internet software security at the time:

  •                Rapid growth in critical vulnerabilities being discovered in Mac OS/X including a zero-day vulnerability (OS/X still remains safer than Windows, but its reputation for offering a bullet-proof alternative to Windows is in tatters.)
  •  Substantial decline in the number of critical vulnerabilities in Windows Services, offset by flaws in client-side software, including the WMF vulnerability and Internet Explorer flaws, listed in Trend #3. 
  •   Continuing discovery of multiple zero-day vulnerabilities in Internet Explorer.
  •   Rapid growth in critical Firefox and Mozilla vulnerabilities.
  • Surge in commodity zero-day attacks used to infiltrate systems for profit motives.
  •  Rapid growth in three types of critical vulnerabilities allowing direct access to databases, data warehouses, and backup data (Oracle, Veritas Back-Up and SQL Injection attacks).
  •    A continuing surge in file-based attacks, especially using media and image files, Microsoft Excel files, and more.
  •     A rapidly spreading scourge of successful spear-phishing attacks, especially among defense and nuclear energy sites.

  • The issues facing individuals and companies that use the Internet for business or pleasure are complex. As research as demonstrated, privacy and security top the list as concerns. Addressing these concerns is of prime importance when implementing a successful CRM strategy. CRM software may collect valuable data, but the hazards associated with its collection need to be assessed based on the solutions available to reduce those hazards.