📜 ⬆️ ⬇️

CRM-systems: protection or threat?

March 31 is the international day of backup, and the week before is always full of security related stories. On Monday, we already learned about the compromised Asus and the "three unnamed manufacturers." Particularly superstitious companies sit on pins and needles all week long, make backups. And everything comes from the fact that we are all a bit careless in terms of security: someone forgets to fasten the belt in the back seat, someone ignores the shelf life of the products, someone stores the username and password under the keyboard, and even better records all the passwords in a notebook. Individuals manage to disable antiviruses, "so as not to slow down the computer" and not use the separation of access rights in corporate systems (what secrets in a company of 50 people!). Probably, humanity just has not yet developed the cyber-preservation instinct, which, in principle, can become a new basic instinct.

Not developed such instincts and business. A simple question: Is a CRM system a threat to information security or a security tool? It is unlikely that someone just like that immediately answer. Here we need to start, as we were taught in English classes: it depends ... It depends on the settings, the form of delivery of CRM, vendor habits and beliefs, the degree of disregard for the staff, the proficiency of the attackers. In the end, you can hack everything. So how to live?


CRM-system as protection


Protect data on commercial and operating activities and securely store the customer base is one of the main tasks of a CRM system, and in this it is more important than all the other application software in the company.
')
Surely you began to read this article and in the depths of your heart grinned, saying, who needs your information. If so, then you probably have not dealt with sales and do not know how much demand for "live" and high-quality customer databases and information about how to work with this database. The content of a CRM system is interesting not only for the company's management, but also for:


image
Such is information security in small and medium business.

If someone fits into your CRM, he will get access to your operating activities, that is, to the array of data with which you make the most of the profits. And from the moment the malicious access to the CRM-system is received, the profit begins to smile at who is in the hands of the client base. Well, or its partners and customers (read - new employers).

A good, reliable CRM system is able to close these risks and give a bunch of nice security bonuses.

So what can a CRM system do in terms of security?


(we tell on the example of RegionSoft CRM , since we cannot be responsible for others)


Clickable

This is the implementation of security on the example of a single system, each vendor has its own policies. However, the CRM-system really protects your information: you can see who and what time shot this or that report, who viewed what data, who did the upload and much more. Even if you find out about the vulnerability after the fact, you will not leave the act unpunished and easily calculate the employee who has abused the trust and loyalty of the company.

Relaxed? Early! This very protection with negligence and disregard for data protection issues may play against you.

CRM system as a threat


If your company has at least one PC, this is already a source of cyber threats. Accordingly, the degree of threat multiplies with the increase in the number of workstations (and employees) and with the variety of installed and used software. And with the CRM-systems, the situation is not easy - after all, this is a program designed to store and process the most important and expensive asset: the customer base and commercial information, and we are talking about its security here. In fact, not everything is so gloomy near, and with the right treatment, you will not get anything from the CRM system, except for use and security.

What are the signs of a dangerous CRM system?


Let's start with a little excursion to the basics. CRM are cloud and desktop. Cloud are those whose DBMS (database) is located not in your company, but in a private or public cloud in some data center (for example, you are sitting in Chelyabinsk, and your base is spinning in a super cool data center in Moscow, because the vendor of the CRM decided so and he has an agreement with this provider). Desktop (they are also on-premise, server-side - which is not so true) base their DBMS on your own servers (no, no, don't draw yourself a huge server with expensive racks, most often in a small and medium business it’s a single server or even PC modern configuration), that is, physically in your office.

You can get unauthorized access to CRM of both types, but the speed and ease of access are different, especially if we are talking about an SMB that doesn’t care much about information security.

Hazard Sign # 1


The reason for the higher likelihood of problems with data in the cloud system is the relationship connected by several links: you (CRM tenant) are a vendor provider (there is a longer version: you are a vendor IT vendor outsource provider). 3-4 levels of relationship have more risks than 1-2: a problem can occur on the vendor’s side (contract change, non-payment of the provider’s services), on the provider’s side (force majeure, hacking, technical problems), on the outsourcer’s side (manager change or engineer), etc. Of course, large vendors are trying to have backup data centers, manage risks and keep their DevOps department, but this does not eliminate problems.

Desktop CRM is basically not rented, but purchased by the company, and accordingly the relationship looks more simple and transparent: the vendor adjusts the necessary security levels during the implementation (from the distinction between access rights and a physical USB key to placing the server on a concrete wall, etc.) and transfers control to the CRM company that can increase protection, hire a system administrator, or contact your software vendor as needed. Problems come down to working with employees, protecting the network and physically protecting information. In the case of desktop CRM, even a complete shutdown of the Internet will not stop work, since the base is located in the "native" office.

About cloud technology tells one of our employees, who worked in the company-developer of integrated cloud office systems, including CRM. “At one of my jobs, the company created something very similar to basic CRM, and all this was related to online documents, etc. Once in GA, we saw anomalous activity from one of the customer subscribers. What a surprise it was for us, the analysts, when we, not being developers, but having a high level of access, could simply click on the link to open the interface that the client used, to see what kind of a tablet he had. By the way, it seems the client would not want someone to see this commercial data. Yes, it was a bug, and it was not eliminated for several years - in my opinion, it’s still there. Since then, I am an adept of the desktop and do not really trust the clouds, although, of course, we use them in work and in personal life, where funny packs happened too. ”


From our survey on Habré, and these are employees of advanced companies

Loss of data from a cloud-based CRM system may be due to data loss due to server failure, server inaccessibility, force majeure, vendor activity termination, and so on. The cloud is a permanent, uninterrupted access to the Internet, and protection must be unprecedented: at the level of code, access rights, additional measures of cybersecurity (for example, two-factor authentication).

Sign of danger number 2


It is not even a single sign, but a group of signs related to the vendor and its policies. Let us list some important examples that we and our employees had to meet.


Typically, these problems are associated with small or young vendors, however, the large ones have repeatedly found themselves in unpleasant stories (google it). Therefore, you should always have ways of protecting information on your side + discuss security issues with a selected CRM system provider in advance. Even the very fact of your interest in the problem will already force the supplier to take implementation as responsibly as possible (it is especially important to do so if you are dealing not with the vendor’s office, but with its partner, which is important to conclude an agreement and receive a commission, and not your two-factor ones ... well did you understand).

Sign of danger number 3


Organization of work with security in your company. A year ago, we traditionally wrote about security in Habré and conducted a survey. The sample was not very large, but the answers are indicative:



At the end of the article we will give links to our publications, where we analyzed in detail the relations in the “company-employee-security” system, and here we give a list of questions that you should find answers within your company (even if you don’t need CRM).


In fact, these are basic questions - in the comments they will certainly add hardcore, but this is a base, the basics of which even an individual entrepreneur with two employees should know.

So how to protect yourself?



Of course, using a cloud system, you can achieve a sufficient level of security: use dedicated servers, configure routers and separate traffic at the application and database levels, use private subnets, introduce strict security rules for administrators, ensure uninterrupted backup by backing up as much as possible. and completeness, to carry out round-the-clock monitoring of the network ... If you think about it, it’s not that difficult, rather expensive. But, as practice shows, such measures are taken only by some companies, mostly large ones. Therefore, do not hesitate to say it again: the cloud and the desktop should not live by themselves, protect your data.

A few small but important tips for all cases of implementing a CRM system



These are trifles, but they perfectly complete the big picture. And, in fact, there are no safety details.

By implementing a CRM system, you ensure the security of your data - but only if the implementation is carried out correctly, and information security issues are not overshadowed. Agree, it is foolish to buy a car and not check the brakes, ABS, airbags, seat belts, EDS. After all, the most important thing is not just to drive, but to drive safely and get there safe and sound. The business is the same.

And remember: if safety rules are written in blood, business cybersecurity rules are written in money.

On the topic of cybersecurity and the place of the CRM system in it you can read our detailed articles:



If you are looking for a CRM system, then on RegionSoft CRM until March 31, a 15% discount . If you need CRM or ERP - carefully study our products and match their capabilities with their goals and objectives. There will be questions and difficulties - write, call us, we will organize for you an individual presentation online - without ratings and puzomerok.
Our channel in Telegram , in which without advertising we write not quite formal things about CRM and business.

Source: https://habr.com/ru/post/445582/


All Articles