By Alice Westerfield, Liaison Technologies
In my previous post of this series, you learned how to communicate return on investment and why it’s important to identify project scope upfront. Today, let’s turn our attention to security.
Step Three: Lock Down Security and Business Protocols
Secure Is the Word
You need only visit a blog, website or newsletter related to the cloud, integration or nearly any IT initiative to see one of today’s hottest topics: security with a capital “S.” Not only is it unacceptable for business data to be insecure, but it can also be downright illegal if your organization doesn’t secure credit card, medical or other personal data.
Avoiding Red Alerts
Before you can address security, you need to know what tools are at your disposal and what level of security is required. Ask your chosen integration provider or your company’s IT gurus these questions:
- What type of authentication will our company require? How will we control access?
- Are there any privacy compliance mandates we must adhere to? Will we require an audit for compliance issues?
- When and how will we be alerted to security breaches?
- What are our contingency plans and what is our disaster recovery process?
Armed with the answers to those questions, you will know exactly the level of security you’ll need to protect whatever kind of data you are exchanging internally and externally.
Next time: Step four – Circle the “go live” date