“We love our customers” – Then why don’t you protect their information?

Source: Surely

Sure you do. We all love our customers, right? They literally pay our bills. Then why is it that so few companies take steps to protect their customers’ information?

As I discussed previously, it is not unusual for employees to take the entire contents of a customer relationship management system on to their next employer.

Here are ten steps that can help protect your customers’ information:

  1. Select a CRM solution that has robust security features built in.
  2. Grant access only to employees that have a business need.
  3. Monitor employee access, usage, and manipulation of CRM data.
  4. Limit users’ ability to download the contents of the database.
  5. Don’t allow users to view accounts that belong to other salespeople.
  6. Ensure that all users have the most up-to-date virus scanners on their computers.
  7. Terminate access as soon as an employee leaves the company.
  8. Encrypt mobile phones and laptops used to access the CRM platform.
  9. Ensure that a log of records printed and emailed is available and frequently monitored.
  10. Subtly let employees know that your company monitors what they do with the data.
There are additional steps that I typically recommend, but that’s more than enough for now. Your customers thank you for reading this list.
Need a writer that understands fraud? When you hire me to write an article, blog post, newsletter, or white paper, you get an accomplished writer that is also an expert in fraud.

paul@mccormackwrites.com

Advertisements

Say goodbye to your customers

Source: d70focus

They’re all gone. Every single customer you had has just walked out the door. No one told you. They didn’t ask permission to leave (why would they?), but rest assured they are gone.

Your phone calls to customers are not returned. Emails are ignored. You’re still waiting patiently for that sales order that will make it all worth the effort. It’s not going to happen. Ever. Your business is toast.

Mike in sales left last week. “Not a big loss.” “Where is he going? Never mind…who cares?!?!”

Mike, the salesman no one was sad to see leave, left with the contents of your entire customer relationship management system (CRM). He also took all your company’s sales manuals as well as your company’s pricing process and cost structure. Mike and his new employer now have all they need to “win” business from your company’s customers. Their calls are being returned. In fact, they just won a huge order from your company’s biggest customer.

CRM is a blessing and a curse. Companies can benefit tremendously from having a complete record of their interactions with customers. However, giving your entire sales force access to your company’s CRM solution can result in exactly the scenario I detailed above (by the way, this is a real case that I investigated).

Think of it this way: you’re having a dinner party at your house for 20 of your company’s employees and significant others. When the guests arrive, you tell each of them to take an unaccompanied tour of the house. Make sure that you have all of your valuables on display, your wallet with cash clearly visible, your watch and jewelry sitting unattended for all to see. What are the chances that something will go missing? Do you really want to take the chance? In the event that something goes missing, how will you catch the thief?

Certainly this scenario is an extreme example to illustrate a point. But that’s the idea. It doesn’t make any sense to let 20 employees and their guests wander around your house when all of your valuables are left scattered around! Yet companies routinely grant employees unfettered access to their CRM database.

My next post will discuss best practices for preventing theft of CRM data. In the meantime, take the time to think about your company’s CRM solution. Would you know if “Mike” from sales had downloaded your entire customer database just before he left the company?

Need a writer that understands fraud? When you hire me to write an article, blog post, newsletter, or white paper you get an accomplished writer that is also an expert in fraud.

paul@mccormackwrites.com