EHS management blog

EHS MANAGEMENT BLOG

4 Common Software Security Risks (And How to Avoid Them)

Your current software could be putting your organization at serious risk, and you may not know it until it's too late. 

At Perillon, we take security seriously. Our team is composed of experts with decades of experience in software development, application integration, and mobility solutions.

Below, we've assembled a list of 4 common software security risks we think you should be aware of:

1. Storing data on an in-house server

Many people mistakenly believe that storing data in-house, on their own sever, is safer than storing it remotely "in the cloud". The truth is that using a private server is significantly riskier than using the cloud. 

Storing data on an internal server is a bit like keeping cash under your mattress. No matter how well you hide it, you're still at tremendous risk if there's a break-in or fire. 

Storing data in the cloud, on the other hand, is like keeping your money in a bank. You still have access to your funds, but you also have all sorts of security and protection in the event of a robbery. 

At Perillon, customer data resides on our infrastructure at a fully redundant tier-1 SSAE16 SOCII compliance data center.  That means we employ strict information security policies and procedures to keep your data safe. 

2. Not using proper authentication and authorization

Authentication is way of verifying the identity of a user. You can think of it like showing your ID at airport security to prove that you are who you say you are. 

Authorization, on the other hand, is a way of determining verifying what you are allowed to do. You can think of it like showing your boarding pass at the gate to prove you are authorized to board a specific flight.

Can you imagine if anyone with a valid ID was allowed to board a flight without showing a boarding pass? Of course not.

In the same way, not everyone with a password should be allowed to access everything in your database.

At Perillon, we employ both authentication and authorization to keep your data secure. Our software provides "need to know access", with the ability to hide or show features and information depending on a user's role and group identity. 

3. Falling behind on updates

Failing to update your software doesn't just mean you won't have the latest and greatest features — it can also expose you to major security risks.

It doesn't take long for cyber-criminals to find holes in your software. The only way to stay ahead of them, then, is to update your software frequently. 

Another issue with outdated software: Bugs and crashes. At best, you'll have to deal with a program that freezes and restarts while you're in the middle of working. At worst, you could lose irreplaceable data. Both are an indication that you've outgrown your custom EHS software

One of the advantages of commercial software is that you'll have access to frequent updates. However, not all commercial software providers include updates in the cost of your initial purchase.

At Perillon, all customers are on the same software version and are updated concurrently during standard maintenance at no additional cost. 

4. Failing to properly train employees and contractors

Even if you buy software with all the security bells and whistles, there's still the human element of cybersecurity. IBM's 2014 Cyber Security Intelligence Index revealed that 95% of all security breaches are the result of human error. 

In other words, hackers don't have to break in to your system if employees are letting them in through the front door. 

It's why, at Perillon, we insist that all employees and contractors are trained to make sure they understand their role in security compliance and the consquences of non-compliance.

The bottom line

Storing data in-house, not using proper authentication and authorization, and failing to provide updates and training are among the most common software security risks. Fortunately, there are steps you can take to mitigate these risks.

Is it time to update your software? Download our free guide to help you discover which type of software is right for you:

New Call-to-action

 

SHARE THIS STORY | |

Search

Recent Posts

Subscribe to Blog