Digital MarketingEmail MarketingStanding at the Edge of the Precipice of Consumer Trust

Standing at the Edge of the Precipice of Consumer Trust

If consumers don't believe they can trust you with their data, they won't give it to you.

Over the past few months there have been a series of well-planned phishing attacks on our industry. The attacks have focused on assorted corners of our world: multiple email service providers (ESPs), a delivery assurance company, blue-chip brands, even a leading security/risk prevention company. The fact of the matter is that all businesses that collect, store, analyze, or send information are vulnerable. This, by the way, is not a new story; it’s just currently getting some well-needed attention.

The first and obvious concern about the breaches is how much data was compromised and who now has access to it? Ultimately, this question will be answered and the respective damage control will ensue.

The bigger issue is well-beyond the unauthorized release of a large number of email addresses. We are standing at the edge of a precipice of consumer trust. If consumers don’t believe they can trust you with their data, they won’t give it to you.

The timing of these breaches in combination with a global call for better legislation or self-regulation about data privacy and data security raises the need for us to take a hard look at how we keep our clients’ and their customers’ personal and sometimes sensitive data secure.

We all know that it is impossible to be completely impenetrable. There are, however, many simple things that can be done to mitigate the risk of being comprised. Here are a few pointers to help protect your data:

  • Perform an internal or independent third-party audit to identify where you are vulnerable
  • Audit user rights for employees and clients
  • Don’t send usernames or password combinations via email
  • Don’t store passwords in publically accessible areas: WIKIs, sticky-notes, or plain text files
  • Use encryption whenever transferring data over a public network
  • Make security awareness a critical part of your employee education program
  • Adopt a consumer education policy that includes a simplified privacy policy
  • Adhere to information security standards such as ISO 27001

You should also be thinking about how you would actually handle a breach. Do you have a plan in place to handle events like this? Here are a few suggestions on how to be prepared to deal with a crisis.

  • Establish a cross-functional security team that includes key members of the company
  • Define specific roles for management, IT, and client services
  • Have the ability to analyze and identify the cause of the breach
  • Contain the problem immediately
  • Have a communication plan for employees and customers
  • Reach out to the appropriate authorities (e.g., police, FBI)

While the media frenzy around this subject has been sensationalized out of proportion, it has forced us to take a hard look at how we handle data security at our respective companies. The days of leaving your front door unlocked or your keys in the car at night are long behind us. It’s finally time to dust off that punch-list of security fixes you’ve been meaning to get to for the past few years. We don’t need new laws to tell us how to do this, just a little common sense. An ounce of prevention and preparedness will go a long way toward building trust with consumers and protecting the emerging online channel we rely on to do business.

Related Articles

7 things everyone forgets to ask their email marketing vendor

Email 7 things everyone forgets to ask their email marketing vendor

1y Chris Camps
Why no-one is reading your emails (and what they’re doing instead)

Email Why no-one is reading your emails (and what they’re doing instead)

2y Sarah Perry
Reviving sluggish sales with email personalization

Conversion & ROI Reviving sluggish sales with email personalization

3y Guest Writer
Four ideas to inspire your next email marketing test

Advanced Email Marketing Four ideas to inspire your next email marketing test

3y Jeanne Jennings
A beginning of year audit checklist for your email marketing program

Email A beginning of year audit checklist for your email marketing program

3y Derek Harding
Two more New Year’s resolutions to add to your list

Email Two more New Year’s resolutions to add to your list

3y Scott Roth
Setting the stage for a successful email marketing automation campaign

Email Marketing Optimization Setting the stage for a successful email marketing automation campaign

3y Jeanne Jennings
How top email marketers defend value by ensuring trust

Email How top email marketers defend value by ensuring trust

3y Scott Roth