Unfortunately, in our increasingly “joined up” world, our personal details are often being shared without our knowledge or consent. If you regularly make online purchases, then before long your details will find their way into the hands and laptops of scammers.
As a result, we are all more aware than ever before of the importance of protecting our personal information and being cautious with whom we share our details. This is a necessary precaution if we want to enjoy the benefits of the technology we use.
As the providers of Flexi-Grant® we accept that we have a clear responsibility to ensure that the (often sensitive) data that is collected and stored by our clients through our software is secure and as well protected as it can be.
We believe that it is NOT enough to simply SAY that your data is secure, rather we believe it is important to PROVE this during selection. So, you can imagine our continuing surprise, frustration and amazement over the past few years when a significant number of prospective clients have repeatedly chosen to ignore, avoid or curtail our attempts to discuss the importance of data security and our ongoing efforts to provide this.
Why is security not front and centre in EVERY systems selection? Why is a conversation often avoided? If you are not prepared to make time to talk about the important stuff then what is the point of us engaging in a protracted selection process? (And yes, when important conversations are avoided often the process strangely takes longer than it should to complete!)
A few timely questions to gather evidence on the security of the system being procured (and we mean ALL systems not just grant management systems!) is a vital step in any system selection process. This needs to be more than just a few passing questions at the tail end of a demonstration to put a tick in a box but a dedicated segment/session in its own right!
It’s easy and tempting to cut corners with many different stakeholders perhaps focusing on different things and time pressures mounting but security cannot EVER be ignored. Accompanying this article is a very simple set of questions to help you ensure that you are getting the information you need to assure the system you are examining is secure.
It is NOT meant to be a definitive list of everything you should ask and explore but hopefully it goes some way to starting an essential conversation! This checklist and any security conversation should be built on the following guiding principles:
As a supplier we would like you to pick our software but we appreciate that we will not always win. it However, when we are not selected and know that security has NOT been properly considered! – we worry for the organisation, its applicants, its employees and its trustees and the security of their data.
Too dramatic? When you consider that there have been data breaches from grant management software solutions, its clear that this is a real and continuing issue we all must strive to raise awareness on. As a sector we need to talk more about data security and what we are doing to make our solutions more robust.
Keith Turkington
Grant Management Advocate
P.S. we practice what we preach and have regular INDEPENDENT security reviews of our software. Yes, we are ISO27001 and cyber security essentials certified but data security is discussed, lived and breathed in EVERYdevelopment, implementation and training activity we do and then validated externally so we know we are not fooling ourselves or taking shortcuts. Want a cheaper solution? Buy something insecure and see what the REAL cost is long term.