{"id":13398,"date":"2022-07-14T09:12:00","date_gmt":"2022-07-14T13:12:00","guid":{"rendered":"https:\/\/www.sage.com\/en-us\/blog\/?p=13398"},"modified":"2026-02-06T09:26:03","modified_gmt":"2026-02-06T14:26:03","slug":"the-hidden-cyber-risks-of-siloed-financial-data","status":"publish","type":"post","link":"https:\/\/www.sage.com\/en-us\/blog\/the-hidden-cyber-risks-of-siloed-financial-data\/","title":{"rendered":"The hidden cyber risks of siloed financial data"},"content":{"rendered":"<header class=\"entry-header has-dark-background-color entry-header--has-illustration entry-header--has-illustration--generic\">\n\t<div class=\"container\">\n\t\t<div class=\"entry-header__row row align-center\">\n\t\t\t<div class=\"col col-lg-7 col-xlg-6 entry-header__content\">\n\t\t\t\t\t\t\t<div class=\"component component-single-header\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"entry-header__misc text--subtitle text--uppercase text--small\">\n\t\t\t\t\t\t\t<a href=\"https:\/\/www.sage.com\/en-us\/blog\/category\/money-matters\/\" class=\"entry-header__link\">Money Matters<\/a>\t\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"entry-title-wrapper\">\n\t\t\t\t\t<h1 class=\"entry-title\">\n\t\t\t\t\t\tThe hidden cyber risks of siloed financial data\t\t\t\t\t<\/h1>\n\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t<p class=\"entry-header__description\">\n\t\t\t\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t<div class=\"single-post-details container\">\n\t\t<div class=\"col\">\n\t\t\t<span class=\"posted-on \"><time class=\"entry-date published\" datetime=\"2022-07-14T09:12:00-04:00\">July 14, 2022<\/time><\/span><span class=\"reading-time\"> min read<\/span>\n\t\t<button\n\t\t\ttype=\"button\"\n\t\t\tclass=\"social-share-button button button--icon button--secondary js-social-share-button\"\n\t\t\tdata-share-title=\"The hidden cyber risks of siloed financial data\"\n\t\t\tdata-share-url=\"https:\/\/www.sage.com\/en-us\/blog\/the-hidden-cyber-risks-of-siloed-financial-data\/\"\n\t\t\tdata-share-text=\"Please read this interesting article\"\n\t\t>\n\t\t\t<span class=\"social-share-button__share-label\">Share<\/span>\n\t\t\t<span class=\"social-share-button__copy-label\" hidden>Copy Link<\/span>\n\t\t\t<span class=\"social-share-button__copy-tooltip\" aria-hidden=\"true\" hidden>Copied<\/span>\n\t\t<\/button>\n\n\t\t\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\n\n<div class=\"wp-block-post-author has-dark-background-color alignfull\">\n\t<div class=\"container\">\n\t\t<div class=\"col\">\n\t\t\t\t\t\t\t<div class=\"co-authors\">\n\t\t\t\t\t\n\t\t<div class=\"entry-author-wrapper\">\n\t\t\t<a class=\"entry-author\" href=\"https:\/\/www.sage.com\/en-us\/blog\/author\/teresa-meek\/\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"40\" height=\"40\" src=\"https:\/\/www.sage.com\/en-us\/blog\/wp-content\/uploads\/sites\/2\/2022\/08\/Teresa20outdoor20laptop20large-350x350.jpg\" class=\"entry-author__image\" alt=\"Teresa Meek\" srcset=\"https:\/\/www.sage.com\/en-us\/blog\/wp-content\/uploads\/sites\/2\/2022\/08\/Teresa20outdoor20laptop20large-350x350.jpg 350w, https:\/\/www.sage.com\/en-us\/blog\/wp-content\/uploads\/sites\/2\/2022\/08\/Teresa20outdoor20laptop20large-768x768.jpg 768w, https:\/\/www.sage.com\/en-us\/blog\/wp-content\/uploads\/sites\/2\/2022\/08\/Teresa20outdoor20laptop20large-810x810.jpg 810w, https:\/\/www.sage.com\/en-us\/blog\/wp-content\/uploads\/sites\/2\/2022\/08\/Teresa20outdoor20laptop20large-1536x1536.jpg 1536w, https:\/\/www.sage.com\/en-us\/blog\/wp-content\/uploads\/sites\/2\/2022\/08\/Teresa20outdoor20laptop20large-2048x2048.jpg 2048w\" sizes=\"auto, (max-width: 40px) 100vw, 40px\" \/>\t\t\t\t<span class=\"entry-author__name\">Teresa Meek<\/span>\n\t\t\t<\/a>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<p>CFOs and their finance teams are in many ways at the center of an increasingly complicated threat landscape. The information they use is too often stored in unconnected databases, hard drives, and software applications, which teams export into spreadsheets and send across the organization as email attachments. Each data transfer and hand-off introduce a new set of risks \u2013 at a time when cyberattacks are rapidly increasing. Data compromises rose more than 68% in 2021, according to the <a href=\"https:\/\/www.idtheftcenter.org\/post\/identity-theft-resource-center-2021-annual-data-breach-report-sets-new-record-for-number-of-compromises\/\" target=\"_blank\" rel=\"noopener\">Identity Theft Resource Center<\/a>.<\/p>\n\n\n\n<p>Breaches are also getting more expensive. The average cost of a breach rose 10% to $3.6 million last year, the IBM\/Ponemon Institute\u2019s 2021 Cost of a Data Breach survey found.<\/p>\n\n\n\n<p>Leadership teams know they need to do a better job of securing sensitive financial data. In Foundry\u2019s <a href=\"https:\/\/foundryco.com\/tools-for-marketers\/research-digital-business\/\" target=\"_blank\" rel=\"noopener\">2021 Digital Business study<\/a>, over a third of business and IT leaders cited improving security as a top strategic objective, and 58% said security had taken on greater importance as a result of the pandemic, when many companies switched to remote operations.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-bogged-down-by-manual-procedures\">Bogged down by manual procedures<\/h3>\n\n\n\n<p>When it comes to financial data, many security and compliance issues stem from the use of outdated, highly manual business processes, including sharing financial data through spreadsheets and emails. People with access to financial data and processes are especially attractive targets for cyberthieves. With manual processes and locally stored spreadsheets, people may send sensitive data to those who shouldn\u2019t see it or post it on internal messaging platforms that don\u2019t meet compliance rules. They also may share it with vendors and contractors, taking it out of company control. Every new instance of data sharing opens the door to a potential breach. \u201cWhen information changes hands, you don\u2019t know who\u2019s accessing it or who\u2019s changing it,\u201d explains Scott Freedman, Director of Marketing for Sage Intacct.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-safety-in-the-cloud\">Safety in the cloud<\/h3>\n\n\n\n<p>Consolidating financial information on a cloud-native platform creates a single source of truth, substantially reducing these types of risks. Cloud-native applications are built with granular controls for compliance and access. This allows finance managers to provide different levels of information to different stakeholders, via personalized dashboards that display all the information they need to do their jobs, but nothing more.<\/p>\n\n\n\n<p>Not all cloud-based applications provide the same level of safety precautions. Because security is critical, it\u2019s important to determine whether a solution meets your specific needs. Here are some of the questions financial professionals should ask:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Audit and compliance controls:<\/strong> Does the solution support audits to validate compliance with all the rules we must follow? Examples include SSAE 18, SOC 1 Type II, SOC 2 Type II, ISAE 3402 and 3000, PCI-DCC Level 1, HIPAA, and GDPR.<\/li>\n\n\n\n<li><strong>Security incident response:<\/strong> Does the solution support the ability to react quickly to actual or suspected unauthorized access? Does it review data logs for signs of trouble?<\/li>\n\n\n\n<li><strong>Data loss prevention:<\/strong> Does the solution have technology to identify and prevent data loss in email, collaboration tools, and other internal systems?<\/li>\n\n\n\n<li><strong>Monitoring and penetration testing:<\/strong> Does the provider monitor and review its servers and user activity? Does it conduct regular tests on data, applications, systems, and infrastructure?<\/li>\n\n\n\n<li><strong>Network security:<\/strong> Does the solution have up-to-date firewalls and antivirus software? Does it also remove unnecessary features that could serve as portals to future hacks?<\/li>\n\n\n\n<li><strong>Business continuity and disaster recovery: <\/strong>What are the vendor\u2019s procedures for securely backing up and restoring our data in the event of an emergency? What does their solution do to prevent data loss and maintain data integrity during the transfers?<\/li>\n<\/ul>\n\n\n\n<p>A cloud-native application offers stronger protections for financial data than an on-premises system, but not all cloud providers are alike. Before making the transition, take the time to document your needs and make sure your critical data will be in good hands.<\/p>\n\n\n\n<p>To learn more about Sage Intacct, check out our daily <a href=\"https:\/\/www.sage.com\/en-us\/sage-business-cloud\/intacct\/coffee-break-demo\/\n\" target=\"_blank\" rel=\"noopener\">Coffee Break Demo<\/a>.<\/p>\n\n\n<div class=\"single-cta\">\n\t<div class=\"single-cta__positioner\">\n\t\t<div class=\"single-cta__wrapper has-dark-background-color\">\n\t\t\t<div class=\"single-cta__content\">\n\t\t\t\t\t\t\t\t<h2 class=\"single-cta__title h3\">Subscribe to our Sage Advice Newsletter<\/h2>\n\n\t\t\t\t\t\t\t\t\t<div class=\"single-cta__description\">\n\t\t\t\t\t\t<p>Get our latest business advice delivered directly to your inbox.<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"#gate-ab515c6e-7e90-4c2f-a67e-113872516e8b\"\n\t\t\t\t\t\tclass=\"single-cta__button button button--primary\"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t>Subscribe<\/a>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<img decoding=\"async\" width=\"1440\" height=\"810\" src=\"https:\/\/www.sage.com\/en-us\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/GettyImages-1073797282-1440x810.jpg\" class=\"single-cta__image\" alt=\"Working from home with tea in hand\" loading=\"lazy\" srcset=\"https:\/\/www.sage.com\/en-us\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/GettyImages-1073797282-1440x810.jpg 1440w\" sizes=\"auto, (min-width: 48em) 33vw, 100vw\" \/>\t\t\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>CFOs and their finance teams are in many ways at the center of an increasingly complicated threat landscape. The information they use is too often stored in unconnected databases, hard drives, and software applications, which teams export into spreadsheets and send across the organization as email attachments. Each data transfer and hand-off introduce a new [&hellip;]<\/p>\n","protected":false},"author":1428,"featured_media":9302,"menu_order":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_sage_video":false,"post_featured_image_hide":false,"footnotes":""},"categories":[158,43,48,49],"tags":[2,334,4,427,420,346],"business_type":[40,312,41],"lilypad":[],"context":[418,430],"industry":[57,55,204],"persona":[150,100,98,97],"imagine_tag":[209,436],"coauthors":[919],"class_list":["post-13398","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-accountants","category-money-matters","category-technology-innovation","category-trends-insights","tag-accountants","tag-automation","tag-business-intelligence","tag-cfo","tag-cloud-financial-management","tag-cloud-technology","business_type-small-business","business_type-accountants","business_type-growing-business","industry-financial-services","industry-professional-services","industry-technology"],"sage_meta":{"region":"en-us","author_name":"Teresa Meek","featured_image":"https:\/\/www.sage.com\/en-us\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/GettyImages-1307905824.jpg","imagine_tags":{"209":"Accounting","436":"Intacct Accounting"}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Sage Advice US","distributor_original_site_url":"https:\/\/www.sage.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/posts\/13398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/users\/1428"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/comments?post=13398"}],"version-history":[{"count":0,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/posts\/13398\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/media\/9302"}],"wp:attachment":[{"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/media?parent=13398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/categories?post=13398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/tags?post=13398"},{"taxonomy":"business_type","embeddable":true,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/business_type?post=13398"},{"taxonomy":"lilypad","embeddable":true,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/lilypad?post=13398"},{"taxonomy":"context","embeddable":true,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/context?post=13398"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/industry?post=13398"},{"taxonomy":"persona","embeddable":true,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/persona?post=13398"},{"taxonomy":"imagine_tag","embeddable":true,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/imagine_tag?post=13398"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.sage.com\/en-us\/blog\/api\/wp\/v2\/coauthors?post=13398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}