Playing now

Playing now

The Hidden Cyber Risks of Siloed Financial Data

Money Matters

The Hidden Cyber Risks of Siloed Financial Data

People in an office

If you are a CFO or part of a finance team, you may find yourself at the center of an increasingly complicated threat landscape.  

Information you are responsible for is too often stored in unconnected databases, hard drives, and software applications, which teams export into spreadsheets and send across the organization as email attachments. Each data transfer and hand-off introduce a new set of risks—at a time when cyberattacks are rapidly increasing.  

Data compromises rose more than 68% in 2021, according to the Identity Theft Resource Center Breaches are also getting more expensive. The average cost of a breach rose 10% to $3.6 million last year, the IBM/Ponemon Institute’s 2021 Cost of a Data Breach survey found. 

In Foundry’s 2021 Digital Business study, over a third of business and IT leaders cited improving security as a top strategic objective, and 58% said security had taken on greater importance as a result of the pandemic, when many companies switched to remote operations. 

So, how can you do a better job of securing sensitive financial data?  

Don’t get bogged down by manual procedures 

When it comes to financial data, many security and compliance issues stem from the use of outdated, highly manual business processes that includes sharing financial data through spreadsheets and emails. Just having access to financial data and processes can make you an especially attractive target for cyberthieves. With manual processes and locally stored spreadsheets, you may send sensitive data to those who shouldn’t see it, or you might post it on internal messaging platforms that don’t meet compliance rules.  

If you share data with vendors and contractors, you take it out of your company’s control. Every new instance of data sharing opens the door to a potential breach. “When information changes hands, you don’t know who’s accessing it or who’s changing it,” explains Scott Freedman, Director of Marketing for Sage Intacct. 

Find safety in the cloud 

Consolidating financial information on a cloud-native platform creates a single source of truth, substantially reducing these types of risks. Cloud-native applications are built with granular controls for compliance and access. This allows you to provide different levels of information to stakeholders, via personalized dashboards that display all the information they need to do their jobs, but nothing more, building in a new level of safety for your data.   

Not all cloud-based applications provide the same level of safety precautions. Because security is critical, it’s important to determine whether a solution meets your specific needs. Here are some of the questions you should ask yourself: 

  • Audit and compliance controls: Does the solution support audits to validate compliance with all the rules we must follow? Examples include SSAE 18, SOC 1 Type II, SOC 2 Type II, ISAE 3402 and 3000, PCI-DCC Level 1, HIPAA, and GDPR. 
  • Security incident response: Does the solution support the ability to react quickly to actual or suspected unauthorized access? Does it review data logs for signs of trouble? 
  • Data loss prevention: Does the solution have technology to identify and prevent data loss in email, collaboration tools, and other internal systems?   
  • Monitoring and penetration testing: Does the provider monitor and review its servers and user activity? Does it conduct regular tests on data, applications, systems, and infrastructure?  
  • Network security: Does the solution have up-to-date firewalls and antivirus software? Does it also remove unnecessary features that could serve as portals to future hacks?  
  • Business continuity and disaster recovery: What are the vendor’s procedures for securely backing up and restoring our data in the event of an emergency? What does their solution do to prevent data loss and maintain data integrity during the transfers? 

A cloud-native application offers stronger protections for financial data than an on-premises system, but not all cloud providers are alike.  

Before making the transition, take the time to document your needs and prioritize making sure your critical data will be in the best cloud-based system for those needs. Keep it in good hands, and it will be ready for use by all stakeholders, at the right level of access to keep your business safe . 

Ask the author a question or share your advice

When you leave a comment on this article, please note that if approved, it will be publicly available and visible at the bottom of the article on this blog. While your email address will not be publicly available, we will collect, store and use it, along with any other personal data you provide as part of your comment, to respond to your queries offline, provide you with customer support and send you information about our products and services as requested.  For more information on how Sage uses and looks after your personal data and the data protection rights you have, please read our Privacy Policy.