{"id":2323,"date":"2021-03-23T15:27:14","date_gmt":"2021-03-23T15:27:14","guid":{"rendered":"https:\/\/devbloglavaprotocols.nityo.in\/let-salesforce-secure-your-data\/"},"modified":"2021-03-23T15:27:14","modified_gmt":"2021-03-23T15:27:14","slug":"let-salesforce-secure-your-data","status":"publish","type":"post","link":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/let-salesforce-secure-your-data\/","title":{"rendered":"Let Salesforce Secure Your Data"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><strong><i>By Swatil Binte Mahmud, Blogger, Lava Protocols<\/i><\/strong><\/p>\n<p><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">If you have an online account, your biggest concern is your password which is expected to be unique and hard to guess. We are required to come up with passwords that are long, unpredictable, a mix of numbers and alphabets, and sometimes even characters. A good amount of thought and time is spent on securing your account. Wouldn\u2019t you want the same for your business? In 2018, approximately 1.5 million patients\u2019 non-medical records\u00a0<a href=\"https:\/\/www.freemalaysiatoday.com\/category\/nation\/2018\/07\/25\/lessons-malaysia-can-draw-from-singhealths-cyber-attack\/\">were stolen<\/a> from the SingHealth (a group of healthcare institutions in Singapore) database. To add to that, about 160,000 patient\u00a0<\/span><span style=\"font-weight: 400;\">medical records\u00a0\u2014\u00a0including that of the current Singapore Prime Minister Lee Hsien Loong\u2019s\u00a0\u2014\u00a0were accessed illegally. This is one example of a huge case of a data breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers are targeting businesses instead of individuals. They can impersonate email service providers and Software as a Service (SaaS) platforms to steal corporate data and access their systems. Once an individual <\/span><span style=\"font-weight: 400;\">accidentally gives access to his\/ her account, hackers can\u00a0<\/span><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2019\/01\/10\/four-phishing-attack-trends-to-look-out-for-in-2019\/#7aede55b4ec2\"><span style=\"font-weight: 400;\">access all sorts of data<\/span><\/a><span style=\"font-weight: 400;\">\u00a0from the organization. They can use this to send malicious emails to other employees. That is why your business needs a safe space where you can store your data and peacefully sleep at night. Salesforce uses a variety of methods to ensure that your data is safe, secure, and available only to registered users in your organization.\u00a0More and more individuals, companies, and even government organizations are choosing to store their valuable information with Salesforce. Salesforce utilizes some of the most advanced technology for Internet security available today.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some ways you can secure your data:<\/span><\/p>\n<h3><strong>Two-step verification and multi-factor authentication<br \/><\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Google has an option where every time you sign in to <\/span><span style=\"font-weight: 400;\">your Google account, you will need to put a password and verification code. The code is sent via text message, voice call, or Google\u2019s mobile app. This way, even if hackers somehow get a hold of your password, they cannot log in. The moment you yourself sign in from another device, two-step verification is needed. The two-step verification can help you protect your personal and work email and Google accounts by simply adding another step to your daily log-in <\/span><span style=\"font-weight: 400;\">routine. If you are not using Google, you can check the security measures of the service provider you use.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Multi-factor authentication adds an extra layer of protection against common threats like phishing attacks, credential stuffing, and account takeovers. Salesforce offers simple, innovative MFA solutions that provide a balance between strong security and user convenience.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" data-attachment-id=\"13446\" data-permalink=\"https:\/\/www.lavaprotocols.com\/2021\/03\/23\/let-salesforce-secure-your-data\/two-step-authentication-and-verification-online-account-login-co\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2021\/03\/march-2.2-small.jpg?fit=674%2C449&#038;ssl=1\" data-orig-size=\"674,449\" data-comments-opened=\"0\" data-image-meta=\"{\"aperture\":\"2.8\",\"credit\":\"Stevanovic Igor\",\"camera\":\"NIKON D850\",\"caption\":\"Two-step authentication and verification online internet account login concept. Casual adult caucasian freelancer man is using smartphone and laptop computer to sign in.\",\"created_timestamp\":\"1563799878\",\"copyright\":\"Stevanovic Igor [**] Bits&#038;Splits\",\"focal_length\":\"50\",\"iso\":\"100\",\"shutter_speed\":\"0.01\",\"title\":\"Two-step authentication and verification online account login co\",\"orientation\":\"1\"}\" data-image-title=\"\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2021\/03\/march-2.2-small.jpg?fit=300%2C200&#038;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2021\/03\/march-2.2-small.jpg?fit=674%2C449&#038;ssl=1\" loading=\"lazy\" class=\"alignnone wp-image-13446 size-full\" src=\"https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/march-2_2-small.jpg\" alt=\"\" width=\"674\" height=\"449\" srcset=\"https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/march-2_2-small.jpg 674w, https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/march-2_2-small-480x320.jpg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 674px, 100vw\" data-recalc-dims=\"1\"><\/p>\n<p>\u00a0<\/p>\n<h3><strong>Strong CRM platform security<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">If you are using a Customer Relationship Management (CRM) platform such as Salesforce, there are several\u00a0<\/span><a href=\"https:\/\/help.salesforce.com\/articleView?id=security_overview_2fa.htm&#038;type=5#security_overview_2fa\"><span style=\"font-weight: 400;\">security measures<\/span><\/a><span style=\"font-weight: 400;\"> you can take. One is the two-factor authentication approach. You can set this up for every user\u2019s login, log in through API (for developers and client applications), and access to features such as reports and apps. Users would have to either download a Salesforce\/Google mobile authenticator app (to receive push notifications or OTPs via the app) or use a U2F security key as the second-factor authentication. The second security measure you can take is to include IP range restrictions. This means you will be restricting users to log in only from your company network or a VPN (a virtual private network).<\/span><\/p>\n<h3><strong>Shifting from on-site data to Cloud<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">In-house or on-site data management carries more problems than solutions. Data stored in on-site servers are susceptible to several dangers, from natural disasters and fires to office break-ins, <\/span><span style=\"font-weight: 400;\">to employee error. If your servers are damaged or stolen, then massive amounts of valuable data may be lost forever.\u00a0Cloud security, particularly for businesses, is demonstrating itself to be a much more reliable option. <\/span><a href=\"https:\/\/www.salesforce.com\/products\/what-is-salesforce\/\"><span style=\"font-weight: 400;\">Salesforce<\/span><\/a><span style=\"font-weight: 400;\">, the\u00a0<\/span><a href=\"https:\/\/www.salesforce.com\/crm\/top-rated\/\"><span style=\"font-weight: 400;\">leading authority<\/span><\/a><span style=\"font-weight: 400;\">\u00a0in cloud-based CRM, recognizes the need for a secure cloud. To provide clients with the most secure solutions possible, Salesforce incorporates a\u00a0<\/span><a href=\"https:\/\/www.salesforce.com\/hub\/technology\/cloud-security-is-salesforce-priority\/\"><span style=\"font-weight: 400;\">range of security tools<\/span><\/a><span style=\"font-weight: 400;\">\u00a0into every service they provide.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The cloud effectively eliminates several of the security concerns, simply by being located off-site. <\/span><span style=\"font-weight: 400;\">Disasters, break-ins, and disgruntled employees do not have access to the physical servers that make up the cloud, and most cloud providers ensure that access to data is closely monitored.\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<p><img decoding=\"async\" data-attachment-id=\"13447\" data-permalink=\"https:\/\/www.lavaprotocols.com\/2021\/03\/23\/let-salesforce-secure-your-data\/data-the-cloud-storage-information-concept\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2021\/03\/march-2.3-small.jpg?fit=674%2C481&#038;ssl=1\" data-orig-size=\"674,481\" data-comments-opened=\"0\" data-image-meta=\"{\"aperture\":\"3.2\",\"credit\":\"\",\"camera\":\"NIKON D810\",\"caption\":\"Data The Cloud Storage Information Concept\",\"created_timestamp\":\"0\",\"copyright\":\"Rawpixel Ltd.\",\"focal_length\":\"50\",\"iso\":\"100\",\"shutter_speed\":\"0.00625\",\"title\":\"Data The Cloud Storage Information Concept\",\"orientation\":\"1\"}\" data-image-title=\"\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2021\/03\/march-2.3-small.jpg?fit=300%2C214&#038;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2021\/03\/march-2.3-small.jpg?fit=674%2C481&#038;ssl=1\" loading=\"lazy\" class=\"alignnone wp-image-13447 size-full\" src=\"https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/march-2_3-small.jpg\" alt=\"\" width=\"674\" height=\"481\" srcset=\"https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/march-2_3-small.jpg 674w, https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/march-2_3-small-480x343.jpg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 674px, 100vw\" data-recalc-dims=\"1\"><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">Your data is valuable, and cybercriminals are targeting companies more than ever before. It is estimated that\u00a037,000 websites\u00a0are hacked every day, with\u00a0<a href=\"https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/\">nearly half<\/a> of all cybercrimes targeting small businesses. Therefore, connecting with the right IT or cloud service provider would be a good place to start to secure your data and business. Lava Protocols has worked with numerous clients over the past decade with its cloud solution implementation and data security. Salesforce and Lava Protocols work with clients across different industries such as Financial Services, Telco, Government, Aviation, etc. and <\/span><span style=\"font-weight: 400;\">have helped them to ensure best practices in terms of data security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you still do not have your data secured, check out Salesforce and Lava Protocols to do so!<\/span><\/p>\n<hr>\n<p><strong><i>Lava Protocols is an\u00a0<\/i><\/strong><strong><i>authorized<\/i><\/strong><strong><i> Salesforce Partner<\/i><\/strong><strong><i>.\u00a0<\/i><\/strong><strong><i>Want to manage your CRM better? Drop us an email to schedule your <\/i><\/strong><strong><i>demo:\u00a0<\/i><\/strong><strong><i><a class=\"Xx\" dir=\"ltr\" href=\"mailto:hello@lavaprotocols.com\" target=\"_blank\" rel=\"nofollow noreferrer noopener\" data-display=\"hello@lavaprotocols.com\" data-sanitized=\"mailto:hello@lavaprotocols.com\" tabindex=\"-1\">hello@lavaprotocols.com<\/a><\/i><\/strong><strong><i>.<\/i><\/strong><\/p>\n<p><span class=\"et_bloom_bottom_trigger\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is estimated that 37,000 websites are hacked every day, with nearly half of all cybercrimes targeting small businesses.<\/p>\n","protected":false},"author":1,"featured_media":2324,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[99,18,59],"class_list":["post-2323","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-automation","tag-blog","tag-cloud-horizon"],"jetpack_featured_media_url":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-content\/uploads\/2024\/10\/march-2_1-small.jpg","_links":{"self":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/comments?post=2323"}],"version-history":[{"count":0,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2323\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media\/2324"}],"wp:attachment":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media?parent=2323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/categories?post=2323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/tags?post=2323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}