Security today is both a major concern and an overused, ambiguous buzzword …and by buzzword I really mean “selling point”. Ah yes, even we here at Cemsites.com use it to promote our own products and services.
So let us take a moment and assess this need for cemetery software to be secure and then after we have uncovered that, we’ll look at some potential liabilities for your cemetery to look for in your current application.
What is Security?
The dictionary definition is “the state of being free from danger or threat”. Well, now… that might be quite a comforting and accomplishable state, if we were no longer sharing this planet with other people, wild animals, nature, and gravity!
The unfortunate truth is nothing man-made is truly secure. There are only measures/degrees of security. I remember my Dad once telling me, “If somebody wants something bad enough, they are going to get it, no matter what you do to protect it.” Now, while that statement is so true… it never stopped him from locking our doors and hiding firearms within arm’s reach of his bed.
Therefore, the question really ought to be how secure is my cemetery software and how secure does it need to be? The true answers to these questions will depend on your organizations’ recognition of threats. Hopefully, this article will drive awareness of a few potential threats and help your organization take steps to secure those vulnerabilities.
Why Must Cemetery Software & Records be Secure?
This is an easy one. Need I say more?
- It stores private information (owners of plots/graves, SSN numbers, home addresses, financials, taxes, vendors, employees, etc.)
- It stores valuable information. How many years and dollars have you spent recording your cemetery file system/database?
- It stores irreplaceable information. This information if not duplicated and stored in several offsite locations can never be restored and can leave you at risk legally and operationally.
Potential Security Breaches in Your Cemetery Software / Database
Traditional desktop and local network software breaches:
- It can be stolen out of the office or physically tampered with by disgruntled customers or employees.
- It can be destroyed by fire, flooding, faulty equipment, accident, or other natural disaster.
- It’s prone to computer hardware failure. (Read more – How long do hard drives last for?)
- A lack of high grade network security hardware and software.
- A lack of armed guards and certified technicians on the payroll 24/7/365.
- A lack of daily offsite backups of the software itself as well as the data.
- A lack of role based security – the ability to limit access to the system based upon job description/function.
- A lack of encryption of sensitive and personal data. Simple password protection is not enough for enterprise use. Non-public information (Like SSN #’s) must be encrypted.
Cloud based software Breaches:
SURPRISE! Although the cloud aims to minimize the above security risks, they are still prone to the same misuse, abuse, and disaster of traditional software. All software still runs on computers somewhere. The questions become: Who do you trust with your data? Do you have a contingency plan? Are you executing and testing your plan?
5 ways a good cloud cemetery software will minimize security vulnerabilities:
- The company behind the software is open and transparent about the degree of security it provides.
- The software provides the cemetery with a contingency plan that is NOT 100% dependent on the software company!
- The software provides the secure solutions to avoid the aforementioned “Common Security Breaches”.
- The software provides compliance with all major industry security standards (e.g. PCI DSS & HIPAA).
- The software is licensed & insured.
The Sales Pitch
We know the cemetery software industry is grossly outdated and negligent in abiding by basic security standards. That is why we offer a free evaluation of your current procedures and processes. We will make recommendations, no matter who you choose to keep your data safe!
We also know the heartbreaking stories of data loss and compromised software. Don’t let it happen to you, call us today for a free security assessment and consultation. 1-877-783-9626