Salesforce Shield Receives an Upgrade

panel of virtual locks: Ad Victoriam Solutions Salesforce® Blog

Salesforce Shield was introduced in early 2015 as a simple tool that allows businesses to view their data, encrypt that data if necessary, and archive/review data values from up to ten years ago. These functions are available for all Salesforce apps built on the Salesforce1™ platform, on which Shield was natively built.

Earlier this month, Salesforce announced that Shield would be receiving an upgrade, Transaction Security, to ensure that business’s data is not only be more secure but also more easily accessed and protected should a threat be detected.

In an age where business data can be collected and accessed from a growing range of devices, it has become more important to create apps that allow data to be monitored and protected more closely. Previously, a suspicious login or strange data activity would be detected, but protective measures put into place would not adjust once these threats were realized.

With Transaction Security, Chief Information Security Officers will possess the ability to interact with data in real-time, encrypting data that was subject to suspicious activity or blocking access to the data altogether. The Salesforce blog describes this as “IT [moving] from a reactive to a proactive stance” that allows for a better overall experience with data. Transaction Security also allows businesses to create custom policies to suit their respective needs and still operates across all apps that are native to the Salesforce App Cloud™.

“Transaction Security empowers CISOs with the ability to leverage the entire Salesforce ecosystem and take their compliance and governance to an entirely new level,” wrote Salesforce blogger Brian Goldfarb.

To see how Salesforce solution can help your business succeed in the modern age, chat with a Salesforce certified consultant at Ad Victoriam Solutions. You can start by reading our blog article 4 Strategies for Developing a Strong Cloud Infrastructure to learn more about better managing cloud security or contact one of our experienced consultants today. 

Facing the Facts: IoT Security Concerns and Solutions

The Internet of Things is without a doubt one of the most influential tools businesses can use to gather useful data and information, allowing for smarter business decisions and improved services for customers. However, as Uncle Ben said in the Spiderman movies: “With great power comes great responsibility” – especially when it comes to securing the Internet of Things from hackers and cyber threats.

Here’s a look at the security concerns associated with the IoT and what solutions businesses are providing to protect cloud devices from fraud.

The Problems

The most obvious weakness for the IoT is its massive size. Billions of objects have Internet capabilities, and that number is growing every single day. With more avenues for penetration comes the growing risk of breaching the security measures in place. Security threats are also easily projected onto the types of devices often associated with the IoT: smart appliances, home security systems or fitness trackers. These devices are not outfitted with proper security software, leaving them more vulnerable to threats.

To add to this, the Internet of Things is so new that there is no real agreement as to how its security should be handled. What steps or programs should be put to use to protect not only the data but the privacy of the business and the public? This question, as of late, has hardly any answers.

Potential Solutions

While there is no consensus on a solution to the IoT’s security issues, there are certain steps that businesses, and in some cases the public, have been implementing themselves to secure data and privacy. They include:

  • Updating or finding new security software that may better cover IoT devices
  • Expanding networks and staff assigned to network security
  • Integrating security concerns into IoT product development
  • Informing staff and customers about the security risks associated with IoT use

Many desire a standardized, widespread security solution for the IoT, and this may become a reality in the future once more companies and individuals put investment dollars toward the research needed. Until then, the Internet of Things will continue to provide an abundance of useful data for businesses despite its security holes.

For more information about the Internet of Things and how it works hand-in-hand with businesses and expanding technologies, check out our blog or talk to one of our professional IoT consultants today.