The Support Group Blog

Seeing the Forest through the Trees with FileMaker Pro

A FileMaker Pro customer success story: the Nebraska Forest Service.

The Nebraska Forest Service uses FileMaker Pro to reduce operational redundancies and centralize data in order to protect natural forest resources and educate the community.

Read More

FileMaker Security Best Practices

Security is a very sensitive topic these days. Data breaches, privacy violations, malicious attacks, etc. seem to dominate national and international news stories. As we become more connected, our data becomes more attractive and consequently more vulnerable to hackers. So, we need to take proper precautions to mitigate those threats.

Company databases are particularly susceptible to threats because data is the new oil. We rely on data to make important business decisions that ultimately impact revenue and overall business success. Therefore, we must take the time and effort to establish appropriate safeguards for our data resources. 

DATA PRIVACY STANDARDS & REGULATION

In light of the fallout from Facebook's privacy breach and the impending General Data Protection Regulation (GDPR), data privacy warrants particular attention. Since extra data about people can be a liability when it comes to security, it's best to be conservative and only collect the data you need. Secure the data in your custom app according to industry standards and within your contact's expectations. For example, if you're in the healthcare field and you collect medical information from patients, you may want to audit your system’s architecture for HIPAA compliance. And you should always consider HIPPA before adding new data points to the database. If your data is accessible to third parties, you have to let your contacts know and confirm their consent before sharing their information. Whether you're engaging with folks in the US or the EU, be aware of the specific laws that protect different users/contacts and be sure you can adequately respond to questions about your data privacy procedures.

Read More
  • Page 0 of 1
  • 0
  • 1
  • »