If we don't plug the gaps, data security will go down the drain by Glyn Dodd, managing director of Centrex Services

Data security breaches have the potential to cripple a business. The fallout from the loss of sensitive data for example, could include legal costs, lost revenue from customer deflections and the need to repair a damaged reputation.

This applies to breaches in the supply chain, and businesses simply cannot afford to place at risk the vast amounts of personal information, and other sensitive corporate and customer data that is collected, stored and transferred via their technology.


Yet, data security and integrity is being lost and mismanaged at various points in the service supply chain on a daily basis, placing businesses at critical risk.


Storing awareness

Many organisations compromise their sensitive data when working with a variety of partners because there is a lack of understanding of where and how the data lives on - not just on computers and server hard drives, but across a wide range of devices, including printers, copiers, scanners and fax machines.

Printer hard drives, for example, contain readily obtainable data, such as copies of bank cheques and drivers' licenses. Organisations must have the necessary checks in place before placing hardware with the ability to store sensitive data into partners' hands. Otherwise, they place their critical information at great risk.


While businesses need to foster a greater sense of awareness over the information stored on their technology, I believe the threat of data security breach is also heighted by critical gaps in the service supply chain.

Data security integrity is at risk because partners in the maintenance sector are operating in silos. This is a key reason why complex supply chains need to be simplified; these silos have led to gaps within operational activity and data protection has slipped into these chasms.



Information meltdown

I fear it's only a matter of time before we witness an alarming rise in data security lapses. It would be very easy for example, for a business to place a printer or mobile device into break fix, and for it to end up at a rival organisation, with a customer's personal information still included.

Businesses must act now, putting processes in place to enable them to have a greater understanding of the information stored on their technology. Firms can also help to overcome the critical gaps in the service supply chain by considering an approach which takes the core principles of lean manufacturing and applies them to the supply chain.


This approach is called 'leansourcing'; a methodology that questions what, where, when and why sourcing decisions are made from this very simple but effective standpoint. It allows a business to get an end-to-end handle on the supply chain they work within, and enables it to strengthen its data security processes.


Plugging the gaps

Security and data protection has long been the elephant in the room. Businesses now need to figure out how to improve IT security and data protection capabilities, utilising partners that fully comprehend the nature of the threats to which businesses are now routinely exposed.


By doing this, organisations can have a better grasp of how to improve their risk management exposure, or the changes to their processes needed to support any security and data protection technology enhancements. This will enable businesses to streamline, and easily manage their supply chain, by removing the complexity of maintaining technology equipment.


In turn, this will bring greater transparency to the entire supply chain; helping companies to plug the gaps before businesses critical data is lost down the proverbial drain pipe.