Just recently, T-Mobile, which employs software as a service (or "cloud") technologies to store its customers' data, suffered a serious systems failure. This failure cost many of its customers their contact information. Following the event, it was blogged how these "incidents clearly illustrate that whenever organizations entrust their data to a third party, whether via a cloud computing service or a traditional outsourcing arrangement, it is important to carefully evaluate the vendor's technical and operational capabilities to fully protect the data to mitigate potential business risks."
The T-Mobile incident and other similar occurrences underscore the urgent need for executives to better understand the security protocols of their current or prospective SAAS providers. As such, here are a few tips executives at any size business should use when seeking out SAAS services.
What constitutes data protection?
Data protection concerns should be the critical deciding factor in selecting a SAAS provider. But it's not security against hackers and viruses that should stir the most alarm; rather, it's the loss of irreplaceable data due to outages and technical glitches that's proven most problematic.
Whether this data is found in e-mail messages, contracts or other critically important business documents, the permanent loss of such information can and has proven devastating to companies of all sizes.