Early last year, Salesforce announced that they would be requiring their customers to use multi-factor authentication (MFA) on all Salesforce products, beginning February 1, 2022. With less than a week before this new cybersecurity measure is implemented, we wanted to walk you through the benefits of MFA and how you can get your users comfortable with the technology on the Salesforce platform.
As we enter 2022, we wanted to look back on a few Salesforce blog posts that our readers loved. Over the past twelve months, we did our best to share a wealth of industry knowledge on topics like regulatory compliance and security best practices — if you didn’t get a chance to read the posts last year, here’s your chance to catch up!
2022 is ramping up quickly — but before we turn our energy over to the exciting new releases and resources we’ve got planned for the next 12 months, we wanted to quickly look back on some of our most popular posts and important takeaways from last year.
In the last decade, companies have made a huge switch from legacy, on-premise servers to cloud-based applications. This shift has had lots of benefits — increased flexibility, lower costs to scale, etc. — but it's also required a massive migration of data to the cloud. Salesforce, for example, has over 150,000 customers — many of which purchased the platform to replace an older, slower application that likely couldn’t keep up with their evolving business needs.
Access management is arguably one of the most important components of front-line Salesforce security — but there's a lot more to it than just password policies. We covered the Salesforce Security Health Check in a previous post, but if you want to get about managing access, you need to understand roles, profiles and permission sets. Without proper visibility into how these controls work — and how they affect what users can see and do on the platform — you could be vulnerable to any number of security and compliance risks.
It shouldn't be a shock to point out that data breaches carry a huge reputational risk — one that almost always impacts the bottom line. As we can see from any number of recent, highly publicized incidents, not taking data security seriously can result in serious consequences.
Often, when reviewing data security protocols, cloud-based enterprise systems like Salesforce tend to be overlooked. After all, one of the main benefits of cloud-based software is that you don't have to worry about security, right?
76% of IT security leaders say they've experienced a data breach in at least one of their business systems. Needless to say, it’s important to follow proper security practices in order to protect your Salesforce Org and data from security threats. While the platform is reasonably secure on its own thanks to Salesforce Shield and built-in tools like the Security Health Check and Einstein Data Check, you’ll need your own plan in place to cover everything these native tools don't.
You likely fell in love with Salesforce because of its flexibility. With its 'no-code' customizability and extensive range of third-party apps, the platform is endlessly configurable — and while that make it possible to set up your Org in any number of ways, it also makes it difficult to tighten broad security controls.
Award-winning change management firm to participate in the 10th annual conference for NetSuite customers and partners.
Administrators are the lifeblood of any organization running NetSuite — from troubleshooting errors to configuring custom reports for SOX compliance, there’s no doubt that this jack-of-all-trades plays a fundamental role in the success of a business (we even wrote a blog post about this particular topic, which you can find here). A role this multifaceted requires a variety of different tools to get the job done.