Lock Your Doors, or Your Data  

As security breaches and headlines become more common, many companies are realizing that a strong information security program is a competitive advantage.

21 May 2014


As security breaches and headlines become more and more common, with the likes of Target, Neiman Marcus and more, many companies are realizing that a strong information security program is a competitive advantage they need to start implementing. But the question is how?

For companies that sell products, it could be as simple as making sure to use the logo of a security seal for transactions. In a case study about ROI linked to a security purchase, a company saw an 11% improvement in overall sales and a 52% increase in sales by spotlighting a security seal throughout their e-commerce website.

For companies that can’t just display a Norton Verisign logo, CIOs are discovering that proving security is not so easy. Security is a differentiator, but companies that use that security as a differentiator often don't really want to share their secrets. In addition, each business' security threats and solutions are unique. Yet one thing is clear: CIOs and security experts who have successfully argued for more investment in security agree. You need to be prepared to show, not tell, a business how a data breach can hurt their bottom line.

IP can be stolen in many ways – whether internally or externally. And the threats are widespread. For example, the recent Heartbleed Bug sent millions changing passwords and looking into infrastructure and security programs. Cybersecurity is vital to any company, and it can start with basic solutions.

Ensuring that your company locks its doors at night is a basic level of security, as are locking computers and putting away sensitive papers at night to protect them from the prying eyes of others. But when it comes to actually sharing your information, what are you doing to keep that information secure? Are you using a solution that meets the regulatory requirements your company may need, or one that lets you maintain lifetime control of a document, no matter where it goes? Has your solution been audited to ensure it has the security protocols you require?

Security means something different to each one of us, but we all have one thing in common. We don’t want our data to fall into the wrong hands. So the question is: what are you going to use to prevent that from happening?



Esther Hollander

Esther Hollander

Esther is a senior corporate communications manager at Intralinks. She provides content for internal and external communications activity as well as general corporate positioning in order to support overall company objectives. Esther has been creating communications materials for a variety of organizations and companies for more than 10 years. She graduated from Rutgers University with a degree in English Literature.