How To Build Trust With Customers Through Your Security Posture

by Chase Venters, Chief Information Officer

What is security posture?

A security posture is an overview of your organization’s security measures. It includes, but is not limited to:

  • A list of your software and hardware assets. This list needs to include not only the assets you have on-site but anything in the cloud, as well as assets managed by third parties
  • A list of your networks
  • A list of the online services you provide and where the data is stored
  • A list of all the security controls in place, and how effective they are
  • A list of who has access to your data (both inside and outside the organization)
  • The potential cybersecurity risks that could affect your organization

Why can having a strong security posture encourage digital payments?

91% of on-line visitors are concerned about the privacy of their data. This means it is vitally important to give them reassurance that if they make a payment on your website or through your app, their data will be secure and not at risk of being compromised.

How you can implement a security posture that will inspire trust from your customers

You may already have a rudimentary security posture in place, or you may not have one at all. If this is the case, what can you do to strengthen it and improve the security of your online services?

  • How old is the asset? Some assets deteriorate and become unsupported by manufacturers over time. This makes them more high-risk
  • Where is the asset located, and what servers does it use?
  • Who uses the asset?
  • What software and operating systems run on it?
  • Is data stored on the asset, or sent to the asset, encrypted at rest and in transit?
  • How often is the asset backed up, and where are the backup files stored? Are the backups encrypted?
  • How high priority is the asset? Some assets are more essential than others
  • How is the asset protected, both physically and/or digitally? For example, is it in a locked room or protected with two-factor authentication?

In summary

In the modern age, customers are becoming more and more mindful of how businesses handle their data. Even if a data breach is not the direct fault of an organization, it can still have many negative consequences including a loss of trust, negative publicity, litigation, and fines for breaching regulations like the California Consumer Privacy Act (CCPA).



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Exceleron Software

Exceleron Software


North America’s leading utility prepay and payment service company.