Generix named in the 2024 Gartner® Magic Quadrant™ for Warehouse Management Systems (WMS) for the sixth consecutive year. View the press release.

B2B Collaboration
October 16, 2018

Securely managing retail projects

Retailers, the situation is critical. Whether you’re a distributor or an e-commerce manager, the massive quantities of data that pass through your hands could place your business activity in jeopardy. How, you may ask? The volumes of information you store are a goldmine for hackers if they can figure out how to slip through your net. To guard against this, best practices include integrating data security right from the get-go, by applying a “security by design” approach. Your best bet for iron-clad protection: work with a service provider you trust, and whose data security expertise is tried and true. To help guide you, we’ve compiled a list of the steps a conscientious Information Systems (IS) decision-maker should take for proper protection.

Article

Step 1: Identify a sensitive project

An IS project is considered sensitive if it involves any data — whether personal or not — for which a loss of integrity would have an impact on the host company. The consequences of a security breach could be legal, financial, or operational in nature. Whatever the case, they will be damaging to the brand image.

To protect against the most common cyber-attacks, MANQUE LE LIEN >> such as ransomwares, your service provider must implement a cyber-resilience approach with the security manager right from project launch. The ISO 27001 standard and indications provided by the CNIL should be considered minimum best practices when evaluating your cybersecurity.

Beyond the kick-off phase, data safety should remain an important part of company policy, meaning that a designated contact should be assigned to it at every project milestone.

Step 2: Ensure data security during project implementation

During project development, the MANQUE LE LIEN >> rules to implement in order to secure your system are defined by the SaaS service provider:

  • Password security;
  • Preventing the installation of malware;
  • Data encryption;
  • Traceability of operations performed on machines and intrusion detection;
  • Data backup and restore.

At Generix Group, these cyberprotection actions are performed in-house: all information is stored on the company’s SaaS server, except for passwords.

Access must also be secured client- and provider-end. Companies must remain vigilant with respect to professional equipment theft and notify service providers so that they can restrict access remotely. When employees leave the company, it is imperative to revoke their rights to services and software they had access to.

At Generix Group, a single procedure offers connection to a client’s internal address book. When an employee leaves the company, the client address book transmits this information to the Generix Group address book automatically. The information is deleted instantly, thus ensuring data security. Conversely, new company arrivals are managed directly so that they are immediately operational in the company.

Step 3: production launch quality control

Right before production launch, care must be taken to verify that the commitments made by project teams were made operational.

This is the case at Generix Group, where project teams implement test phases for all applications. Code audits and intrusion testing are also carried out by an ethical hacker in lean startup mode (continuous improvement) shortly before production launch. The goal is to refine the data security measures implemented late in the game.

Browse more resources

Article
01/04/2024
EDI

EDI Capable: Defining Digital Competence in Trade

Understanding what it means to be EDI capable is essential for businesses looking to streamline their operations and improve supply chain efficiency. This guide covers everything from the definition and benefits of being EDI capable to the steps involved in implementing a robust EDI system.

Article
25/03/2024
AP Automation, B2B Collaboration, e-Invoicing

4 Accounts Receivable Automation Best Practices

While lesser known than accounts payable automation software, accounts receivable automation solutions automate the capture, validation and process of invoices…

Ready to optimize the flow of goods + data across your supply chain?

Work with our team to build your ideal supply chain software stack and tailor it to your unique business needs.