How to prove that you take client confidentiality seriously

July 4, 2018

Compromising client confidential information can result in the sort of reputational damage that’s hard to come back from.

It’s the end of the month and you’ve been hustling to secure those big client orders before the quarter closes. Then your email pings and you see a new client contract ready to be passed to legal and signed! Great. It looks like you’ll hit your quota!

a person signing a contract

30 minutes later, the legal team have reviewed the paperwork and come back to you.

They want to know how the business is able to comply with the following clause:

The Vendor acknowledges that in performing the Services it will have access to, or be directly or indirectly exposed to, Client Confidential Information. The Vendor shall take all available measures to protect all Client Confidential Information from disclosure.

We’ve all seen those clauses. But have you ever really stopped to think what it means, and what measures your business uses to protect client confidential information?

Client confidentiality covers everything from files, through to the security of messages and calls.

Most probably you’re sharing documents as an email attachment, or perhaps you’ve got a file sharing account that you use? And what does confidential information even cover? You probably just assumed it was files – but what about the content of the messages that you send? Or even phone calls?

Mitigating cyber-threats

More than ever before, businesses are facing ever more sophisticated cyber-threats; and while data breaches can cost millions of dollars to remedy, the prospect of compromising client confidential information is even worse. It can result in the sort of reputational damage that can be hard to come back from.

It’s why so many clients nowadays are looking to work with partners that can offer them best-in-class security across all of their communications – from secure file sharing through to encrypted calls.

Telling a client that your networks are protected and content secure is one thing. But being able to demonstrate that your messaging, voice and video calls are also end-to-end encrypted and secure is the sort of differentiation that can really help you to stand out against the competition!

Can you come back from a breach of client data?

Unfortunately, too many organizations either ignore clauses like the one above (hoping that the worst won’t happen), or they assume that their existing productivity and communication apps offer the security they need.

Most of the time that's not the case.

That messaging app you use, or that conference call service… If it’s not offering end-to-encryption then your client communication will always be vulnerable to cyber threats such as a breach of the service provider servers or backups, or man-in-the-middle attack.

Do you really want to take that risk?

It’s why Wire has become such a popular choice for businesses that prioritize not only their own data confidentiality, but that of their clients.

Remember. If you can build confidence and trust across your client base, you have the foundations of a lasting client relationship!

Rasmus Holst, CRO, Wire

← Back to all posts