Recently, LinkedIn announced a new feature in an effort to make email introductions a little easier for you. The mobile CRM-like feature is called LinkedIn Intro and, at least in my circles, it’s already controversial.
LinkedIn Intro attempts to put your LinkedIn profile information on every email you send. Since Apple’s iPhone is tightly secured to prevent access to built-in apps like Mail, LinkedIn developed a hack workaround.
LinkedIn’s Intro Raises Mobile Security Concerns
To set the process up, you need to give LinkedIn access to your email account. From then on, any email that you send from that account is rerouted from your email account to LinkedIn’s servers, where it pins your profile info and then forwards it onto the recipient(s).
It’s an interesting little trick for a compelling feature, but the idea of sending email through a 3rd party has already caused quite the reaction. Just look at the top headlines that turn up when you search “LinkedIn Intro” on Google News:
The main concern comes when you talk about the handling of your email through intermediaries when you’re sending sensitive information within a company to other employees. With Intro enabled, every email you send leaves the intranet.
There’s no way to choose when to send your emails through LinkedIn or when to not, which opens the door for any other monkey in the middle to monkey around with your messages.
Mobile CRM Software Security
It’s no wonder that mobile CRM software invokes some of these same concerns, if not for the same reasons.
Storing data in the Cloud, off site from your office, is already putting your data in the care of another company. The transfer of that data between your mobile device and that cloud storage area can be worrying, but understanding the security measures that are put in place can help you trust enough to get the benefits of mobile CRM software.
In a secure CRM system, you should understand that the data isn’t floating in the open air. It is only accessible when requested by an authorized party through a secure login.
If you want to be extra secure, confirm with your provider that your cloud CRM isn’t using an intermediary server or service to transfer data to and from your mobile devices. That will remove any chance of somebody standing in the middle and intercepting any of your data.
Further, your mobile CRM should give you the option of what data gets transferred to which devices, something that LinkedIn’s new hack can’t do. Having control over where your data can go is crucial to assuring mobile crm software security.
Security is About Control
In the end, security is all about control. It’s about knowing where your data is, who has access to it, how it’s being sent to mobile devices, and when.
As long as you have control over your data, you can use your CRM, mobile or not, without worries.