Customer Thermometer is an award winning Brighton based SaaS company that provides cutting edge customer satisfaction software. We caught up with Jim Turner to learn more about their journey with cyber security and how they've adapted their approach over the years.
I am the CEO of Customer Thermometer, we are the market leader in short survey solutions; with our 1-click email feedback software, we’re helping the world’s most customer-obsessed businesses get quick and accurate feedback from their customers in seconds. With over 2,000 customers and operating in 60+ countries, we’re taking the market by storm and our innovative approach to surveying is revolutionising the feedback sector.
I have a background of working with software companies that offered bespoke software builds as part of their service offering so, I came to Customer Thermometer 3 years ago with this level of information security in my mind. But SaaS is very different and you see very quickly that security has to be at the top of the tree in terms of priorities, way before new features!
That choosing a security partner that genuinely cares about doing a good and thorough job over a fast or cheap one is critical. Look around until you find a team of people that are even more concerned with app security than you are!
Throughout our development life-cycle, we have built-in checkpoints to ensure security is met. Our development processes include a mixture of manual and automated tasks, all listed on our internal security review checklist that we adhere to. We utilise automated tools where possible, from monitor any of our dependencies and libraries to vulnerability scanners. Code reviews are an active component of our life-cycle, with every commit being reviewed and tested prior to deployment. We follow an iterative process with our development, ensuring that each feature meets the minimum requirements, is tested and has adequate on-boarding support before being rolled live.
In order to keep our users’ data safe, we have a number of defensive security measures in-place on our infrastructure and built into our application. Firstly, all data in transit is protected with TLS. We have brute-force and bad password lists implemented, to strengthen the quality of passwords that our users input. We have alerting and logging in place, with manual review processes for any event that is not whitelisted.
Privilege separation of duties and tasks - this is across our development cycle and system administration functions. Following the “least privilege” model when assigning permissions or configuring software. Independent penetration testing is carried out regularly, along with a rigorous internal testing process of both manual and automated tasks.
Most importantly, we educate our teams through internal training sessions - ensuring they understand what cyber risks are out there and what risk they pose.
We fit to them on the whole, all of our customers have varying needs and we need to be flexible to fit them as best we can. Often they will find the InfoSec process painful too so, we do everything we can to take that pain away and get everything tied up with a neat little secure bow as quickly as possible.
Honestly, none. We have an excellent team and I trust them completely to do everything they can to keep the app safe and secure. We work hard to do everything we can to keep our app and our clients’ data protected.
Cyber security must be a top-down organisational approach. If the leadership team talk about it and highlight and push forward with training schedules then the business will always keep it at its core.
Partner with an excellent and trusted firm that work with similar companies and have case studies and testimonials on their site that clearly show the trust their customers have in them. Choose a partner that is clearly full of cyber security uber-nerds, people who not only know their onions but that are all over LinkedIn and social channels fighting the good fight and highlighting risk in a sensible and helpful way. If you are worried about it or you don’t know what the risks are then get informed and take remedial action to fix anything.
But I think the most important thing is to nurture a team that is as obsessed about cyber security as you are, from sales to support and not just your technical and product teams. Live and breath it across the business.
Customer Thermometer is the only customer satisfaction survey customers can answer from their inbox, giving you industry-leading response rates.It is an easy and unique way to gather the thoughts of your customers.
Write, create and send beautiful, branded emails in seconds. Your customers click directly from their email inbox. You track their responses in real time.
We spoke to Jim Turner, CEO of Customer Thermometer for his take on SaaS securityRead Article >