Company Culture: Data Security

Person
Sander Kamstra April 16, 2021
Image

From an attic room idea to a serious organisation

My name is Sander Kamstra, one of the founders of Payt. In the journey from a loft idea to a serious organisation, I often encounter moments that I believe impact our company culture. With this series of blogs, I aim to describe a situation each month that illustrates who we are as a company. I offer you a glimpse into life at Payt. Some articles may be of limited relevance to your situation. However, if they succeed in stimulating your mind, I am satisfied.

Image

The Case: Processes Are More Important Than Results

In my first job as an IT professional, I had a good idea where data security was an important part of the proposition. So, I went with my idea to a senior colleague who was responsible for the security of servers and databases. His answer was simple and still holds true today:

“If you want to protect a database with information, you should store as little data as possible, only allow uninteresting data, and not allow users.”

Here is a good example from the GGD, a few weeks ago.

There are now quite a few possibilities to make user access fairly secure. Fortunately, because without users, our software is not very useful. At Payt, we talk weekly about new functionalities that provide a lot of user convenience but require a concession to data protection. Our data is (unfortunately) also interesting enough to have a lot of value, so we are ISO27001 certified. This means that we comply with the international standard for Information Security Management System (ISMS). I would like to describe an example of what this can lead to within the company.

We were only 20 employees when we obtained the certificate. We had prepared a lot and written a well-thought-out security policy. Within a year, someone at Payt thought that this policy document should not only be known to the policymakers but also to all other employees. And the best way to do that was to have everyone sign it. For this, we found that a general text about confidentiality in the employment contract sufficed. Not long after, there was an extensive list of all hardware, software, and processes for every new employee that had to be completed (an intake list). For a year now, one person has been responsible for having all access visible. The intake list has been replaced by an extensive authorization matrix. To make the process of access where security is involved a bit easier, we have an access_request channel in Slack. Sounds good, right?

For a new colleague, I requested access in the access_request channel. I wanted to impress her with our speed of action so she could get off to a flying start. After a week, there was still no access. Inquiry taught me that a developer had decided not to grant this access because the new colleague had not yet signed the security policy. And shortly after, I received a reprimand that I had also not filled in the authorization matrix.

It is much harder to work result-oriented than process-oriented. You can simply follow a written process. And if you follow it well, you are never at fault.

Image

By Sander Kamstra

Sander, director and co-founder of Payt, has brought innovation to the industry with his passion for software and entrepreneurship.

Share this article
Image
It seems like everyone is working on a separate project, but everyone operates like a cog in a machine – Jake Eggen, Developer
Image
If you are looking for a workplace with an excellent working environment, learning opportunities, and fantastic colleagues, then Payt Software is definitely worth considering – Ivan Malykh, Developer
Remove Cookie