Intelligent SME.tech Issue 56 | Page 17

// TECH TRENDS //
Sebastian Dewhurst, Founder of EASA consistent approach to data. Using cloud-based spreadsheets to actively leverage the built-in version history can provide an invaluable audit trail, which allows SMEs to track changes to the data and identify any anomalies.
A strategic shift towards spreadsheet security
The physical location where spreadsheets with sensitive data are stored and the methods that are used to share them impact their overall security massively. SMEs need to start discouraging their staff from storing business spreadsheets on local devices that are unmanaged, as these devices are less secure and prone to theft. What SMEs can do is make a strategic approach that utilises centralised and more secure storage solutions, such as company-managed servers or a reliable cloud storage provider with vigorous access controls and end-to-end encryption.
Although the practice may be deemed inconvenient, SMEs should avoid the practice of sharing sensitive files through email directly. Instead, they should start using file-secure platforms that offer more robust security features. Password protection should be used for shared links, and timed access should be activated as well. Another method that should be implemented is the use of comprehensive audit logs for access and any changes that are made. For SMEs with remote employees who have access to sensitive data from external locations, the use of VPNs( Virtual Private Network) can establish secure and encrypted connections, which lowers the risk of data being transferred over insecure networks.
Creating an effective environment for spreadsheets
Spreadsheets are powerful tools that drive efficiency and provide critical insights for SMEs. But in order to fully tap into their full potential, a strategic and disciplined approach using technology is necessary to boost their security. Proactive investment

// in spreadsheet security is not simply about lowering the risk of reputational damage and financial losses, it is also about building and maintaining customer trust, as well as safeguarding the longterm success of the business in a world that is constantly threatened by cyber-risks. �

SPREADSHEET ACCESS SHOULD BE LIMITED TO A NEED-TO-KNOW BASIS; NOT EVERY EMPLOYEE NEEDS FULL EDITING RIGHTS TO THE DOCUMENT.
Intelligent SME. tech
17