{"id":2075,"date":"2019-11-16T03:34:43","date_gmt":"2019-11-16T03:34:43","guid":{"rendered":"http:\/\/kusuaks7\/?p=1680"},"modified":"2024-02-23T15:40:45","modified_gmt":"2024-02-23T15:40:45","slug":"start-ups-your-most-valuable-asset-in-the-long-run-will-be-the-trust-of-your-customers","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/start-ups-your-most-valuable-asset-in-the-long-run-will-be-the-trust-of-your-customers\/","title":{"rendered":"Start-ups: Your Most Valuable Asset in the Long Run Will Be the Trust of Your Customers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2075\" class=\"elementor elementor-2075\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-553c53a7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"553c53a7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3e945e17\" data-id=\"3e945e17\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d67324b elementor-widget elementor-widget-heading\" data-id=\"d67324b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3 style=\"color: #aaa;font-style: italic\"><strong><em>Bake it in from the start: \u201cMoving fast and breaking things\u201d will become a thing of the past as customers and investors take security and privacy more and more seriously<\/em><\/strong><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56c098a elementor-widget elementor-widget-text-editor\" data-id=\"56c098a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt seems that security is still \u2013 at best \u2013 an afterthought for most start-ups as they go about building their <em>Minimum Viable Product <\/em>(MVP).\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71ed75e elementor-widget elementor-widget-text-editor\" data-id=\"71ed75e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWe highlighted it earlier in the context of the <a href=\"https:\/\/corixpartners.com\/iot-security-common-sense\/\" rel=\"noopener\">Internet of Things<\/a>, but it is true across the board.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23bec00 elementor-widget elementor-widget-text-editor\" data-id=\"23bec00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tQuick iterative cycles and fast go-to-market seem to be often prioritized over the security of a product before putting it in users\u2019 hands, with sometimes terrible consequences. Indian cab-hailing startup <a href=\"https:\/\/inc42.com\/buzz\/ola-hacked\/\" rel=\"noopener\">OLA<\/a> or restaurant discovery service <a href=\"https:\/\/economictimes.indiatimes.com\/small-biz\/security-tech\/security\/zomato-hacked-security-breach-results-in-17-million-user-data-stolen\/articleshow\/58729251.cms\" rel=\"noopener\">Zomato<\/a> are cases in point that a poorly protected product can lend itself to being hacked regardless of a company\u2019s age or size. \u201c<em>For start-ups to believe that they are too small for cyber attackers to take note of them is naive and misguided<\/em>\u201d as we already <a href=\"https:\/\/corixpartners.com\/cyber-security-critical-success-start-ups\/\" rel=\"noopener\">highlighted<\/a> in 2016.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d92e811 elementor-widget elementor-widget-text-editor\" data-id=\"d92e811\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn fact, it is the dominant mindset in the entrepreneurial world which is often at odds with actual security measures being put in place early on, at both company and product level. In the immortal words of Mark Zuckerberg: <em>\u201cMove fast and break things. If you are not breaking things, you are not moving fast enough\u201d<\/em>. This mentality is simply misplaced in the context of cybersecurity. Indeed, leaking the passwords and banking details of your early users can have much more serious consequences than a bug in your app or picking the wrong colour for your logo. And this is likely to get worse as regulation tightens around the world.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-844258e elementor-widget elementor-widget-heading\" data-id=\"844258e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><em>You simply can\u2019t afford to A\/B test your product\u2019s security.<\/em><\/h3>\n<\/blockquote><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39e3622 elementor-widget elementor-widget-text-editor\" data-id=\"39e3622\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAll the more paradoxical is that implementing security and privacy best-practices and putting the right controls in place from the start should not be that expensive or time-consuming in a context where every feature costs money and take time. But the fact is that security is rarely seen as a feature, and privacy is often cynically sacrificed on the altars of data monetization.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f999f5 elementor-widget elementor-widget-text-editor\" data-id=\"5f999f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tQuite simply, the features included in the MVP will be those that users and VCs will really notice and those which will drive valuations up. But this is often more a matter of perception than proper research and it is plagued by cognitive biases on all fronts, in particular the \u201cimaginability\u201d or \u201cavailability\u201d biases theorized by Nobel-laureate <a href=\"https:\/\/www.youtube.com\/watch?v=jxZ1bx8qWP4\" rel=\"noopener\">Daniel Kahneman<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc94600 elementor-widget elementor-widget-text-editor\" data-id=\"fc94600\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAnd for now, perception amongst this community is that security and privacy won\u2019t drive sales and valuations, and therefore don\u2019t matter.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-542433e elementor-widget elementor-widget-text-editor\" data-id=\"542433e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSecurity and privacy audits in early-stage funding due-diligence are virtually non-existent, and there are simply no incentives for start-ups to take all this seriously.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4dba1c2 elementor-widget elementor-widget-text-editor\" data-id=\"4dba1c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis is dangerously short-termist and goes against 2 clear trends:\n<ul>\n \t<li>Data breaches and cyber-attacks keep happening at an alarming rate and nobody is immune as we highlighted above. Society at large is taking security and privacy more and more seriously, as demonstrated by the rise of anger against Facebook over the past few years. Politicians have jumped on that band wagon and <a href=\"https:\/\/www.economist.com\/briefing\/2019\/03\/23\/big-tech-faces-competition-and-privacy-concerns-in-brussels\" class=\"broken_link\" rel=\"noopener\">regulation<\/a> is tightening worldwide.<\/li>\n<\/ul>\n<ul>\n \t<li>Different investors look at different horizons and <a href=\"https:\/\/corixpartners.com\/cyber-security-governance-ethics\/\" rel=\"noopener\">ESG<\/a> is becoming a more and more important <a href=\"https:\/\/www.martincurrie.com\/corporate\/insights\/the-value-of-esg\" class=\"broken_link\" rel=\"noopener\">factor<\/a> for many. Security and privacy are important pillars of the social and governance dimensions and <a href=\"https:\/\/www.bcg.com\/publications\/2017\/total-societal-impact-new-lens-strategy.aspx\" class=\"broken_link\" rel=\"noopener\">research<\/a> has started to emerge showing that good ESG practices support higher valuations.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fed69bc elementor-widget elementor-widget-text-editor\" data-id=\"fed69bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn the long-term, every start-up must understand that the real secret sauce is <strong>Trust<\/strong>: In a context of increasing levels of consumer awareness around privacy and data protection, your most valuable asset will be the trust of your customers in your product.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-026d816 elementor-widget elementor-widget-text-editor\" data-id=\"026d816\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn fact, fighting early on against the current <a href=\"https:\/\/blog.globalwebindex.com\/chart-of-the-week\/trust-data-privacy\/\" rel=\"noopener\">data-driven trust deficit<\/a> might be your smartest bet as a new company.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e574f6 elementor-widget elementor-widget-text-editor\" data-id=\"4e574f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\u201cMoving fast and breaking things\u201d has never created trust.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4d8b73 elementor-widget elementor-widget-text-editor\" data-id=\"d4d8b73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tStart-ups must build customer trust from early days by embedding sound security and privacy practices in the products and in their culture.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Every start-up must understand that the real secret sauce is&nbsp;Trust: In a context of increasing levels of consumer awareness around privacy and data protection, your most valuable asset will be the trust of your customers in your product. Moving fast and breaking things has never created trust. Start-ups must build customer trust from early days by embedding sound security and privacy practices in the products and in their culture. Start-ups must build customer trust from early days by embedding sound security and privacy practices in the products and in their culture.<\/p>\n","protected":false},"author":529,"featured_media":2767,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[3178],"class_list":["post-2075","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":3178,"user_id":529,"is_guest":0,"slug":"jean-christophe-gaillard","display_name":"Jean-Christophe Gaillard","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_b55e5afa-fb86-428a-a054-3be0451df2a4-150x150.jpg","user_url":"https:\/\/www.corixpartners.com","last_name":"Gaillard","first_name":"Jean-Christophe","job_title":"","description":"Jean-Christophe Gaillard\u00a0is Managing Director and Founder at Corix Partners. He is also a Non-Executive Director with\u00a0<a href=\"https:\/\/www.stratasecurity.co.uk\/\">Strata Security Solutions<\/a>, a specialized cybersecurity firm. He has been co-president of the Cyber Security group of the\u00a0<a href=\"https:\/\/www.telecom-paristech.org\/\">Telecom Paris Tech alumni association<\/a>\u00a0since May 2016. He is the author of \u201c<a href=\"http:\/\/www.blurb.co.uk\/b\/9015902-cyber-security-the-lost-decade-2018-edition\" target=\"_blank\" rel=\"noopener\">Cyber Security: The Lost Decade<\/a>\u00a0\u2013 A Security Governance Handbook for the CISO and the CIO\u201d, He contributes regularly to\u00a0<a href=\"http:\/\/www.thedigitaltransformationpeople.com\/authors\/jc-gaillard\">The Digital Transformation People<\/a>,\u00a0<a href=\"http:\/\/www.business2community.com\/author\/jc-gaillard\">Business 2 Community<\/a>, and\u00a0<a href=\"https:\/\/www.iotforall.com\/\">IoTforAll<\/a>\u00a0platforms, as well as the\u00a0<a href=\"https:\/\/www.thebtn.tv\/\">Business Transformation Network<\/a>. He is an expert contributor on the\u00a0<a href=\"https:\/\/ciowatercooler.co.uk\/members\/jean-christophe-gaillard\/activity\/\">CIO Water Cooler<\/a>\u00a0and has previously published articles on\u00a0<a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/bridging-gap-security-it-operations\/\">InfoSecurity<\/a>\u00a0Magazine, \u00a0<a href=\"http:\/\/www.computing.co.uk\/ctg\/opinion\/2396800\/how-to-achieve-effective-cyber-security-in-a-hyperconnected-world\">Computing<\/a>, the C-Suite.co.uk,\u00a0<a href=\"http:\/\/www.informationsecuritybuzz.com\/?s=gaillard\">Info Sec Buzz<\/a>\u00a0and the\u00a0<a href=\"http:\/\/www.director.co.uk\/blog-cyber-insurance-what-do-you-think-youre-buying-20323\/\">IoD Director<\/a>\u00a0websites."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/529"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2075"}],"version-history":[{"count":6,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2075\/revisions"}],"predecessor-version":[{"id":36139,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2075\/revisions\/36139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/2767"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2075"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}