Keeping your rental business secure
Current RMS is used by rental businesses of all sizes across the globe, each with unique ways of managing their jobs and business data.
That’s why there are a number of security settings in place to protect them, built into the very core of Current. No matter how you work, there are additional tools you can implement to keep your account secure, without interfering with your workflow.
Select a topic below to learn more about the different ways Current RMS keeps your data safe…
Security in the cloud
Current RMS is hosted on Amazon Web Services, a huge, billion-dollar infrastructure that hosts many of today’s cloud-based platforms, including Xero, Spotify, and Netflix.
AWS have a great track record - not only do they have incredible up-time, they’re also protected with the very latest in security technology, both physical and online. By relying on an external network of servers to host your fully encrypted data, you don’t have to worry about maintaining your own servers.
The beauty of working in the cloud also means that you can access your data wherever you are, on any device you’ve got to hand, all with the confidence of knowing it’s not compromised. With cloud-based software, your rental business information is securely stored inside your system, and you can access it with an internet connection safely wherever you go. Want to learn more about how the cloud keeps your data secure? Check out our guide.
Accessing your account
Every Current RMS system has a unique subdomain which can only be accessed when a user enters their valid login details.
You can also choose to add some extra layers of security at the login stage. We recommend doing so, and have a couple of solutions you can try.
Single Sign On
Sign in to your Current RMS system using your Google or Microsoft credentials, with Single Sign On. When it’s enabled, you just need to enter the Google or Microsoft details you might use for other password protected services such as your email, saving you from keying in your Current credentials. It’s also possible for administrators to restrict other users logging in to your system to using either their Google or Microsoft accounts, which means the rest of your team can only sign in using the authentication method that’s been set.
2 Factor Authentication
Alternatively, set up 2 Factor Authentication and use a unique code generated using an app on your smartphone to log in to your Current RMS system, alongside entering your personal login credentials. To gain access to your Current system, you’ll have to have your smartphone on hand - which means that anyone without your smartphone and the unique code won’t be able to log in.
Managing users & activity
Current RMS can be catered for businesses that have a lot of users logging in. We’ve also got some inbuilt tools to help you dig deeper into your system activity.
Utilize Roles in System Setup to create roles for your users, controlling which areas of the system they have access to and the actions they can perform. Assign these roles to users that can log in to your system, so you can be certain of who can do what. Roles come in especially handy when not everyone needs to see all parts of your Current system, or you’d like to hide certain data from some users. For example, if you don’t want casual freelance crew to see things like financial information or to make changes to jobs, you can create a role specifically for them and apply it to them individually.
It’s possible to force a password reset for your users’ log in credentials in System Setup. This can be incredibly useful if you feel passwords have fallen into the wrong hands or you and your team frequently update your passwords. Admin accounts and system owners can select ‘Reset Password’ in System Setup > Users by individually selecting which user they’d like to force a reset for. If the user is logged into Current RMS, it’ll log them out straight away, and they’ll get an email prompting them to change their password.
Within your Current RMS system, you can view a comprehensive Action Log of all key actions completed, ready for you to search and download. This can be extremely beneficial, especially if you suspect unauthorized access to your data and need to investigate the details of system activity quickly. Data exports and erasure are also highlighted in the log, giving you the means to understand what’s been impacted in your system so you can react sooner.
The EU General Data Protection Regulation came into effect in Europe in May 2018 and is designed to give individuals more control over the sensitive data companies have on them.
GDPR applies new, up-to-date restrictions to how companies are able to store and refer back to this sensitive data. With security built into the very core of our software, Current RMS and Amazon Web Services are fully GDPR compliant. We also implemented a number of new tools into Current in preparation for GDPR, so our customers can be confident that they too are complying with the new data laws. These include creating a ‘Legal Basis for Processing Data’ field that our customers can utilize to adequately store business and contact information.
You can learn about GDPR and our changes to Current RMS on our GDPR information page. Plus, you can also find more GDPR info in your Current RMS system, under ‘Useful Links’ in the footer.
Current RMS was built with your data security in mind, and it’s something we take extremely seriously.
If you want to learn more about how your security is handled in Current RMS, we’ve got lots more information in our guides.