• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Icon Systems

Simple to use. Power to grow.

  • (800) 596-4266
  • Free Trial
  • Blog
  • Features
  • Bookkeeping
  • Order
  • Pricing
  • Resources
  • Login

March 1, 2013 by Robert 5 Comments

This post was last updated on March 24th, 2021 at 11:10 am.

I subscribe to a newsletter called Great Work Provocations. Every weekday morning, I get an email with a short yet inspirational, thought-provoking message. This morning’s email brought me this little gem:

Invite the skeptics in. They’re desperate to be proven wrong. But avoid the cynics. They’ve already made their minds up.

–Great Work Provocations

Reflecting on how I could apply this message to my work, I realized that I encounter this particular situation when talking to potential and existing customers about our software.

Skeptics

When a church evaluates church management software, typically at least one person in the church is skeptical of moving the church’s data to the cloud. And this isn’t necessarily a bad thing. When making a big decision such as this, it can be helpful to have someone who disagrees, or at least plays the part of devil’s advocate. If their objections can be rebutted, it reinforces the sense that the church is making a sound decision. On the other hand, if their doubts cannot be overcome, it can assist in identifying potential problems.

Cynics

I think the term “cynics” seems a bit harsh but I get the point; there are some people who say they will never use web-based church management software. We actually have a number of customers who are perfectly happy using Revelations, our desktop software. They have absolutely no plans to move to the cloud, and as we’ve said before, there is absolutely nothing wrong with that. If they are more comfortable using a Windows-based program, we won’t argue with them!

For those of you who are skeptical, yet open to the cloud

Here is an outline of the security precautions Icon Systems has implemented for its web-based church management software – IconCMO.

Encryption

Whenever you are working with IconCMO – from the point you log in to the time you exit – all information transferred from your computer to our servers is submitted via 256 bit SSL encryption. Icon Systems registers the certificates with GeoTrust for verification of a valid certificate with your browser. This means all information is sent from your computer to the servers over an encrypted connection.

Physical Server Security

The servers are placed in locked cabinets in a key card accessed building designed to house servers.

Application Servers

This may seem strange, but customers do not have the ability to save information to the database. They must submit the data to the Application servers. The Application servers review the data to verify it is acceptable and execute the necessary save. Only the Application servers can write to the Database servers. The firewall for the Application servers only allows connections on ports 80 and 443. 80 is the HTTP non-secure web port and 443 is the HTTPS secure SSL web port.

Database Security

All Database Servers are placed on a local network. The database servers do not have a defined route back to the outside world. The only servers that can view the database servers are the application servers. The database servers limit the application servers as to which ports they are allowed to access. Icon Systems does not disclose this communication process between the servers or the ports it uses.

Employees

All Icon Systems employees are required to sign a document specifying they will not access any customer databases unless the customer approves of them opening the database. Information viewed during this process is not discussed, except when resolving customer issues.

Information Security

Icon Systems is in the church software business; company policy states no information provided to us by a customer will be shared with or sold to another company or agency unless required by law or court order.

Power

All servers are connected to a UPS device and the servers always use battery power. If the power goes out, the changeover is seamless so there is no temporary power flicker. The UPS devices are capable of running up to twelve hours by themselves. A diesel generator will start running within five minutes of the initial power outage and has enough fuel to keep all systems running for seven full days.

Site Catastrophe

Nightly backups are created and sent over an encrypted SSL connection to a second fully operational hosting facility located in a different part of the country. This second site is currently set as a Read-Only server, but could be changed quickly to a Read-Write system in the unlikely event that a catastrophe destroys the current hosting site.

Note: this photo was taken by Ronnie Garcia, it is not a photo of actual Icon Systems servers.
Note: this photo was taken by Ronnie Garcia, these are not a the actual Icon Systems servers.

Hopefully this list gives you confidence in our company and peace of mind about the welfare of your data. Yes, moving your church to an online management system can be scary, but if done correctly, it can open up a whole new realm of possibilities.

Filed Under: Tech Tagged With: church management software, church technology, cloud computing, online security

Reader Interactions

Comments

  1. Avatar for Pastor Bruce.Pastor Bruce says

    March 2, 2013 at 10:30 am

    Michelle,

    We are on board with cloud computing and SAAS. We are a satisfied customer of ICONCMO but have a concern about offsite access for those who have rights to view sensitive information.

    It is my understanding that there is no way that you can limit access to ICONCMO to a certain IP address for a certain user. (I have asked this question to your support desk in the past) In other words only allow a certain user to access the system only from the church premises. (I understand about assigning user rights to view only certain information)

    Companies are finding out more and more that breeches in security and access to company sensitive data happen when employees access the company’s system from home, etc.

    It would be great to only allow access to a certain user from a certain location (IP address).

    Reply
    • Avatar for Michelle.Michelle says

      March 4, 2013 at 12:10 pm

      Thank you for your comment, Pastor Bruce!
      You are correct that we do not offer IP based security. Most people access the Internet as a DHCP client from a provider, which means their IP address has the potential to change on a regular basis. So IP Based security would be difficult to manage unless the church was willing to pay the extra fees to the provider for a static IP address.

      Reply
      • Avatar for Pastor Bruce.Pastor Bruce says

        March 5, 2013 at 3:21 pm

        We are willing and in fact I believe that we do have a static IP address here at the church.

        Thanks

        Reply
        • Avatar for Michelle.Michelle says

          March 5, 2013 at 5:11 pm

          Pastor Bruce,

          Security is a difficult thing. A few years ago we hired a company to review our security and they found it to be much more secure than most banks. Icon Systems understands that security is constantly changing and companies cannot become complacent. New security measures are initiated each year. I would like to say that this year is no different and that we have plans to change a few things to make it better. But that is not the case. There are a plethora of new ways to hack SAAS type applications. As such, this year will require more drastic changes than most. As a policy, Icon Systems does not disclose changes that are being made to security or changes that have been made in the past.

          IP Based security is unlikely to be developed. Not only is it rare for churches to have a static IP address but it defeats the purpose of having a web based application that can be accessed from anywhere to limit it to a single location.

          As always, thanks for your input!

          —
          Michelle

          Reply

Trackbacks

  1. Staying Safe Online and Our 2013 Security Improvements says:
    February 16, 2024 at 1:10 pm

    […] All of these changes and many more are incorporated into the main IconCMO church software system, the support forum, the API’s for 3rd party add-ons, the parishioner’s module, and the multi-site church management systems. All of these improvements are in addition to our security protocols that are in place already which can be read here. […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

SaaS servers for church software
Top Rated
Church Accounting Software

Search blog posts…

Popular Posts

  • Debits and Credits – Does Debit Mean Minus and Credit Mean Plus?
  • Accounting Mistakes: How to Fix Them
  • Fund Accounting Definition - Churches & Not For Profits
  • IconCMO Has NEW Text Messaging
  • Why is Nobody Coming to my Church Groups? (p1)
  • What Are Pass-Through Accounts?
  • Save Time and Money with IconCMO Church Software
Blog Home

Subscribe to Our Blog!

Sign Up Now
We respect your privacy and you can unsubscribe at any time.
  • The Facebook icon button link
  • The Instagram icon button link
  • The X icon button link
  • The LinkedIn icon button link
  • The YouTube icon button link
  • The Wordpress icon button link
Icon Systems, Inc.
3330 Fiechtner Drive S Suite 204
Fargo, ND 58103
Hours: Mon-Thu 8-5, Fri 8-4 CT
About Us — Privacy — Support — Careers — Sitemap
Recent Blog Posts
  • Is an All-In-One Church Software the Best Option?
  • Church Donation Software - Do you Need It?
  • Text Messaging for Church Software!
  • Is Church Software Online A Better Solution?
  • The Best Church Software Is Compliant & User Friendly!
Sales
800-596-4266
sales@iconcmo.com
Tech Support
218-236-1899
support@iconcmo.com
Fax: 218-236-0235
© 1992 – 2026 Icon Systems, Inc.