• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

5 App Dev Myths Part 4: Custom Development Compromises My Security

App Dev Cyber Security

There’s a great amount of interest in custom-built applications – and quite a few misconceptions about them as well. Arraya’s Application Development team has encountered many of these, including concerns about complexity, use cases, and more. During this five-part series, our team will seek to dispel some of the more common misunderstandings about custom-built applications in order to shed light on a sometimes murky topic.  

We see headlines almost every day about big data breaches and hacking attacks on business. An impulse for many of us could be to assume that any outside party coming into our systems is going to lead us to a similar fate. I get it. In IT, it’s our duty to protect our company and the interests of our clients and we take that very seriously. An outside organization is a risk we can’t control.

However, I can tell you from personal experience that some distrust is misplaced; particularly when an established organization with a good track record and roots in the development community is going to do work for you. The stock in trade of such entities is expertise and trust; trust earned through long histories of creating unique solutions for companies.

Also, there is a kind of high-level vision that always comes with having an “outside set of eyes” examine a system. This is true in all facets of IT, including security. It is in our nature to become blind to potential risks because we have become accustomed to seeing things a certain way. If we get an outside view of our process, we gain perspective from which we would not otherwise benefit.

For example, I can recall an instance where a larger client trusted us to look at updating an internal security process that involved a chain of approvals and forms between various departments. Since we were looking at the issue from the 10,000 foot view, so to speak, we were able to realize that numerous steps in the process were actually being duplicated. Specifically, this involved repeatedly typing in key information. By virtue of what they are, repetitive manual processes carry some degree of risk. It’s easy for someone moving quickly to key something in incorrectly or incompletely. Depending on the project, this could either be a minor hiccup or a potentially painful security vulnerability.  

In this case, we were able to automate the process and pass forms from department to department with the sections in question already filled out. In addition to saving time (as well as removing quite a bit of unnecessary work from a number of employees), there was a significant drop in resubmittal due to errors in data entry. In this case the client was, understandably, more focused on the micro elements and not the macro picture, causing them to miss the issue.

If we can move outside of our usual defensive space, which is admittedly not an easy thing to do, there are many firms and talented individuals out there who are able to not only work without compromising your security, but also give you another set of eyes on how your security is designed and to either validate or improve on what you have.

Want to learn more about Arraya’s Application Development services? Visit https://www.arrayasolutions.com//contact-us/ to open up a dialogue with us today!

Have some thoughts you’d like to share about this post? We want to hear from you! Leave us a comment on this or any of our blog posts through social media. Arraya can be found on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay updated on our industry insights and unique IT events.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}