October 30, 2013 By Anne Lescher 2 min read

Taking the Fear out of Encryption

Today, data protection must address exponential data growth, support big data analysis, reside in shared cloud data warehouses, allow mobile data access, and defend against increasingly sophisticated threats. So we must ask…

  • Why are people afraid to protect their information by encrypting their data?
  • Why is encryption often the protection mechanism of last resort?
  • Why does it take mandatory regulatory compliance, security policy audits, and penalties for non-compliance to ensure that sensitive data is adequately protected with encryption?

Unfortunately, encryption is often perceived as complex, something akin to rocket science. There is the concern that if you lose the encryption keys, you lose the data forever. There are fears that encryption keys are difficult to utilize, update and store securely. There are requirements for high speed data transactions.

However, recent compliance regulations and standards require that sensitive data be encrypted, including Health Insurance Portability and Accountability Act (HIPAA) for healthcare information, Sarbanes-Oxley (SOX) for financial information and Payment Card Industry Data Security Standard (PCI-DSS) for retail payment.

6 Reasons to Encrypt Your Data with Confidence

The good news is that carefully architected and well- implemented data encryption can provide the cornerstone of your data protection security policy. Encryption can protect your data and solve many of your data protection challenges. With that in mind, here are six advances in encryption that make it easier to deploy and take the fear out of encryption:

  1. Standardized algorithms for industrial strength encryption that are certified by NIST for data protection and secure key exchange such as RSA Public Key Encryption, Advanced Encryption Standard (AES) and Elliptic Curve Cryptology
  2. Standards-based network communication protocols that protect data in motion such as  Secure Sockets Layer (SSL), Transport Layer Security (TLS) and virtual private networks (VPNs)
  3. Self-encrypting tape and disk storage devices that provide high speed data encryption for data at rest protecting removable media and archived backup data
  4. Database view access controls and field level encryption that protect sensitive pieces of data within large data bases
  5. New Key Management Interoperability Protocol (KMIP) OASIS standard that allows key lifecycle management solutions to interoperate to manage, securely store and update encryption keys
  6. Automated encryption key back-up and recovery to help minimize the risk of loss or breach of sensitive information

So now let’s rethink these questions:

  • Do you still have to be afraid to encrypt your data?
  • Should you still live with risk and non-compliance exceptions related to data encryption?

Security solutions providing these six advances can relieve your fear of encryption. They can provide transparent, automated, high performance, end-to-end protection of data that address compliance regulations.  These advances allow you to encrypt data everywhere with confidence!

 

More from Data Protection

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Skills shortage directly tied to financial loss in data breaches

2 min read - The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBM's 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2% increase from the previous year.And that's expensive. This skills deficit adds an average of $1.76 million in additional breach costs.The shortage spans both technical cybersecurity skills and adjacent competencies. Cloud security, threat intelligence analysis and incident response capabilities are in high demand. Equally…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today