Cyberattack
Consumers are more aware than ever about the privacy and protection of their digital identities. According to a recent Prosper Insights and Analytics survey, 64% of adults are somewhat or very concerned about the privacy of their personal identity when shopping online. But beyond retailers tracking their online activity, customers are also concerned about the protection of their data following recent upticks in cyberattacks. So, what steps are retailers and other organizations taking to proactively protect their customers' and employees digital identities?
Prosper - Privacy Online
To gain a better understanding of how and why organizations need to prioritize protecting customers personal information or risk lost business and reputation, I connected with John Grimm, VP of Strategy and Business Development at Entrust, a global leader in trusted identity, payments and data protection. We spoke about organizations shifting their focus to improve security posture and his predictions for data protection in 2021 and beyond.
Gary Drenik: As organizations mobilized for remote work when pandemic lockdowns hit, new risks to sensitive data were created just as quickly. Can you talk us through how organizations have adjusted their data protection strategies to protect their most critical data?
John Grimm: The pandemic put even more pressure on organizations to scrutinize their security strategies to protect against threats. As increased hacking, like phishing attacks, became regular headline news, organizations quickly realized that keeping their companies secure meant more than improving VPN bandwidth for remote workers. Instead, they needed to focus on ensuring authorized workers have simple but secure ways of accessing sensitive information and that its protected from bad actors using a proven mechanism like encryption. So, even if a bad actor were to penetrate their network and steal information, it would be useless to them if the encryption keys were well protected.
According to our 2021 Global Encryption Trends Study, for the first time, 50% of organizations reported having an overall encryption strategy applied consistently across their organization and 37% reported at least a limited encryption strategy. This tells us that while deploying encryption strategies can be complex and time-consuming, enterprises recognize that they will benefit from prioritizing encryption solutions especially when it means increasing trust with customers and decreasing risk to their business.
Drenik: Now that we understand how organizations are increasingly adopting and using encryption, can you share a few examples of how encryption is being used in these organizations today? What are they encrypting?
Grimm: Encryption use cases are plentiful and different organizations choose to use them in different ways. The most mature and common use cases for encryption include internet communications, databases, internal networks, and backups and archives. However, over the last four years, weve seen newer encryption use cases emerge like containers, cloud services, big data repositories, and Internet of Things (IoT) devices and platforms.
When it comes to what these organizations are encrypting, the conversation isnt as straightforward. More than half of organizations believe the main driver for encryption is protection of customers personal information. However, payment-related data, financial records, intellectual property and employee/HR data are all more regularly encrypted than customer information. So, were seeing a clear disconnect between perceived threats and the realities of deploying encryption for customer data. This disconnect is likely due to the increased difficulty of protecting customer data in all the different locations and platforms where its stored and processed. Another surprising finding is that, despite its sensitivity, health-related information is the least likely to be encrypted.
Drenik: Is this enough? What threats and use cases will they need to focus on in 2021 to avoid losing customer trust and brand reputation?
Grimm: Consumer trust is paramount, and it's essential for organizations to identify potential risks before they jeopardize it. According to the study, employee mistakes continue to be the most significant threats to sensitive data, followed by system or process malfunctions, then hackers.
As the world continues to digitally transform, encryption technology and the way enterprises use it is more relevant than ever. While encryption and key management is complex, it is essential for enterprises to thrive amid expanding threats. Careful attention to key protection, and diligent discovery of new locations that sensitive data is finding its way to, are critical to a successful data protection strategy.
Drenik: We saw every industry undergo some form of digital transformation over the last year to maintain relevance and convenience for their customers. Are there any industries that are ahead of the game or falling behind when it comes to data protection?
Grimm: Weve found a steady increase in encryption in all industry sectors, except for communications and service organizations. The most significant increases in extensive encryption usage have occurred in manufacturing, hospitality, and consumer products.
However, the financial services industry was the target of constant attacks in 2020, and respondents rated the threat of malicious insiders higher than any other industry. Despite financial institutions deploying encryption, they need to stay agile to prevent serious breaches from jeopardizing customers' information by implementing a follow the data strategy to all locations where that data exists. By going a step further and implementing hardware security modules (HSMs) to protect encryption keys and encryption operations in certified, purpose-built hardware, financial institutions can keep customer data secure.
Drenik: We know that as organizations evolve their security strategies, attackers are evolving their strategies as well. What are the top challenges for organizations as they continue deploying encryption to protect against breaches?
Grimm: Were seeing organizations struggle to protect data in multiple locations, especially as they increasingly transition to the cloud. When deploying encryption to protect data in multiple cloud environments, its critical to manage the associated encryption keys in accordance with industry best practices. That becomes difficult at scale, particularly given that the average organization today uses eight different products that perform encryption.If organizations fail to implement lifecycle key management, including regular key rotation, they risk creating a vulnerability to sensitive customer information.
The good news is that security teams are starting to meet this challenge with HSMs. Encryption keys can be more effectively managed using HSMs, and our data shows their adoption is growing: two-thirds of respondents named HSMs as paramount to encryption or key management strategies.
Drenik: Lets talk about your predictions for encryption and data protection in 2021 and beyond. How do you anticipate the threat landscape will change? Will organizations employ new tactics to address these changes? Is there anything organizations can do to ensure their information is safe?
Grimm: In 2021, the transition to hybrid work environments will further push organizations to improve security practices and remain vigilant in their efforts to avoid a data breach, as these environments have created new destinations and potential exposures for sensitive data.
In addition to encrypting sensitive data, authentication is a critical safeguard to prevent unauthorized account access. Virtually every data breach can be traced back to compromised user credentials. Hybrid work multiplies this risk underlining the need for multi-factor authentication that provides an added layer of defense by requiring multiple credentials before employees can access an organizations network.
Drenik: Thanks, John, for weighing in on the state of encryption today and what it means for the safety of customers trusted digital identities. I look forward to connecting again to see how organizations continue navigating the complexities of data protection.
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]