{"id":31597,"date":"2017-03-08T12:42:36","date_gmt":"2017-03-08T17:42:36","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/encryption-everybody-claims-to-be-doing-it-but-what-does-it-mean-information-age.php"},"modified":"2017-03-08T12:42:36","modified_gmt":"2017-03-08T17:42:36","slug":"encryption-everybody-claims-to-be-doing-it-but-what-does-it-mean-information-age","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-everybody-claims-to-be-doing-it-but-what-does-it-mean-information-age.php","title":{"rendered":"Encryption  everybody claims to be doing it, but what does it mean? &#8211; Information Age"},"content":{"rendered":"<p><p>      The importance of an adequate cyber security strategy cannot      be exaggerated enough, with recent research revealing that      almost seven in ten consumers will happily take their custom      elsewhere in the event of a data breach    <\/p>\n<p>    In 2016 consumers were exposed to a larger number of high    profile data breaches than any year previously  last year    Yahoo disclosed the loss of more than half a billion customer    records.  <\/p>\n<p>    These events have helped raise public awareness around the    serious threats to personal data that exist in the modern era.    Awareness is also growing for some of the solutions that    businesses and individuals can use to minimise the risks from    data breaches.  <\/p>\n<p>    Encryption is starting to gain some prominence in stories    concerning data breaches, but do consumers actually understand    what it involves, or how important it is?  <\/p>\n<p>    Gemaltosrecent study has revealed that only 14% of UK    consumers claim to fully understand what encryption is.  <\/p>\n<p>    >See also:Network    security doesnt just begin and end with    encryption  <\/p>\n<p>    Some responses were surprising, including believing encryption    to be a fingerprint scanner, a puzzle and a system which sends    parts of messages over many networks to protect it.  <\/p>\n<p>    In reality, encryption is the process of converting data to an    unrecognisable form. An encrypted document will appear    scrambled to anyone who tries to view it.  <\/p>\n<p>    It can only be decrypted using the correct encryption key,    which must be kept secure at all times. If consumers dont    truly understand the measures that businesses are putting in    place to protect their data as this evidence suggests, they    wont be aware of how secure their data is.  <\/p>\n<p>    This contributes to any concerns and uncertainty consumers may    have when sharing personal data with companies.  <\/p>\n<p>    Businesses are increasingly starting to understand the    potential financial damages that a data breach can incur,    however they also need to consider the reputational damage too.  <\/p>\n<p>    Educating consumers about the steps a business is taking to    protect their data is crucial for building consumer trust and    loyalty. If consumers are unsure of which protections are in    place with a business, they may avoid dealing with them    entirely.  <\/p>\n<p>    Any business that suffers a data breach or gains a reputation    for handling customer data insecurely will see consumers move    to competitors they perceive to be more secure.  <\/p>\n<p>    >See also:Will    WhatsApp trigger an encryption revolution?  <\/p>\n<p>    Additionally, with GDPR coming into effect in under 18 months,    it will soon be mandatory for any business handling EU specific    data, or doing business within the EU, to report any and all    data breaches.  <\/p>\n<p>    Any business found to be insecurely storing data will face    severe fines. So, what can a business do to avoid this    happening?  <\/p>\n<p>    There are five key steps that any business must undertake when    protecting their own, and consumers data.  <\/p>\n<p>    First, in order for a business to begin protecting itself, it    should organise a data sweep to understand what data it has    produced or collected, and where the most sensitive parts of    that data are stored.  <\/p>\n<p>    Examples of personal identifiable information a business may    collect include a customers email address, date of birth or    financial details. Before a business can even think about how    theyre going to protect their data, its crucial that they    understand what they are trying to protect.  <\/p>\n<p>    The next step an organisation should take is to adopt strong    two-factor authentication, which provides an extra layer of    security should user IDs or passwords ever become compromised.  <\/p>\n<p>    Two-factor authentication involves an individual having    something they have  like a message on their smartphone  and    something they know, rather than simply relying on something    they know, such as a password.  <\/p>\n<p>    While two-factor authentication helps to stop information being    taken in the first place, or accessed by people who dont have    the correct permissions, encryption gives a layer of security    which stops customers sensitive data being used if it is    accessed or stolen.  <\/p>\n<p>    >See also:Who    owns your companys encryption keys?  <\/p>\n<p>    This is why it is necessary for a business to understand where    their most valuable data is stored before this step can occur.    Whether the data is stored on your own servers, in a public    cloud, or a hybrid environment, encryption must be used to    protect it.  <\/p>\n<p>    As consumers have seen in 2016, it is no longer a question of    if, but when a data breach will occur. Companies need to    approach protection with the assumption that they will be    breached and employ the encryption necessary to protect their    most important asset, the data.  <\/p>\n<p>    Of course, once a business is properly encrypting their data,    attention must turn to strong management of the encryption    keys. Whenever data is encrypted, an encryption key is created,    and is necessary for unlocking and accessing the encrypted    data.  <\/p>\n<p>    Encryption is only as good as the key management strategy    employed. Companies must ensure the keys are kept safe through    steps like storing them in secure locations, in external    hardware away from the data itself for example, to prevent them    being hacked.  <\/p>\n<p>    After all, theres no point in buying the best locks for your    house and then leaving the key under the mat for any passing    burglar to pick up!  <\/p>\n<p>    The final step a business should undertake is educating both    their consumers and their workforce on the processes they have    undertaken to protect their data. And it doesnt just end    there.  <\/p>\n<p>    Businesses need to employ a double-sided approach, educating    both their employees and consumers on the steps they should    also be taking to remain safe and protect their personal data    themselves.  <\/p>\n<p>    This helps to build their understanding of how to protect the    companys data, and builds consumer confidence.  <\/p>\n<p>    >See also:Researchers    break hole in Apples unbreakable encryption  <\/p>\n<p>    Only once a business has followed these steps, and educated    their customers, can they be confident that they have adequate    processes in place to protect their data.  <\/p>\n<p>    The importance of an adequate cyber security strategy cannot be    exaggerated enough, with recent research revealing that almost    seven in ten consumers will happily take their custom elsewhere    in the event of a data breach.  <\/p>\n<p>    Additionally, an educated population of consumers will help    encourage other businesses to improve their cybersecurity,    ultimately leading to a more secure environment for both    organisations and individuals to do business.  <\/p>\n<\/p>\n<p>    Sourced byJason Hart, CTO, data protect at Gemalto  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.information-age.com\/encryption-mean-123464879\/\" title=\"Encryption  everybody claims to be doing it, but what does it mean? - Information Age\">Encryption  everybody claims to be doing it, but what does it mean? - Information Age<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The importance of an adequate cyber security strategy cannot be exaggerated enough, with recent research revealing that almost seven in ten consumers will happily take their custom elsewhere in the event of a data breach In 2016 consumers were exposed to a larger number of high profile data breaches than any year previously last year Yahoo disclosed the loss of more than half a billion customer records. These events have helped raise public awareness around the serious threats to personal data that exist in the modern era. Awareness is also growing for some of the solutions that businesses and individuals can use to minimise the risks from data breaches. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31597","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31597"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31597"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31597\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}