Building a spy-proof enterprise

Enterprise organizations can employ data encryption protect their networks and sensitive information from mass surveillance by governments and hackers, according to security experts.

However, in order to achieve effective protection from cyber snooping, data would need to be encrypted at rest in server, while in transit and even when it is being used, according to a recent report from online technology publication Computerworld.com.
(Image from ShutterStock.com)

Protecting corporate and in many instances client data became a hot topic once more with leaked reports that the United States National Security Agency has been mining electronic communications from technology companies such as Google, Yahoo, Microsoft, Skype, YouTube, Facebook as part of an anti-terrorist program. Some of the companies denied that government agencies had direct access to their servers.

RELATED CONTENT

How open sourced software helped build Prism
Mozilla launches anti-snooping Web site

The NSA’s capabilities in breaking modern encryption methods are unknown, according to Mathew Green, a cryptographer and research professor at the John Hopkins University Information Security Institute in Baltimore. However, he said, even if the NSA or other secret intelligence agencies are able to decode modern encryption “it’s going to be pretty expensive for them to do so.”

In order to prevent unwanted surveillance, said Dwanye Melancon, chief technology officer of IT security company Tripwire, it would have to be encrypted throughout its life. This means encrypting data as it passes through routers and servers via the Internet in different jurisdictions around the world and even when it is stored in servers.

This presents a problem when businesses rely on cloud service providers (CSP) for encryption, said Steve Weis, chief technology officer of data encrypting company PrivateCore. In this scenario, the business is not certain when a government body is conducting lawful attempts to access the encrypted data.

Find out more about the pros and cons of encryption here

 

 

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Nestor E. Arellano
Nestor E. Arellano
Toronto-based journalist specializing in technology and business news. Blogs and tweets on the latest tech trends and gadgets.

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now