Site icon IT World Canada

#EncryptITWC – An IT World Canada.com Twitter chat

Image courtesy of Shutterstock.com

Updated by Candice So Apr. 24, 2014 at 4:05pm ET: We ran a Twitter chat on encryption under the @itworldca Twitter account. Read on for a quick recap of the tweets from today’s discussion.

With all of the data breaches making headlines today – like the Canada Revenue Agency’s loss of 900 Social Insurance Numbers due to Heartbleed this week – it’s becoming clearer than ever that businesses and organizations need to closely guard their data.

One of the easiest ways to do that? Encryption, or encoding data and communications so hackers and malicious actors are barred from reading it.

Here at IT World Canada.com, we want to help business owners and IT professionals tackle the issue of encryption through our latest Twitter chat, exploring how they can protect their data – and their reputations – from falling into the hands of hackers.

Using the hashtag #EncryptITWC, we’ll be gathering for a Twitter chat on Thursday, April 24 at 1pm ET to 2pm ET for anyone who wants to learn about safeguarding their data.

For the chat, we’ll be bringing on guest experts who are knowledgeable in data security and encryption. We’re excited to welcome:

 

 

 

For the questions we’ll be covering during our chat, check out this list:

 

 

As many participants noted, it’s important to protect customer data from breaches – not only does this protect customers’ personal information and their privacy, but it also protects businesses’ reputations.

 

 

 

Haines and Correia defined “data in motion” as data that is in flight, like network traffic and data sent via email. On the flip side, data at rest is data that stays on a system drive.

 

 

 

Some vendors, like Symantec Canada, also offer encryption tools to their customers.

 

 

 

Haines also recommended that businesses protect themselves by checking out peer review for cryptography systems, as well as by having migration plans in place in case of a major breach.

 

 

 

Correia adds it’s also possible to run less intrusive encryption tools, especially those that are location-aware implementations. That makes it much easier for employees to adapt, he says.

 

 

 

 

 

 

 

 

 

Correia also added that businesses need to ask their cloud providers if they have an SLA on performance.

 

 

 

Exit mobile version