Studies, experts, and Edward Snowden say data encryption is lacking

Posted by Manny Veiga on Jul 18, 2014 11:35:28 AM

A new IT survey is the latest to shed light on the data encryption habits of IT professionals, revealing that more than a third send sensitive information outside corporate networks without first encrypting it.

Voltage Security published a survey of more than 200 European IT professionals who the company interviewed at a recent IT event. In all, around 36 percent of IT pros admitted to transmitting unecrypted data outside their organization, while almost half of respondents said they don't encrypt data at all. 

Read More

Topics: Data Encyption

Don't get too comfortable: Why encryption is vital for cloud security

Posted by Kristen Ciccolini on May 14, 2014 10:55:00 AM

A new study reveals good and bad news when it comes to cloud services adoption. On one hand, businesses are more comfortable storing data in the cloud. On the other hand, some businesses are too comfortable, and as a result aren't thinking about cloud security.

The Ponemon Institue surveyed over 4,000 SMBs and found that more than 50 percent are currently using cloud services to store confidential data, aligning with recent research that trust in the cloud is steadily increasing.

However, many organizations are not encrypting their data before sending it to the cloud, leaving confidential information wide open.

Read More

Topics: Data Encyption

The private key, data backup connection: what the experts say

Posted by Manny Veiga on Feb 4, 2014 8:50:00 AM

A recent blog post from an IT publication touched on a topic we've discussed before – the ability for IT service providers and their clients to retain ownership over the encryption key they use to back up their data. It's a factor that could be particularly crucial to secure data management in sensitive sectors like healthcare and government.

Why encrypt?
FCW, a tech blog for government IT professionals, recently reported that the shift to cloud services has led to new challenges with respect to encrypted data backup. Although, at least on the surface level, data encryption is relatively similar in the cloud when compared with traditional storage measures, one challenge in encrypting data to the cloud involves encryption key ownership. 

Read More

Topics: Data Encyption

Will 2014 be the year of data encryption?

Posted by Manny Veiga on Dec 26, 2013 1:44:00 PM

Risks to information security are headline news, and sophisticated safeguards are in higher demand from business customers. Experts say that in 2014, data encryption at every level will become a must-have technology for more businesses, as it’s one of the best ways to guard data from the wrong hands.

Rajiv Gupta, Founder and CEO of cloud security software provider Skyhigh Networks, predicted that unencrypted data will begin to disappear in 2014. Gupta said that regardless of where it’s located, companies will want all data to be encrypted. Encryption will become increasingly critical in the cloud, he adds, because fewer users will want to store data on endpoint devices. 

Read More

Topics: Data Encyption

3 types of clients that could benefit from private key encryption

Posted by Rob Merklinger on Oct 14, 2013 11:10:00 AM

By Rob Merklinger, VP of Sales

Security is an obvious pain point for many businesses thinking about cloud backup, and often the best way for MSPs to earn customer trust is to use a solution that puts a priority on data protection. We talk to our partners about this a lot, and we strive to help them communicate our backup solution’s security benefits to their own customers. 

Read More

Topics: Data Encyption

Who owns your encryption key? A vital factor in cloud backup security

Posted by Manny Veiga on Sep 20, 2013 3:30:00 PM

Can consumer-grade data storage products offer the protection enterprises need to ensure sensitive corporate data is safe?

That’s the question some IT professionals asked amid reports that two researchers were able to infiltrate code for file-hosting service Dropbox, with some experts emphasizing encryption key ownership as a critical sticking point in true cloud security.

Researchers Dhiru Kholia and Przemysław Wegrzyn released a whitepaper at the USINEX security conference in August detailing how they were able to reverse engineer the Dropbox client – despite prior belief that this was not possible. 

Read More

Topics: Data Encyption

Cyber security risk assessment
MSP Health Check
MSP Phishing Quiz

Our Most Recent Posts

Intronis Local Lunches
MSP Marketing Assessment