Page 10 - Cyber Defense Magazine - Global Print Edition 2018
P. 10
4 Encryption Technologies
You Should Use
by Dan Freeman, Senior Solutions Consultant, HelpSystems
How are you encrypting data in data: usernames, passwords, social in the clear (with an FTP server or
your organization? security numbers, birth dates, credit client) just isn’t satisfactory or secure
card information…. The list of what’s anymore. Cyber crime is evolving.
he number of users, clients,
and organizations who shared on the internet is lengthy and Without proper encryption for your
access the internet to share complex. file transfers, it’s only a matter of time
T data is growing. In the last As people submit, transfer, and store until vulnerable organizations are hit
year, it’s been estimated that sensitive data online, it’s imperative with a data breach that costs them
over 3.8 billion people use the for organizations who handle this money or potentially puts them out
internet to shop online, check their information to protect it using strong of business forever.
banking information, continue encryption practices. This especially Finding the right method of
their education, access test reports applies to businesses who need encryption for your organization
from their healthcare providers, to meet state, federal, or industry can be overwhelming, but the
apply for jobs, and submit annual compliance regulations. Using alternative—compromising your
tax documents. These activities all homegrown encryption methods customers’ or employees’ personal
require the submission of personal or, worse, sending communication information—isn’t acceptable. Don’t
10 CYBER DEFENSE MAGAZINE – ANNUAL GLOBAL PRINT EDITION 2018 – SPONSORED BY TREND MICRO