How Companies Are Fighting Off Spies and Hackers

Key-Drivers-for-Using-Encryption-Technology-Solutions-Thales-Report-2015.png

Reasons For Using Encrytion: Global Encryption and Key Management Trends – an independent research by the Ponemon Institute, April 2015.

It's two years since Edward Snowden leaked details of massive covert surveillance operations conducted by the US National Security Agency and Britain's Government Communications Headquarters (GCHQ).

And as cyber-attacks and data breaches become more commonplace - the Ashley Madison data theft being the most recent high-profile case - what are firms doing to bolster their defences against hackers?

Perhaps not surprisingly, a Ponemon Institute study in April found that there has been a 34% growth in businesses using encryption methods to protect their communications.

Headlines about cyber-attacks undoubtedly drive a greater demand for privacy, says Matt Richards, vice president of products at OwnCloud, a data security company. "It gets people nervous and a lot of folks interested in talking to us," he says. Lawyers who trade on client confidentiality have obviously been in the front of the queue. Manhattan-based attorney Chris Gulotta says his firm has deployed SecureMail to encrypt all staff emails. "I think people are getting used to interacting with secure channels now," he says.

When entertainment and technology giant Sony had its emails hacked and published in 2014, embarrassing private conversations were revealed to the world.

It was this PR disaster, says William Bauer, managing director of Royce Leather, a small New Jersey retailer that, "left us wondering as a small business how vulnerable we were to succumbing to the same fate." Mr Bauer's firm now trains all its employees to use encrypted email.

For a long time encrypted email was a drawn-out process with users having to swap encryption keys in order to share secure messages.

"It just didn't really offer a usable solution from our perspective," says Gavin Kearney, co-founder of secure email company called Jumble. "We remove users having to create and manage any of the associated encryption keys."

Jumble's encryption process is automated - non-Jumble users are able to decrypt their received messages through the website. And as the decryption takes place within the browser, no one else can see the contents.

"You don't need to be a mechanic to drive a car," says Mr Kearney. "Likewise, to achieve proper email security you shouldn't need to know about the ins and outs and complexities, algorithms, or managing and controlling keys."

ProtonMail, a Swiss-based encrypted email provider, has also simplified the process. "We've switched from server-side encryption to client-side encryption," says co-founder Andy Yen. "All the encryption happens on the users' devices before the data ascends to our servers. "We don't have a technical means to read any of our users' communications," he adds. This makes the service popular with lawyers and doctors, as well as other clients who have to handle sensitive data. "Also, a lot of the business community in Russia is very active on ProtonMail," says Mr Yen.

The growth in cloud-based services, and mobile workers using their own devices, has made data security even more of a pressing issue for business.
Accessing work emails at the airport, or in a cafe over a free wi-fi service could expose potentially sensitive corporate data to hacking.

Traditionally favoured by individuals looking to hide their internet protocol (IP) addresses and keep their browsing habits secret and encrypted, VPNs are now garnering increasing interest from businesses, too, says Dan Gurghian, co-founder of Amplusnet, the parent company of Invisible Browsing VPN.

And UK-based HideMyAss says it now has dedicated teams for selling bulk accounts to businesses. "It does good revenue," says chief operating officer Danvers Baillieu. "I can't name them, as a privacy business, but we've got big household name Internet brands using our service."

VPNs are also proving popular with companies in countries where censorship is an issue, says Andre Elmoznino Laufer, head of growth for SaferVPN.

Since Snowden, VPNs have had something of an image makeover, believes Robert Knapp, boss at CyberGhost, a VPN provider. "People are always asking why do you anonymise people, nobody has anything to hide, you just run services for the bad guys. No we don't, we run the service for the good guys," says Mr Knapp. "Since Snowden....we don't have to educate the market any longer."

But doesn't all this encryption inevitably slow down your communications in an age where speed in business is essential? This was initially the case for Royce Leather, says Mr Bauer - there was a slight dip in productivity as staff got to know the ropes, but "the encryption benefits were well worth the short-run sacrifices," he concludes.

The computing power behind email encryption these days means any slowdown in traffic flow to encrypt and decrypt is negligible, argues Ashish Patel, a director at Intel Security.
 
"If I was to send you an email that was unencrypted and send you an email that was encrypted, by the time you received and opened it, you wouldn't notice a difference," he says.

But when it comes to VPNs, Mr Laufer admits: "It will inevitably be a bit slower than without a VPN, no matter what any VPN provider claims. "But it's a small price to pay to secure sensitive corporate data."

Of course, we may never know if all this extra focus on security has succeeded in keeping the spies at bay. It may take another Snowden - with all the threats to national security that presents - to answer that billion dollar question.
BBC:  http://bbc.in/1EGTlwE

« IoT Will Change Your Relationship With Insurance
Are We Really Safe From Self-Aware Robots? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Digitus Biometrics

Digitus Biometrics

Digitus Biometrics is a market leader in biometric access control. We can secure access to any entry point, from the front door to the server rack cabinet.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

National Accreditation Authority Hungary (NAH)

National Accreditation Authority Hungary (NAH)

NAH is the national accreditation body for Hungary. The directory of members provides details of organisations offering certification services for ISO 27001.

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

Kinnami Software

Kinnami Software

Kinnami is a data security company that equips organizations with the tools they need to secure and protect highly confidential documents and data.

Silent Sector

Silent Sector

Silent Sector is a cybersecurity services company that specializes in providing a wide range of managed security services.

Intracom Telecom

Intracom Telecom

Intracom Telecom is a global telecommunication systems & solutions vendor offering a complete range of professional services and solutions including Information Security.

Realsec

Realsec

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

Lucata

Lucata

Lucata solutions support groundbreaking graph analytics and improved machine learning for organizations in financial services, cybersecurity, healthcare, pharmaceuticals, telecommunications and more.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

8com

8com

8com is an established Managed Security Service Provider (MSSP) with over 75 employees and customers in over 40 countries.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

JLS Technology

JLS Technology

Since 2007, JLS Tech has been recognized as one of the world’s most innovative cybersecurity and technology operations leaders.