wonderfully unique software solutions

All data should be encrypted as data breaches can be unavoidable, warns CoSoSys

CoSoSys – maker of data loss prevention (DLP) software Endpoint Protector – has warned that encryption should be deployed regardless of data type, information at risk, or the perceived potential for cyber attack.

As Zoran Cocoara, director of enterprise sales at Endpoint Protector by CoSoSys, explains, there are no perfect data security measures or security solutions.

“There is no way to prevent a data breach,” Cocoara confirmed. “[But] encrypting data means encoding it in such a way that it can only be restored to its original form if the person or system decoding it has the appropriate key.”

Decoding is “theoretically possible” without a key, but requires so much computing power and time to crack the complex algorithms typically involved that it poses no threat, he maintained.

And encryption improves data security and protection in various ways, he said.

“Adding an extra layer of security ensures that even if one of these layers fails, the secured possession is still safe,” Cocoara said.

Without encryption, if the typically attack-focused security measures fail, it’s game over – access has been gained. Also, encryption may be required or at least “strongly encouraged” by several specific laws and compliance requirements around data handling and management, he said.

The Payment Card Industry Data Security Standard (PCI DSS) requires that the Primary Account Number (PAN) be unreadable when stored.

“The General Data Protection Regulation (GDPR) does not directly require encryption, but it does recommend that the controller or processor evaluate risks and implement risk-mitigation measures, such as encryption,” added Cocoara.

Symmetric encryption, including encryption adhering to the Advanced Encryption Standard (AES), means that the encryption key is used for both encoding and decoding. Asymmetric encryption employs a private key for decoding and a public key for encoding.

“These two types of encryption are frequently used together in complex solutions and secure internet protocols like Secure Socket Layer (SSL)/Transport Layer Security (TLS),” Cocoara said.

( Image by WikimediaImages from Pixabay  )

Recent Articles

Arista warns SMBs to take precautions against edge threats

Arista Networks, the vendor of Arista Edge Threat Management (ETM) has warned that SMBs aren't always aware of the extent of targeting...

Instructure rolls out iWork update for Canvas LMS users on Apple

Learning management software company Instructure has taken the covers off an Apple iWork update for its Canvas learning management system (LMS).

E-learning player iSpring adds six integrations for its LMS platform

Customers of the iSpring Learn learning management system (LMS) can now connect to no less than six additional platforms with a view...

What’s new in JetBrains code analyser Qodana 2023.2

The code-quality platform Qodana, new from a cornucopia of JetBrains developer tools, now boasts server-side analysis integrated with the 2023.2 releases of...

N-able leads RMM field across multiple awards programmes

Remote monitoring and management (RMM) provider N-able has taken two more coveted titles for 2023, including a prestigious CRN award for the...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox