wonderfully unique software solutions

All data should be encrypted as data breaches can be unavoidable, warns CoSoSys

CoSoSys – maker of data loss prevention (DLP) software Endpoint Protector – has warned that encryption should be deployed regardless of data type, information at risk, or the perceived potential for cyber attack.

As Zoran Cocoara, director of enterprise sales at Endpoint Protector by CoSoSys, explains, there are no perfect data security measures or security solutions.

“There is no way to prevent a data breach,” Cocoara confirmed. “[But] encrypting data means encoding it in such a way that it can only be restored to its original form if the person or system decoding it has the appropriate key.”

Decoding is “theoretically possible” without a key, but requires so much computing power and time to crack the complex algorithms typically involved that it poses no threat, he maintained.

And encryption improves data security and protection in various ways, he said.

“Adding an extra layer of security ensures that even if one of these layers fails, the secured possession is still safe,” Cocoara said.

Without encryption, if the typically attack-focused security measures fail, it’s game over – access has been gained. Also, encryption may be required or at least “strongly encouraged” by several specific laws and compliance requirements around data handling and management, he said.

The Payment Card Industry Data Security Standard (PCI DSS) requires that the Primary Account Number (PAN) be unreadable when stored.

“The General Data Protection Regulation (GDPR) does not directly require encryption, but it does recommend that the controller or processor evaluate risks and implement risk-mitigation measures, such as encryption,” added Cocoara.

Symmetric encryption, including encryption adhering to the Advanced Encryption Standard (AES), means that the encryption key is used for both encoding and decoding. Asymmetric encryption employs a private key for decoding and a public key for encoding.

“These two types of encryption are frequently used together in complex solutions and secure internet protocols like Secure Socket Layer (SSL)/Transport Layer Security (TLS),” Cocoara said.

( Image by WikimediaImages from Pixabay  )

Recent Articles

Vyond bundles in further AI and branding capabilities for corporate creatives

Video creation platform vendor Vyond is expanding its offerings with new brand-management tools as well as further generative AI functionality responding to...

LastPass analyst warns of looming credentials crisis

Organisations should beware of an oncoming crisis in the secure management of user access, according to a cybersecurity specialist at password management...

Octopus Deploy follows Codefresh buy with 2024.1 Server

Continuous delivery (CD) pipeline platform vendor Octopus Deploy has acquired fellow development software specialist Codefresh and rolled out a new version of...

Top-25 cloud list runs gamut from Visma to Cloudflare, Wasabi to Azul

The Software Report market insights website has named 25 software companies as the top companies in cloud computing for 2024, offering specific...

TeamViewer partners Deloitte on digital visuals for warehouse logistics

Deloitte and TeamViewer have combined the latter's augmented reality (AR) based visual picking offering with SAP Extended Warehouse Management (EWM) for warehousing...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox