Encryption: What Does It Mean to BYOE?

The cloud has opened up incredible opportunities and efficiencies for businesses. However, with these opportunities there is also an increase in security risks. How can you be sure your data is safe in the cloud?

Traditional ways of protecting data, such as passwords, firewalls, and other defensive strategies are no longer enough. For greater protection, encryption protects your data from being accessed by anyone without the corresponding key. Data that is encrypted with a key, can only be deciphered by the same key.

What are the benefits of Managed Security Services for your organisation?

Managed cloud services remove the need for organisations to perform many specialist functions in-house, providing access to essential digital services in a way that is cost-effective and convenient.

The downside is these services can leave a company’s data vulnerable to theft, tampering, or even seizure by government authorities and law enforcement agencies. As a data owner, you could then be subject to large fines, negative publicity and possible business collapse.

Encryption is the only way to protect your data. Data that has been encrypted is unreadable to those who are not authorised to access it. It also allows monitoring and reporting on who, or what, is accessing the data and when.

Third-Parties. What are the risks to your Data?

Over 600GB of unsecured customer data was discovered on an Amazon cloud database last month. The records belonged to approximately 4 million US Time Warner Cable (TWC) customers. The data, which had been set to allow public access, rather than limit access to administrators or authorised users, was discovered accidentally by a digital security company while investigating an unrelated breach.

According to a report published after the discovery, Broadsoft Inc, a third-party communications company engaged by TWC, are to blame for the breach.

Caught in a Trap? Beware Auto-Renewing Contracts

In the UK there are laws to protect consumers from unfair contract terms. However, commercial parties have less protection and are generally free to bind themselves to whatever terms without fear of court intervention.

As businesses outsource an increasing number of activities, it is important to fully understand what you are committing to when you sign a contract with a third party.

This is especially true for automatically renewable contracts. For some, they are convenient, ensuring services continue uninterrupted. For instance, if you forget to renew your web hosting and haven’t agreed to automatically renew or made other provisions, your website will likely go down when the contract expires. This could have a detrimental effect on your business. 

Who are the attackers?

The headlines surrounding the US Presidential Elections in 2016 often had talk of hacking and subsequent leaking of embarrassing data in an effort to discredit one or the other parties. But just who is doing this?

The finger is often pointed at Russia or China. For the Russians, while they remain committed to hacking business information that will assist their competitive standing in the world, their first priority is collecting military information. In comparison, the primary objective of China’s cyber collection capability is to enable their state-owned enterprises to dominate on a global economic level. But are are all nation-state hacks from these two players? Clearly not, as Colombian hacker Andres Sepulveda claims to have used a variety of ‘dirty tricks’ to influence elections in Nicaragua, Panama, Honduras, El Slavador, Colombia, Mexico,Costa Rica, Guatemala and Venezuela over the past 10 years.

GDPR: A Cloud with a Silver Lining

Are there four letters presently capable of generating greater fear and anxiety for organisations around the world than GDPR?

The majority of conversations surrounding its imminent arrival strike a tone similar to the way citizens were prepared for nuclear Armageddon during the Cold War. With so much attention focused on potential doomsday scenarios, are we ignoring the positive aspects?

Reducing the cost of storing data

Before the digital era, organisations had a finite capacity for data storage. When the filing cabinet looked fit to burst, it was time to purge the documents that were no longer relevant or useful. As businesses transitioned from hard copies to digital copies, that element of housekeeping was often left behind, perhaps proving there’s truth to the saying, out of sight, out of mind.

The Usual Suspects? Nation State Cyber Attacks

Nation state sponsored cyber-attacks are growing in frequency, reach, and sophistication.

Within the previous year alone, a successful attack targeted the World Anti-Doping Agency, releasing the medical records of Olympic athletes from around the world. State sponsored hacking is also assumed to have played a role in the outcome of the US 2016 election, leading the US government to release a report detailing indicators of Russian involvement.

While countries have been conducting stealth attacks against each other for centuries, the digital era means these attacks can now be achieved remotely with technology.

Securing Email is Essential

Why mail by electronic must never let down its guard.

Ensuring emails are secure is a concern to anyone dealing with confidential information – which of course, includes both the law and finance sectors. However, today, more than ever, it is important, rather critical, to be aware of the angers of using the usual email systems and ways email communications can be secured with the use of an encrypted system. We dwell on how this system works, the financing of it and, indeed, its benefits.

Email is an essential communication and collaboration tool for both employees and consumers. According to the Radicati Group, there are currently more than 3.7 billion people using email on a worldwide basis, which it estimates will grow to more than 4.1 billion by the end of 2021. Part of this growth is anticipated to come from the migration of premise-based mailboxes to those based in the cloud.

Data Protection and Outsourcing

Outsourcing tasks and responsibilities is commonplace for many businesses today. Everything from administration and HR, to bookkeeping and IT can be outsourced to a third party, allowing you to focus fully on the core competencies of your business.

While this usually brings about benefits in terms of efficiency and cost, it can also cause serious problems and risks if the issue of data access is not properly considered.

How to improve security against email attacks and for GDPR compliance

About 200 billion emails are sent every day, but because of its importance email is constantly exploited by attackers, and yet is often overlooked in cyber security strategies

It is not unusual for emails to be used for arranging payments or for submitting identifying documents. “Legal services seem to do 40% of their work on their mobile phone,” observes Colin Tankard, managing director of Digital Pathways.

The General Data Protection Regulation (GDPR), set to come into force in May 2018, is designed to protect European Union (EU) citizens’ data, and organisations that want to operate within the EU will be expected to comply with it.