Welcome to Spearhead Networks

Data Encryption

(Last Updated On: August 16, 2018)

Why Encrypting Your Data is Crucial

Information is the most valuable asset you own, and you may not fully comprehend how sensitive so-called non-sensitive information can be. For example:

  • your customer contact details can be used to social engineer customers to redirect payments to a different bank account
  • a criminal can place orders for goods which your company would be liable to pay for by using supplier account details
  • a ‘blank’ mobile device can be easily retrieved from lost or stolen devices containing sensitive information like cached domain passwords, stored Wi-Fi passwords, and passwords saved in web browsers

With mobile and cloud use more common across the workforce, physical and perimeter security is meaningless. Rather than protect networks, your focus needs to be on protecting your data no matter where it’s stored or where it’s used.

Reduce Risk with Data Encryption

Data encryption can be applied in many ways from full disk encryption, to ‘per record’ encryption on public facing databases and web applications.

Data encryption assists to reduce risk across a number of scenarios including:

  • Stolen data from hacking. By managing encryption keys in a hardware security module, even if a hacker copies all data, the data will never be decrypted without the cybercriminal physically accessing the premises where your data is kept .
  • Accidental data leak protection. There are too many ways for data to be copied for traditional Data Loss Protection (DLP) software to be fully effective. This is where per file encryption controls the capability to decrypt a file, which means data can be safely ‘leaked’ anywhere, as long as the decryption keys are managed properly.
  • Internal digital rights management. If an employee has a right to view a file, it can be difficult to revoke that right in the future because the employee may have made a copy outside of company control. However, only giving employees encrypted copies and software to manage decryption can render any copies useless even if they have been copied.
  • Mobile device protection. Even mobile devices which don’t store corporate data usually have sensitive information in the form of reversible passwords for everything including email, active directory and Software as a Service (SaaS) services like Salesforce. With one in nine people using ‘1234’ as their pin, in-built security isn’t sufficient. Safe, encrypted spaces are needed to access corporate assets.

Data encryption plays a major role in securing almost all modern enterprises. However, if you want to implement it without impacting your end users ability to work and collaborate freely, you need to tap into the right experience and knowledge.

This is where SpearHead Networks has a mature methodology when it comes to tailoring data encryption services. It entails performing a data-flow analysis and risk assessment. We then design a formal architecture to ensure we capture your encryption requirements and implement the lightest effective encryption possible.

Talk to us about Vulnerability Management Today

We’re also experts in Networks Security Training and Awareness