Anda di halaman 1dari 2

WIRE

Buying encryption?
Five good questions to ask before you do

P
ersonal data protection act 2. Does the encryption system suit remotely, means that your default
(PDPA), together with the the needs of your IT department policy can be strong and tight.
growing number of data for full remote control of off-site Exceptions can be made only when
breaches are the most pressing endpoint encryption? and where they are needed, and
reasons why small and medium businesses All major endpoint encryption reverted just as easily. If you cant do
are implementing data protection products offer the means to manage this youll be forced to leave a key
technologies including encryption. remote systems, but look carefully under the doormat, just in case
However, with limited time and the at the requirements. Most need tearing holes in your policy before
market flooded by various products, it can either an open incoming connection deployment is complete.
be a difficult task for companies owners to a demilitarised zone (DMZ) on
and decision-makers to find the right fit your server, or a VPN connection. 4. Does the solution allow remote
for their needs. All involve a higher level of IT skills locking and wiping of keys from
If you are faced with the decision that can add additional costs and, laptops?
yourself, avoid pitfalls in selecting in order to function, may require the The answer might be crucial if a
an encryption product by asking the user to initiate the connection; not company computer with full-disk
following questions: much use with a rogue employee or encryption gets stolen while in sleep
stolen laptop. mode or with the operating system
1. Which laptops present the A well-designed product will booted up. Its even worse if those
greater risk: On-site or off-site? give you the remote management systems come with the pre-boot
This might seem like a pointless necessary without creating password affixed on a label or tucked
question with an obvious answer; additional security problems, in the laptop bag. If a remote lock or
systems are more liable to theft when requiring specialist knowledge, or wipe function is not available, then
away from the office. But making this adding expense to the project. the system is either unprotected or
distinction and keeping it in mind is the secured only by the OS password,
right place to start and when you have 3. Why is this important? with the encryption being bypassed
settled on a solution, be sure to test Being able quickly to vary security in either case.
its effectiveness at managing problem policy, encryption keys, features and Similarly, it is important to
scenarios for your remote users. operation of endpoint encryption know whether the solution has

40
SEPT 2017
been designed to accommodate proportion of the recorded data Reading the case notes for these
the typical use cases that would breaches involving lost or stolen incidents reveals that being able to fit the
otherwise unravel a well-designed laptops and USB drives happened to solution to your environment, working
security policy. organisations who had bought and practices and making encryption easy for
deployed encryption products. everyday users as the real challenges.
5. Does the solution secure
removable media without having
to whitelist each item? About ESEt tEchNology:
With an array of writeable devices
that people use for their everyday ESET Endpoint Encryption
work, it is almost impossible for the Simple and powerful encryption for organisations of all sizes allowing you to
admins to whitelist each and every safely encrypt hard drives, removable media, files and email. Hybrid-cloud based
one of them, and decide whether its management server provides full remote control of endpoint encryption keys and
permissible to read from, write to, or security policies.
not access the device at all.
It is much easier to set a file-
level policy distinguishing between
files that need encryption and
NEWS
those that dont and keep these Google pays $10,000 for students bug
protected every time they move from Google has rewarded a Uruguayan student with $10,000 after he exposed a
workstation or corporate network to security flaw that could allow hackers to access sensitive data. Ezequiel Pereira
any portable device. discovered the vulnerability in Googles App Engine server after changing the
In other words, if you connect Host header in requests to the server using Burp.
your own USB stick, it wont force The high-school student explained in a blog post, I was bored, so tried to
you to encrypt your private data; find some bug at Google. Following several failed attempts, he managed to gain
anything coming from the company access to an internal webpage that did not check his username or require any
system, however, will be encrypted other security measure.
without the keys being held on
your device. It is a simple idea, but 88% feel vulnerable to data threats
one which makes any device safe, Organisations are increasingly aware of the threat posed by data breaches,
without the need for whitelisting. according to Thales 2017 Data Threat Report. A remarkable 88% of respondents
also admitted to feeling vulnerable to threats, with 9.1% feeling extremely
The security was there a long vulnerable. This is significantly higher than the number actually experiencing
time ago; what will make or break your data breaches.
deployment is flexibility and ease of use.
In the end, you need to figure out if the PlayStation social media accounts briefly hacked
solution you want to use is easy to deploy. Sony became the latest entertainment company to suffer at the fingertips of
If the setup of the solution takes hackers after their PlayStation social media channels were temporarily hacked
hours or even days and needs additional recently. A group called OurMine claimed credit for the compromise that targeted
tools for its operation, it might cause new the companys Facebook and Twitter accounts. Sony quickly regained control of
headaches for company sysadmins and the accounts but not before the hackers had posted a series of messages on the
create new security risks. Aim for an easy- social media accounts.
to-deploy solution that doesnt require
advanced IT expertise and preserves both
finances and your human resources. If Read more about these and other security news at: www.welivesecurity.com
the user experience mirrors that easy
deployment, then IT staff wont be
further taxed by user lockouts, lost data
and other frustrations.
All validated, commercial encryption
products have been more than strong
enough for many years, yet a significant

41
SEPT 2017

Anda mungkin juga menyukai