Can Data Security protect my Business? - A must ask question for CXO's today. Encryption adoption becomes ever more critical for Enterprises By Rahul Kumar, Country Manager, WinMagic, Inc.

Can Data Security protect my Business? - A must ask question for CXO's today. Encryption adoption becomes ever more critical for Enterprises

Rahul Kumar, Country Manager, WinMagic, Inc. | Wednesday, 27 September 2017, 07:26 IST

  •  No Image

Today, world over the frequency of data re­cords loss adds up to about 35 Every Sec­ond, 2,116 Every Min­ute, 126,936 Every Hour and whopping 3,046,456 Every Day!

(Source: BREACHLEVELIN­DEX.COM January 2016 to June 2016)

Some of the trends that are being witnessed:

• 69% occur through malicious out­siders

• 18% because of accidental losses

• 9% by malicious insiders

• 3% hackivists

• and the remaining 1% are state sponsored -(Source: BREACHLEV­ELINDEX.COM January 2016 to June 2016)

The types of breach incidents can be broadly categorized into Identity Thefts (accounting for about 64%), Financial Access (18%), Account Access (11%), Existential Data (5%) and Nuisance (4%).(Source: BREACHLEVELINDEX.COM January 2016 to June 2016)

In the light of the above scenario, Encryption has become one of the fastest emerging data security options today. Organizations are increasing­ly adopting it to address the grow­ing concerns of data safety, and data privacy for compliance regulations. Despite the recent trends towards encryption, many organizations have not yet adopted encryption in their organizations, or have gaps in their protection coverage.

The True Cost of Data Breaches

Simply defined, a data breach is a security incident in which sensitive, protected or confidential data is cop­ied, transmitted, viewed, stolen or used by an individual unauthorized to do so. All of an organization’s files (such as HR documents, financial records, customer information, per­sonally identifiable information, and passwords) are vulnerable to theft or loss, by malice or mistake.

Considering the sheer damage of a data breach, 90% of which could have been easily avoided, according to the Online Trust Alliance1, Or­ganizations can be subject to stolen proprietary documents and data, bad publicity, lost business, and poten­tially crippling fines.


Adopting Encryption

Data Encryption is a time-tested tool that can effectively protect your data. Encryption is a means of scrambling computer data so it can only be read by the people authorized to access it. Encryption converts data from plain­text to ciphertext, through use of an encryption algorithm which creates an encryption key – only this key un­locks the data. The encryption and key storage is straightforward, but the Key and Policy Management, getting the right keys to the author­ized users and managing the lifecycle of the keys, is the challenging part.

Data Everywhere

Today, sensitive data resides every­where, and the definition of “end­point” has become very broad, span­ning from organization-owned assets such as: laptops and desktops, to USB media, through end-user-owned de­vices, and on to data and VMs in the Cloud. These silos of data make management difficult and therefore enterprises are reluctant to adopt full encryption.” But encryption, and management of it, doesn’t need to be complicated. Most endpoints have some form of native encryption software, or can be secured through a plethora of available data security solutions. This is a great start. Add­ing in additional encryption capabil­ity, and supporting that with a simple and comprehensive unified intelligent key management tool is the basis for a successful solution.

CIO Viewpoint

From VPNs to Zero Trust: The Transition to a...

By Shankar Venkatesan, Senior IT Leader, Avalon Technologies

The Cyber Security Spar in Integrating IT and...

By Vimal Goel, CIO, HPCL-Mittal Energy

Towards Cyber Resilience: A Data-Centric...

By Puneet Gupta, Vice President & Managing Director, NetApp India/SAARC

CXO Insights

Emerging Trends, Challenges & Future Prospects...

By Sujoy Brahmachari, CIO & CISO, Rosmerta Technologies

Exploring Data-First Security and Automation in...

By Maheswaran S, Country Manager - S.Asia, Varonis Systems

Securing IT-OT Converged Infrastructure

By Saurabh Sharma, SMIEEE, FIE, CEH, Chief Manager (BIS) & CISO, Petronet LNG Ltd.