Over the last couple of years, encryption has become par for the course for businesses who prioritize security. But almost as soon as encryption became mainstream, it also became clear that it wasn’t enough. Sure, encrypting your company’s data—and encrypting it at the file level—is necessary, but now more and more companies are asking not, “How can we encrypt?” but “What do we encrypt?” and more importantly, “Where is it?”
Category: Email Security
Gmail has been encrypting its email in transit for years, especially to secure the connections for emails sent between Gmail and other email providers. Over the last year, the number of encrypted emails sent has doubled. This is all good, because it means that any emails containing sensitive information are basically traveling around cyberspace in a “protective envelope” and can’t be intercepted.Read more »
Come April every year, most people begin a dalliance with a large amount of sensitive information in the form of tax documents. W-2s, 1099s, all manner of other IRS forms, and the tax returns themselves are a veritable treasure trove of personal information that you wouldn’t want falling into the wrong hands. If the wrong person intercepts any one of those forms, they’ll have your social security number, address, and full name—in other words, everything they need to steal your identity. Tax-related identity theft was the most common type of identity theft reported last year.Read more »
Even the upper echelons of government can’t escape the problem of shadow IT.
The revelation that Hillary Clinton spent her entire State Department tenure using a personal email account was surprising only in that someone so high profile could successfully circumvent technology protocol—and could do it without even the shell of an official email account. (After all, President Obama had a long running joke about his use of a Blackberry over an iPhone).Read more »