Clocking in from the couch – and how to do it securely!

Clocking in from the couch – and how to do it securely!


Tue, 07/14/2020 – 04:28

Over the last few years, IT and information security departments have been faced increasingly with a double whammy – the growing severity of data breaches and increasingly stringent data security and privacy regulations. COVID-19 and the almost overnight change to remote working, served as the final nail for many with IT architectures not set up to handle these new scenarios.

The current adoption of work-from-home policies across industries has created unprecedented opportunities for cybercriminals to exploit security vulnerabilities and trigger a data breach.

As Sandy Shen from Gartner notes, the COVID effect “Is a wake-up call for organizations that have placed too much focus on daily operational needs at the expense of investing in digital business and long-term resilience.”

Together, all these issues have contributed to a rush from organizations to consider data centric solutions rather than perimeter solutions, with an eye firmly on securing sensitive data and services across all channels.

As more email and file sharing applications are hosted in virtual, cloud-based and hybrid platforms, protecting the confidentiality and integrity of enterprise data can be difficult. Data encryption is an obvious solution, but with many point solutions on the market, these address just one part of the puzzle. This in turn introduces an increased level of complexity when it comes to managing multiple data security solutions. And what of the increased levels of trust demanded by extremely sensitive data sets such as those classified as governmental or organizational top secret.

Encryption can be viewed as complex, and the management of encryption keys can be challenging for those organisations without strong security specialists. It’s important to remember that whoever controls the keys controls access to the data.

  1. Start with your data and operations. How you work and how you value your data is most important: the tool should fit you, not the other way round.
  2. Select encryption and key management technologies that offer a smart, centralised approach. Once data’s lost it’s lost, so no good building a fortress around your datacentre if your laptops are leaky.
  3. Ensure the tools fit your environment and work across clouds, on-premises and in data centres. Consistency is key – less to learn, less to go wrong, greater business agility.
  4. Implement strong identity technologies: hardware-backed PKI for machines, multi-factor authentication for humans

nCipher and Galaxkey have partnered together to provide an easy to use, high assurance encryption platform that allows users to encrypt their email and file data, no matter the network they traverse or where they are stored – so you can sleep peacefully at night!

If you’d like to learn more about protecting your sensitive email, files and electronic document signing, why not check out our webinar with Galaxkey.

Click here to register for the live webinar on July 16, or view on-demand later

Blog featured image
Clocking in from the couch – and how to do it securely!

Blog Authored date

*** This is a Security Bloggers Network syndicated blog from Drupal blog posts authored by olivier-zemerli. Read the original post at: