By Joseph Steinberg CEO, SecureMySocial @JosephSteinberg For many years, information security professionals have discussed, and promoted, a strategy known as “Defense In Depth,” in which an organization utilizes multiple layers of security controls rather than just one layer, with the hope that if some vulnerability exists in one of the layers, the...
Federal governments and major technology firms are arguing for or against encryption, respectively. But why? Due to recent political turmoil and devastating events overseas, the topic of end-to-end encryption has reentered public discussion. At the center of the debate, you have federal governments and major technology firms, each arguing for or against encryption. The...
By Joseph Steinberg CEO, SecureMySocial @JosephSteinberg Many businesspeople put their firms’ data at risk because they fail to understand several important concepts about encryption. Simply understanding that data can be protected from unauthorized parties by encrypting it is insufficient to deliver security; in order to secure information people must know when...
American cloud service providers such as Microsoft are opening local data centers in foreign countries at the request of the respective foreign governments and customers located in those countries. The thinking behind this strategy is that data located in a particular country is subject to the country’s data privacy laws, which may be different from those in effect in...
June 14, 2017
Leave a comment
Data Sovereignty,
data residency,
Cloud threats,
encryption
By CloudMask Team
All entities should ask “Who controls the key?” when using encryption services. Data breaches have become far too common, and as a result, the world is smartening up in regard to cybersecurity. While organizations have acquired and deployed numerous data protection tools and services, one method stands out from the rest: encryption. In fact, encryption is so powerful...
November 21, 2016
Leave a comment
Government surveillance,
data privacy,
encryption
By CloudMask Press
Data encryption like a safe with a lock. Imagine if you had a big strong lock on the front door of your house. And inside, to protect your valuables, you had a big strong safe with all the latest security features. You’d probably feel pretty secure. You’d sleep well at night. Now imagine if the key to your front door and the key to your safe were one and the same key....
Sensitive patient records held by healthcare organizations have to be stored and processed securely, both to guard the patients’ privacy and to comply with government regulations. As a healthcare provider responsible for patient information, you have to be able to detail what measures you are taking to safeguard patient data and you have to show that these measures are...
May 11, 2016
Leave a comment
Compliance,
Healthcare,
data privacy,
cyber threats,
encryption
By CloudMask Team
Tokenization is the process of replacing a sensitive data element with a random equivalent, referred to as a token that has no extrinsic or exploitable meaning. The token is a reference that maps back to the original sensitive data through a tokenization system. Both original sensitive data and token are stored encrypted in a secure database. Reversing this process by...
March 01, 2016
Leave a comment
Data Sovereignty,
Data Masking,
Tokenization,
cyber threats,
encryption
By CloudMask Team