Go to Top

Tag Archives

Tag Archives: data security

The Black Market for Data

If the right kind of personal data – credit card numbers, email addresses, online credentials, or bank account information – falls into the wrong hands, you can be sure criminals will use that data for their personal gain or sell it on the black market, where buyers and sellers anonymously deal in stolen or illegal goods and services. On the darknet, the secret and hidden part of the Internet, everything …Read More

Encryption – What Would it Take to Crack It?

Due to the recent rise in ransomware attacks, encryption has become an important issue.  The history of the encoding information began about 4,000 years ago.  Egyptian scribes used special hieroglyphs to encode grail inscriptions.  News – be it war or simple love letters – were written in such a way that an unintended reader could not grasp the meaning. One of the simplest methods is moving characters in the ABC …Read More

Secure Data Erasure Management with Hosted Erase

Revelations of data leaks are now part of the daily business news.  Whether large Internet providers or telecommunications companies or the customer database of a global player are affected – the statistics show alarming figures regarding the frequency and success of cyber attacks and attacks on sensitive information from illegal data collectors.  This increases the pressure on large corporations and companies that are obligated to protect and prevent their electronic …Read More

The Perfect Backup

Whether smartphone or tablet, Windows PC or Mac:  In today’s time a proper backup is a duty, at least of the most important data.  Accidents can occur, thieves are on the move and data theft in electronic assistants pile up. We don´t want to propose single programs here, but offer an overview of what has to be respected to be on the safe side with the backup process. Since it’s …Read More

How Secure Is The Cloud?

How secure is the cloud? While some people still associate the cloud with a lack of security, perceptions are changing.  Proponents of the cloud industry say it is very safe, and highlight that like any other purchasing decision, corporations must do their due diligence and ensure that they choose an established supplier. First, make sure you’re ready to go “cloud” One place to start is to look at their reference …Read More

Encryption decrypted

What is encryption? Encryption is the process of transforming information (referred to as plaintext) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a “key”. The result of the process is encrypted information. In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. …Read More

GDPR – Will On-site Data Erasure be a Must?

The General Data Protection Regulation (GDPR) has officially gone into effect and many companies are now adopting their data protection and business continuity plans to these new rules in order to avoid the massive fines for non-compliance.  For most companies, these fines can be  life threatening, with up to four percent of the total worldwide turnover, every aspect of the law has to be checked and if necessary to be …Read More

GDPR – 8 things you should be doing now to prepare

With the approval of the General Data Protection Regulation (GDPR) by the European parliament on April 14th, almost every company doing business in the member states of the European Union need to comply. (Great Britain and Denmark have negotiated several exceptions in justice and home affairs – the regulations will therefore be limited in those two states). For every other member country the regulation is now valid and its rules …Read More

Encryption – the oldest (?) discipline in the world

Contrary to what might be expected, information safety is as old as humanity itself. Before encryption, even the first primates to develop the ability to speak must have realized how important it was to keep a secret, as they would lower their voice to a whisper or communicate using signals shared only by the initiated. Secrecy became more of a serious matter once people had acquired the skill of writing …Read More

The current debate on mobile data encryption: Who should have access?

Every technology manufacturer approaches encryption in a different way. They all have their own methods and algorithms for encrypting data on their devices. One of the most reputable companies for encrypted data is Apple. In recent news, Apple has been ordered by the government to develop new tools to disable security features to allow the government to have access to the iPhone from one of the San Bernardino shooters. We …Read More