Tag Archives: end-to-end encryption

Data security for business: combating the threats

How to protect the data from breaches

The negligence of the companies may cause leaks when the business owners prefer to save money on anti-virus software and leave the employees without clear instructions on security policy. In the meantime, external threats can be sometimes too sophisticated for countering. Therefore, companies should anticipate disaster response. We gave an overview of the most common data breaches in business in our previous post. Now it’s time to speak about combating them. The methods of data breach prevention will be in our focus today.

Business owners are interested in the best control of their data. The risk of breaches is especially high when the company has to protect not only its own affairs, but also the customer databases. Apart from hacking poorly protected systems, frauds may perform malware and social engineering attacks.

To secure themselves, the most responsible companies hire high-qualified IT professionals, build a solid security infrastructure and train employees. Nonetheless protecting the perimeter is not a guarantee that the sensible data is unreachable for violations elsewhere. The data should stay secure during all operations including transmitting, editing and storing. If you are not an IT specialist, not all the cases when data is vulnerable are evident. However, when you know the threats – you can diminish the risks. The Online Trust Alliance (OTA) reported that more than 90 % of data breaches that occurred in the first half of 2014 could have easily been prevented.

Continue reading

Encryption: lock the barn door before the horse is stolen

vipole encr

While security breaches are regularly making the news, the attention of users and companies is driven to encryption. Encryption protects access, data and interactions by transforming information to make it unreadable for third parties. But there is no such thing as universal encryption and there are multiple types of it used for online communication. The two core aspects about encryption are the spans of the network when the data is encrypted and the access to the keys. We’ll speak about them today.

The essential thing about using encryption for online conversations is to protect the data both when transmitted and when stored. Some services provide protection only while transferring the data, but the data on the servers is accessible for the company members.

VIPole has developed a different approach. End-to-end encryption in VIPole protects your data at all stages of transfer and storage. The files are stored encrypted both on the server and on the devices of VIPole users. We minimized the presence of the man in the system and there is no one in between who could monitor your activity.

Continue reading