SIDEBAR
»
S
I
D
E
B
A
R
«
Evolving IT Security
Aug 29th, 2016 by aperio

you-may-bring-guests

We look forward to seeing all of you at Seasons 52.  This will be an open forum discussion meaning you may ask questions throughout our event.  We are here to help answer any questions and guide your company down a successful path.  We will also be holding a raffle at the end of our session.  Thanks and please register before spaces are all gone.

When Security in the Cloud Gets in the Way of Work
Oct 5th, 2015 by aperio

As more companies move to cloud-based services, security in the cloud is becoming a greater concern. How can you make sure your company’s sensitive data is protected while still taking advantage of the convenience the cloud offers?

What is the Cloud?

First, we need to understand exactly what we mean when we talk about the cloud. Confusingly, the term can be used for very different things. People may be referring to the public cloud, to a private cloud, or to a hybrid of public and private.

A public cloud is one that is accessed by multiple users and organizations. With a public cloud, providers offer applications and storage via the internet to the general public. Lower cost is the main advantage of a public cloud. Limitations include security concerns for sensitive data.

A private cloud is accessed by only one organization. While a private cloud can reduce security concerns and offer the opportunity to customize for an organization’s needs, it also involves the additional costs of development.

A hybrid cloud, obviously, is a mix of public and private, allowing organizations to use different solutions for different needs.

To take advantage of cloud services effectively, organizations need to be aware of their needs. For example, companies that deal with health information or financial, or other sensitive data will want to avoid storing that data in a public cloud.

What Issues Do Your Company and Your Employees Face?

One of the greatest difficulties faced by employees is cumbersome security requirements. For example, according to a July 1015 study done by Dell, approximately 85% of users are faced with the need to have and keep track of multiple passwords for the different services they use on the job. Additionally, 82% of users who work remotely reported that they are required to use additional security measures. Ultimately, the study showed that 91% of users feel that their productivity is impacted by the steps they have to take to meet security needs.

The case of multiple passwords is especially worrisome, as employees tend to be focused on completing tasks over meeting security requirements. This can lead to disastrous workarounds, including using the same password for all cases, making a hacker’s job easy, or even writing down passwords and keeping them in poorly secured locations. If you’ve ever written a password on a slip of paper and “hidden” in under your keyboard, you know how easy it is to fall into the habit of workarounds.

However, most companies know that security has to take priority over ease of use. This makes sense, especially when dealing with sensitive customer data. How can companies balance these two competing needs?

What Solutions are Available for These Issues?

One promising approach is known as “context aware” security. This approach involves varying levels of security requirements depending on different factors. For example, a company might require only a standard level for a user whose geographical location is in California, but place additional scrutiny on a user logging in from an Eastern European country. This is a more sophisticated approach than those available in the past, which would either allow all users to log in easily regardless of geographical location, or would subject all users to intense scrutiny regardless of location.

More generally, encouraging IT professionals to move away from a “silo” approach to security will alleviate the need for multiple passwords. In the “silo” approach, new features are added to systems independently of each other, without much thought given to how each addition will interact with old features. In the short term, a quick and easy way to provide security in this environment is to require users to create a new password each time they need to be given access to a new feature. But in the long term, this is costly in terms of encouraging users to get around security with risky workarounds. Taking the time to have a coherent overall plan for adding new features will minimize this risk.

A Crash course on encryption
Apr 13th, 2015 by aperio

The internet has transformed the way people live. It has changed everything from the way we learn to the way we shop. We use the internet to carry out a number of activities ranging from reading news, playing games and interacting with friends and family, besides a number of other things. We think that we only receive information from the internet; however, this is far from the truth. In the process of browsing the internet, we actually send out a lot of information such as our identity and location. We generally aren’t as safe on the internet as we may think we are.

For instance, when shopping online, our name, address, and credit card information are transmitted over the internet to the vendor. With such private information being channeled through the internet, it is vital that certain measures be taken to ensure privacy and confidentiality of the data. Latest information technology news tells us that the number of cyber crimes is on the rise.

This is where encryption comes in. Simply put, encryption scrambles the data which is to be transmitted over the internet in a way that can only be decrypted by someone who has the encryption key.

The concept of encryption is based on cryptography, and it is of two types:

  1. Public Key Encryption
  2. Symmetric Key Encryption

Public Key Encryption

With this type of encryption, two different keys are used. There’s a public key and there’s a private key. For example, if a person wants to send encrypted data over the internet, the public key is used to encrypt the data; however, the data can only be encrypted by the recipient using their private key.

This method can be used to send secure emails and to digitally sign the documents. Secure Socket Layer (SSL) and its newer method, the Transport Layer Security (TLS), are examples of public key encryption systems.

Symmetric Key Encryption

In this method of encryption, both the sender and the receiver use the same encryption key. This simplifies the process and makes it faster. Nonetheless, the key and the data can be compromised while in transit over the internet. Data Encryption Standard (DES) was a type of symmetric key encryption that is replaced by a more modern Advanced Encryption Standard (AES).

Encryption of Data

The advantages of encryption aren’t just limited to the internet; you can encrypt your data on your computer, your USB storage devices, hard drives, mobile devices and numerous other data storage devices in order to prevent misuse of data if your devices are lost or stolen.

Importance of Encryption

As learnt from the latest information technology news, the number of cyber crimes is on the rise and this makes it necessary for computer users to keep their data safe from hackers. Large corporations and governments require high levels of encryption in order to protect their sensitive plans such as business secrets and confidential data. It also gives us peace of mind that our data is not getting into the wrong hands.

SIDEBAR
»
S
I
D
E
B
A
R
«
»  Substance:WordPress   »  Style:Ahren Ahimsa