Page 18 - NBIZ February 2021
P. 18

bits so that nobody can read or see
        the information without the secret                  To secure data, encryption uses
        key. This key consists of a password
        or digital file encryption (keyfile),               mathematic functions known as
        which secures plain text as well as                 cryptography algorithms,
        any other digital media like photos,
        videos, or software. One can also                   aka ciphers, some examples of well-
        encrypt a whole operating system                    known and trusted cryptography
        and a partition.
           To secure data, encryption uses                  algorithms are AES, Blowfish, Twofish,
        mathematic functions that are                       and Serpent. These ciphers can
        known as cryptology algorithms or
        ciphers. Some examples are AES,                     be subcategorized with a number
        Blowfish, Twofish, and Serpent.                     indicating its strength in bits.
        These ciphers can be subcatego-
        rized using a number indicating its
        strength in bits.
           An encryption algorithm key-
        length indicates its size measured in   Protects Privacy                 0   Do not use dictionary words
        bits and is always even because a bit   Encryption is used to protect sensi-  as your password; use a long
        is a binary unit composed of zeroes   tive data, including personal informa-  passphrase made up of capital and
        and ones. These keys control the     tion for individuals. Encryption, there-  small letters with punctuation
        operation of a cipher.               fore, ensures anonymity and privacy,   signs and numbers.
           The more mathematical strength    reducing opportunities for surveillance
        the encryption algorithm has, the    by both criminals and government    0   Do not use the passphrase you use
                                                                                    to encrypt your data for anything
        more difficult it will be to crack it   agencies. Encryption technology is so   else like your webmail password
        without access to the key. Unfor-    effective that some governments are    or an online forum where security
        tunately, a strong cipher normally   attempting to put limits on the effec-  can be compromised.
        requires more computational power.    tiveness of encryption.
        A few seconds of wait might not                                          0   Never trust a third-party service
        matter much to the home user, but    Protection Across Multiple Devices     to store your encryption keys
        for businesses dealing with thou-      Mobile devices are a big part of our   or carry out the encryption
        sands of calculations each hour      lives, and we often own several. As tech-  implementation. If you store data
        to decrypt/encrypt data in their     nology develops, more and more of these   online, encrypt it yourself on your
        servers it will mean that more       devices are joining the Internet of Things   computer.
        money must be spent in hardware      (IoT) phenomenon. Encryption technol-  0   Watch out for keyloggers and
        and electricity.                     ogy can help protect data and sensitive   malware on your computer that
                                             information across all devices, whether   could capture your keystrokes and/
        Advantages of Encryption             being stored or even during transfer.  or your secret passphrase. Use
        Maintains Integrity                                                         updated antivirus and firewall.
           Hackers don’t just steal infor-   Part of Compliance
        mation; they also can benefit from     Many industries and organizations   0   Never reveal your password
        altering data to commit fraud. While    have strict compliance requirements   to anyone, not even to an IT
        highly skilled and technical individuals   to help protect the data of their com-  support desk. N
        can alter encrypted data, recipients of   pany and their customers or clients.
        the data will be able to detect the cor-  ABIP assists clients with regulatory   Madhu Maganti is a Partner at
        ruption, allowing for a quick response   compliance assessments such as   ABIP Advisors where he leads the
        to the cyber-attack.                 HIPAA, GDPR, CCPA, NYDFS 500, etc.   Cybersecurity and Technology
                                             and we opine on the strength of the   Advisory services. With more than
        Secure Data at All Times             existing encryption processes as well   18 years’ experience, Madhu had
           Encryption works when data is     as provide recommendations based on   worked closely with clients across
        stored or transferred, making it an   benchmark practices.               a variety of industries to ensure
        ideal solution no matter how data is                                     compliance, identify security risks,
        being used. Usually, data is most vul-  Encryption Security Tips         mitigate threats and protect data by
        nerable to attack when being moved   0   Always choose an encryption     performing cybersecurity assessments
        from one place to another, therefore,   program that uses a standard     among a host of other services.
        encryption ensures protection during   cipher that has been scrutinized    He can be reached at mmaganti@
        this process.                          by experts, e.g., AES.            abipadvisors.com.

        18  NBIZ  ■ February  2021
   13   14   15   16   17   18   19