Large
scale data breaches appear to be the new normal as just recently, JP Morgan
Chase announced that their information infrastructure was hacked. Investigation
by the bank and the FBI has indicated that 76 million households were affected
by the cyber security attack, approximately two-thirds of all American
households. The largest U.S. bank by assets said the unknown attackers stole
customers’ contact information, which is including names, email addresses,
phone numbers and addresses. This is following a trend in which similar large
scale data breaches occurred at Home Depot and Target in which practically
hundreds of millions of credit and debit card information was stolen.
Emails
have also proven to be a highly insecure way to communicate, but this is in
great part due to the fact that email was never meant to be a secure way for
people to communicate with each other. Email technology was developed in the
early days of the Internet as a means to standardize simple store and forward
messaging between people who were using different types of computers.
Initially, everything was readable by anyone that could watch network traffic
or access accounts. It turns out, the best way to protect communications is to
encrypt them, i.e., scrambling the email data with complex mathematical
transformations so it’s only intelligible once you provide the correct password
or other credentials to have them unscrambled.
Good
security however, goes well beyond just protecting the privacy of the contents
of emails. Emails have been a common way to introduce malware. This malicious
software may attempt to disrupt a computer operation or gather sensitive
information. Various anti-malware and anti-viral software programs have been
developed to prevent this. Spam filters have been developed to block out bulk
emails which may also contain such computer viruses. Phishing is an attempt to
gain sensitive information such as usernames and passwords, by using electronic
communications that masquerades as if they are coming from a trustworthy
entity. To block that anti-phishing software has been developed, as well as
various types of firewalls.
Ecrypt
Technologies, Inc. has developed an enterprise-wide email solution that covers
communication by wireless devices which provides military-grade standard
encryption. Their flagship product, Ecrypt One, encrypts all emails and
attachments, while removing the need for separate security programs such as
having additional anti-viral, anti-malware, anti-phishing, or spam filter
programs. Ecrypt One provides a unified solution with a centralized interface
that offers persistent encryption and secure archiving of all electronic
communication along with a dedicated compliance officer console and the
capability to produce detailed audit reports. The program allows users to
engage their email and use their contacts, calendars, and mobile devices, thus
insuring ongoing productivity. As encryption is on all the time, the chances of
human error unleashing an unprotected email are virtually eliminated. Ecrypt One
extends security policies to outside the using organization to its partners,
suppliers, and clients for total information integrity.
In
76% of all data breach cases, the primary causes were human factors such as
error, negligence, or human attack. Ecrypt Technologies has the technology that
guarantees businesses and government agencies can contend with all three.
For
more information, visit www.ecryptinc.com
About QualityStocks
QualityStocks
is committed to connecting subscribers with companies that have huge potential
to succeed in the short and long-term future. We offer several ways for
investors to find, evaluate, and learn more about investing in these companies.
Sign
up for “The QualityStocks Daily Newsletter” at www.QualityStocks.net
The
Quality Stocks Daily Blog http://blog.qualitystocks.net
The
Quality Stocks Daily Videos http://videocharts.qualitystocks.net
The
Quality Stocks “Ones to Watch” http://gotstocks.qualitystocks.net
Please
see disclaimer on the QualityStocks website: http://disclaimer.qualitystocks.net
No comments:
Post a Comment