10.8.17

Avoid getting lost in encryption with these easy steps


Encryption can be the answer to many data security issues faced by small and medium businesses. Not only can it protect sensitive information from unauthorized use and minimize the risks arising from data breaches, implementing this technology can also represent another step towards compliance with legislation, especially with respect to the General Data Protection Regulation (GDPR).
But in cybersecurity, there is no silver bullet – meaning that no single product or service can handle all the potential threats out there. This applies to encryption also, as even this technology – despite its many advantages – still has limitations that you need to take into consideration. So before opting for a specific product, be sure you know the one that best fits your needs.
Focus on ease of use
According to a recent study on data breaches carried out by the Ponemon Institute, human error is second only to malicious actors when it comes to the most commonly cited root cause of data leaks. However, these can be avoided by deploying a solution that is easy to use.
“There will always be the need for some encryption to be carried out by the user, based on policy and training.”
There will always be the need for some encryption to be carried out by the user, based on policy and training. If these actions require expert knowledge and the product is not user-friendly, employees might try to find the easy way out and company rules could be broken. With a simple, user-friendly solution, this can be avoided.
Require a solution with easy management
A recent IDC survey on ESET’s behalf has also shown that ease of management and ability to recover a lost access key are among the most important criteria when a business is in the process of choosing an encryption solution.
To avoid cases where employees are unable to decrypt their data because they have forgotten their keys, search for solutions that use a system of shared encryption keys, managed by on-site system administrators.
This is similar to the use of actual keys, something we all understand before starting elementary school. On top of that, it also makes sharing encrypted data within a predefined group quick, easy and in many cases, transparent for the user.
Ask for adaptability, scalability and flexibility
The solution you choose should be scalable and flexible, so that you can easily add advanced features if necessary, enabling you to vary enforced policies and keys remotely — helping you to keep a strong default configuration.
Select a product that doesn’t require reinstallation for upgrades or renewals. In addition, don’t forget that if an encryption solution is available as a perpetual license, including annual maintenance and support, or as a subscription license, it can enable you to manage costs and improve your financial flexibility.
Choose whom to trust
Select a solution that employs industry-standard encryption algorithms that you can trust, and a sophisticated key-sharing system for secure data exchange among all users.
Check if the encryption solution you are considering meets the rigorous FIPS-140-2 standard in the US and is validated by the National Institute of Standards and Technology (NIST). Also verify if it has been certified by key players on the market (i.e. OPSWAT) and has performed well in independent tests.
There is no such thing as a bad question when it comes to data protection
Set your data protection strategy carefully and choose the encryption solution that helps you fulfill it in a way that suits you best. To make the right decision, don’t shy away from any questions you might have about usability and features of the product, even if they sound obvious to you. You might be surprised how many encryption solutions on the market don’t cover the basics.
If you want to know which questions you should ask and what answers to seek, we will help you in our next blogpost, so stay tuned and read more on WeLiveSecurity.com.

8.8.17

Virus Bulletin 2017: Small Talks announced



Virus Bulletin has recently announced some of its Small Talks and reserve papers for the Virus Bulletin 2017 Conference, including the Small Talk in which I’m participating at this year’s conference.
‘Small Talk’ has a slightly misleading sound in this context: the name actually refers to the fact that these are held in a smaller room, enabling a more informal discussion. However, the session is much longer than the presentations in the main rooms. My part in this one is to present my paper on ‘The (testing) world turned upside down‘, which will be a normal 30-minute presentation. But there will then be a more general audience discussion of testing issues led by AMTSO Chief Operations Officer John Hawes, so the whole session runs from 11:00 to 12:30 on Thursday 5th October. I expect the discussion to be lively: testing discussions usually are.
Martijn Grooten tells us that more small talks will be added in the coming weeks, and there’s plenty of time left to submit a last-minute paper (the deadline is September 3rd). The conference programme as it currently stands, however, is available here. Virus Bulletin’s Small Talks have been introduced since I last attended a VB, so I look forward to seeing one (or more) in action.
Another innovation introduced since my last VB concerns reserve papers (papers that are presented if one of the initially-scheduled presenters is unable to make his or her presentation). Space has been set aside for any reserve papers that haven’t been ‘promoted’ to the main programme to be slotted into the Small Talks stream. That seems to me to be an excellent idea: it’s always a pity when a good paper doesn’t make the impact it deserves because there wasn’t an opportunity to present it live.
My ESET colleagues Peter Kalnai and Michal Poslusny will be presenting their paper on ‘Browser attack points still abused by banking trojans‘ at 15:00 on Wednesday 4th October, and Tony Anscombe, an industry veteran but a relative newcomer to ESET, will talk about ‘A visit to the dark side‘ at 17:00 on the same day. There will, of course, be many other presentations of interest, and it’s often a struggle to choose between two or even three events taking place at the same time.
On a personal note, VB2017 will probably be my swan song in terms of major conferences: I don’t plan to fully retire (or die!) for a while yet, but I don’t find travel very easy these days. And there’s a certain pleasant symmetry, since VB1997 saw my very first conference presentation. This will be my 16th VB paper (and the fifth on testing – maybe I need to find a new obsession): I feel honoured that Virus Bulletin has given me so many opportunities to ride my favourite hobby-horses at one of the world’s most prestigious security conferences, and I’m looking forward to meeting some of the many friends I’ve made in the security industry in the past few decades. And maybe making a few new ones. See you there, maybe?