Menu
​Why data encryption must be a priority for the digital business

​Why data encryption must be a priority for the digital business

Organisations large and small are investing in digital transformation programs, cloud migration projects, and enterprise mobility initiatives.

Organisations large and small are investing in digital transformation programs, cloud migration projects, and enterprise mobility initiatives with a view to growing the business and increasing operating efficiency.

However, corporate information security management policies do not appear to be adapting quickly enough to cope with the tumultuous rate of change imposed by the rapidly evolving business and technological landscape.

“Although encryption has been around for many years, it has come to the fore again recently as a means of making it more difficult to gain unauthorised access to sensitive or confidential information, especially within the context of mobile devices,” says Richard Edwards, research analyst, Ovum.

“We fully expect increased adoption of encryption technologies in the near term as organisations bolster conventional approaches to information security management in an attempt to stem the flow of data leakage incidents and privacy breaches.”

Edwards believes that most data will eventually be encrypted at rest and/or in motion; however, for a variety of technical, practical, and legislative reasons, organisations must be diligent and meticulous in their use of this technology, with the customer and employee experience being of paramount importance.

“Companies can prioritise the encryption of corporate data by carrying out a data classification exercise across their business processes and IT infrastructure,” Edwards adds.

For Edwards, data classification can be a “resource-intensive and costly” process, as not only is it time- and resource-consuming to implement a manual classification in the first place, but it also requires employees to be aware of changing classification policies going forward.

In addition, there is also the issue of applying policies to information and data items that are already in motion or in distribution channels.

While training can help raise the awareness of data privacy and information security management issues, Edwards believes organisations must first focus on the basics, which means putting in place a set of “robust, reliable, and easy-to-use” solutions to address the most common data-related activities that employees undertake every day.

“For most enterprises, this means improving email information security management and adopting a more proactive approach to the distribution and sharing of file attachments,” he explains.

Going forward, Edwards says the only realistic way of managing and maintaining such processes is to instantiate the organisation’s information security management regime through the use of automated, policy-driven implementations.

“And in the case of email messaging and file sharing/transfers, this means adopting solutions that are capable of securing data in motion as well as data at rest, both on-premise and in the cloud, and in a manner that is near enough invisible to the business end user,” he adds.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags encryptionovum

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.​

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments