Tip & How-To about Ricoh Network Data Protection Unit Type B - Encryption module

Three Data Encryption Scenarios and Their Importance

Why is data encryption important and what does a comprehensive data encryption strategy look like?
Data encryption is an important part of today's overall security strategy. The internet by design is out in the open. Anyone with the right knowledge and access can read any data you send or receive.

Similarly any data that is stored in your company is naturally unencrypted (aka plain text) and can be read by anyone with physical or remote access to your computers.
Why Is Encryption Important?

You may have sensitive data that only certain employees should be allowed to see or you may be sending an email to a client with a social security number or other confidential information. Password protecting a file is not enough to prevent it from being read. Hackers will use password cracking tools to access these types of files.There are also tricks to simply circumvent password protection. Encryption adds a layer of security that, when utilized properly, simply cannot be cracked without the proper authorization.

What do you mean by utilized properly?
It is important with encryption to use the right type of encryption. The right type of encryption is an open source encryption standard that has been tested and re-tested by the cryptographic community. All encryption types are only as good as the passwords protecting your data. A strong password is one that contains a combination of upper case letters, lower case letters, numbers, and special characters (like &*!^). The password should be at least 8 characters long. As time goes on, the general consensus tends to recommend more characters. A minimum of 10 characters might be a better recommendation for this day and age and to future proof a bit.

Some examples of strong encryption or cryptographic algorithms are RSA-2048, RSA-3072, ECDH-384, AES-CBC.

Encryption Scenarios:
File and hard drive encryption - whole folders or whole hard drives can be encrypted to protect data at rest. This is great protection against data theft. If, for example, someone steals your laptop and looks at your data they would see a bunch of random characters instead of the contents of your files.

Encryption in-transit - Under most circumstances, when an encrypted file is moved away from its home in an encrypted folder or hard drive, it is no longer encrypted. The same principle applies when data is travelling over a company network or the internet. Data also has to be encrypted while it's moving. When, for example, you use a remote laptop to access company files, a VPN or virtual private network can be used. The VPN creates an encrypted tunnel that shields all data passing through it from the prying eyes of the internet. When sending a sensitive file as an email attachment, special email encryption software can be used. When data is transferred over the internet between say a website and your computer SSL or secure socket layer can be used. These are all different scenarios where data in transit is being protected.

Portable Encryption -
USB keys and external hard drives can be encrypted in case they get stolen. The data is temporarily unencrypted for viewing by using a password.

Password encryption-
Password lockers like LastPass or Roboforms can be used to encrypt all of your passwords with a complex master password. Master passwords are further protected by other cryptographic methods such as salts. A salt defends against such things as dictionary attacks which attempts to guess your password by guessing it thousands or even millions of times.

If you take one thing away from this article, please take away this. In order to fully protect data it must be encrypted while it is at rest and it must be encrypted while in transit. Generally two or more solutions are required to accomplish this task. Software such as ESET Deslock+ are great for protecting data at rest and via email. There are also a lot of different vendors providing networking equipment that contains VPN capability.

Talk to your IT support vendor about a comprehensive strategy for protecting your data.

Talk to your web developer about encrypting sensitive data to and from your web-site.

For data and other IT related question visit our Denver IT Services website

Posted by on

Ricoh Network Data Protection Unit Type B - Encryption module Logo

Related Topics:

Related Questions:

0helpful
1answer

why is my usb saying not encryptable

The above indicates that the PGP portion of the disk (the encrypted contain if you will) is healthy. However, the partition table and/or file system within that container has run into an issue. This may be due to a physical problem with the disk or some other cause. I would suggest whatever data recovery / broken file system strategy you would use if the disk were not encrypted. I know there are free software recovery tools, commercial software products and data recovery services which may be of assitance in repairing/restoring the file system. One thing to keep in mind is that the file system in question isn't visible (and can't be worked on) until after you have authenticated to the disk. This pretty much means the recovery will need to be done from within Windows.
0helpful
1answer

"This memory card is encrypted but the phone encryption is off"how would that happen ?

I'm using E71 device, yesterday i heard about new firmware available for my phone. I had backed up my phone with Memory card encrypted with stored key file. After update new firmware successfully i go check memonry card enter password correctly open encyption function to store but my phone keep saying: invalid key file
Now i lost more important data in it with whole my private things, credit card, identify, taxing billing, pictures and company most important file
Not finding what you are looking for?

1,033 views

Ask a Question

Usually answered in minutes!

Top Ricoh Office Equipment & Supplies Experts

ZJ Limited
ZJ Limited

Level 3 Expert

17989 Answers

Cindy Wells

Level 3 Expert

6688 Answers

Grand Canyon Tech
Grand Canyon Tech

Level 3 Expert

3867 Answers

Are you a Ricoh Office Equipment and Supply Expert? Answer questions, earn points and help others

Answer questions

Loading...