MENU

Tuesday, 21 February 2017
In recent months, there have been a growing number of stories where personal data has been stolen, lost or subject to unauthorised access sometimes resulting in an inconvenience but on some occasions, an IT disaster.

In many of these cases, data was being inadequately protected or the devices the data was stored on being left in inappropriate places - and in some cases both.

Whilst the companies affected by cyber criminals may have been ’’big-business’ a few years ago, there is now a tendency for smaller businesses to targeted as their IT perceived as weaker yet their data is still valuable to criminals.

In addition, there are calls from government bodies to pursue regulatory action and fines for businesses where such losses occur and where encryption software has not been used to protect the data.

What Is Encryption?
Encryption is a mathematical function using a secret value the key which encodes data so that only users with access to that key can read the information.

In many cases encryption can provide an appropriate safeguard against the unauthorised or unlawful processing of personal data, especially in cases where it is not possible to implement alternative measures.

Benefits of Encryption:
- Encryption protects information stored on mobile (phones, tablets, etc.) and static (PCs, etc.) devices
- It also protects information as it is being sent (emails, etc.)
- It is a way of safeguarding against unauthorised or unlawful processing of data

Example of Encryption in Practice

An organisation issues laptops to employees for remote working. In order to reduce the chance of unauthorised or unlawful processing of the data in the event of loss or theft, the organisation requires that all data stored on laptops is encrypted.

Special Offer.
Register before March 31st and you can get 3 years for the price of 2 on our data encryption packages and each license can be used across multiple devices for the same user.
£75 NOW £50 per user
£39 NOW £26 per user (for non-profitable businesses)
Back to all articles
  • Cyber Essentials Service Partner
  • Microsoft Office 365
  • Datto
  • Cyber Essentials
  • Samsung
  • Webroot Secure
  • Microsoft Partner