Data Security

You might have read about data security (or the lack of) because of snooping by the NSA and GCHQ; multi-nationals being hacked and embarrassed on a global scale; or whistleblowing by the likes of Edward Snowden. Data security is an understandable concern for individuals, businesses and charities.

Following the iCloud hack in 2014, a positive outcome was to focus the mainstream media’s attention on data security and who is responsible for protecting the data. Ultimately, the owner of the data (not the cloud storage provider) is responsible. Our advice is:

  • Use a password manager to manage account passwords. You only need remember the password for the password manager. DO NOT forget it or you’ll lose all saved passwords.


  • Use two-factor authentication (2FA). Potential hackers must know something (password) and have something (e.g. phone) to gain access to your account/s. We use Authy because it makes encrypted backups to the cloud, and has mobile and desktop apps. 
 
Play Video about Authy

Encryption is the most secure technique to protect data saved to cloud-storage that doesn’t automatically encrypt data. Encrypted data remains safe from hackers and unethical employees. However, if you forget the encryption password, you’ll be unable to decrypt your data, so be careful. After Boxcryptor sold out to Dropbox, we used Cryptomator.

Play Video about cryptomator
Play Video about Sync

Instead of using cloud storage plus an encryption solution, an alternative is to use encrypted cloud storage. Sync (5GB for free) protects privacy with end-to-end encryption; ensuring your data in the cloud is secure and 100% private. If you lose your password, there will be no way to recover it because Sync keeps no record (known as zero-knowledge). We also use Filen (10GB for free).


End-to-end encryption (E2EE)

E2EE is a data security measure that scrambles information at its origin and only decrypts it at its destination, making it unreadable to anyone in between. This is important because:

  1. Privacy Protection: End-to-end encryption safeguards personal and sensitive information from unauthorized access. In an era where digital communication is ubiquitous, protecting the content of messages, whether they are personal conversations or business-related communications, is paramount to maintaining privacy.

  2. Security Against Eavesdropping: With end-to-end encryption, even if data is intercepted during transmission, it remains encrypted and thus useless to hackers. This protects against cyber threats, including eavesdropping and data breaches.

  3. Trust in Digital Communication: Knowing that messages, calls, and files are end-to-end encrypted builds trust in digital platforms. Users can communicate freely, knowing their information is secure, which is essential for the digital economy.

  4. Compliance & Ethical Standards: For businesses, end-to-end encryption helps comply with data protection laws and regulations, such as GDPR in Europe. It demonstrates a commitment to data security and privacy, fostering trust with customers and partners.

  5. Protection Against Data Manipulation: End-to-end encryption not only prevents unauthorized access but also protects against the alteration of data. This ensures the integrity of the information being communicated, which is critical in fields like finance, healthcare, and legal services.

In summary, end-to-end encryption is a cornerstone of modern digital security. It enables individuals and businesses to communicate and share data securely, fostering a safer and more trustworthy digital environment.

For information about how we can help your business, contact us.

Read how we protect our data and our clients’ data in our GDPR Policy.