Encryption is the surest way to protect data, so why isn’t everyone doing it?

OryxAlign

Despite the undoubted importance of cybersecurity and sound data management across organisations, best practice remains elusive, argues Jon Fielding, EMEA Managing Director at Apricorn

US president Joe Biden has made an executive order on improving that nation’s cybersecurity, stipulating the need to encrypt data both at rest and in transit. Meanwhile, three in every ten IT leaders this year in our 2021 Global IT Security Survey revealed that their organisation had suffered a data breach that could have potentially been mitigated by encryption.

18% of respondents told us that their company had experienced a breach through lost or misplaced devices; a common occurrence despite peace-of-mind being easily achievable via end-to-end encryption coupled with correct backup and storage strategies.

Another 12% admitted point-blank that the breach at their organisation was down to a lack of encryption. This both highlights and underlines the crucial role encryption has to play in protecting sensitive information.

A knee-jerk response might counter by pointing out that the USA is not the UK. However, our world is one of globalised communications, cyber threats and multinational companies. Like it or not; we’re all connected.

Therefore, while a third of UK organisations now require all corporate data to be encrypted as standard, according to Apricorn’s latest survey of IT leaders, the share simply isn’t high enough as yet to deliver any desirable ‘herd immunity’ against cyberattack.

Step into encryption’s ‘brave new world’

Another 39% admitted that they could not be certain their data is adequately secured for remote working. Thus, better control over data security, both corporate and individual, is very clearly required. Meanwhile, cyber threats and attacks continue to evolve to target an array of vulnerabilities.

Luckily, enterprise data encryption and cryptographic techniques also continue to develop and innovate, keeping just ahead of the hackers. In addition, Federal Information Processing Standards (FIPS) continue to advance.

It has often been assumed that implementing cybersecurity can mean strangling device and application performance – but technological advances have reduced the chances of this issue. Solid state drives (SSDs) available today, for instance, are smaller than a deck of cards yet deliver read/write speeds of 350/310MB/s – nearly twice as fast as their immediate predecessors.

With hardware-based encryption, a device uses its own internal security features to protect information stored on it – no additional software is required that could itself be vulnerable to attack.

A malicious actor typically cannot simply apply a brute-force attack to crack the passcode for access to a hardware-encrypted device because the cryptographic module will stop accepting sequential incorrect attempts and eventually wipe access to the data once a pre-determined threshold is reached, ensuring that data can no longer be accessed by anyone. The long prevalent alternative of software-based encryption is vulnerable to portability challenges, counter resets or potential copying of an encrypted file for a cracking attempt.

Hardware-encrypted devices are becoming the technology of choice for storing and backing up encrypted data, especially while maintaining accessibility for a distributed or mobile workforce.

Removable storage devices with built-in hardware encryption can be assigned to employees – and managers – ensuring all data can be stored or moved around safely offline. Even if the devices are lost or stolen and inserted into another host computer, the information stored therein remains unintelligible to those not authorised to access it.

Back it all up – with policy and education

Many business managers may not have considered the use of a FIPS-certified, software-free hardware-encrypted mobile storage device. Incorporating pinpad authentication and device whitelisting practices – locking down USB ports to all but corporately approved devices.

In our survey, 18% of IT leaders also reported that they don’t understand which of their data sets need to be encrypted; 15% indicated they have no control over where company data goes and where it is stored. Again, this underlines the crucial role of sound policy and solid education to assist workers and management alike to enhance their awareness and practices to counter real-world threats anywhere and any time, even as they emerge.

We would argue, therefore, that not only should hardware encryption be considered, but that encryption of all data at all times should be mandated in policy and enforced at operations level.

The UK Information Commissioner’s Office agrees – noting that Article 32 of the General Data Protection Regulation (GDPR) states that organisations implement encryption where appropriate. Organisations should have an encryption policy in place that governs how and when encryption is implemented and train staff in the use and importance of encryption. Staff and managers alike should be included and their input sought and implemented at all stages of this ongoing process for the best results.

Developing and adopting a policy that covers an entire organisation and mandates the deployment of the right solutions at the endpoint not only allows employees to use their own hardware safely but gives them autonomy, assisting operational agility and defending against the risk of cyberattack. Of course, all policies should be regularly revised and training updated to ensure continued relevance.

With the hybridised workplace infrastructures of today, good cybersecurity practice means considering vulnerabilities associated with staff, partners, and customers wherever the touchpoint, and regardless of whether the endpoints used are corporate laptops and desktops or BYOD.

READ MORE:

Encryption is becoming increasingly important as critical to sound data management, and its use must be ramped up to avoid a rise in breaches in the many organisations seeking to retain the benefits of hybrid home/office working practices. This should happen today – there’s simply no better time.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Why DEIB is Imperative to Tech’s Future

Hadas Almog from AppsFlyer • 17th March 2025

We’ve been seeing Diversity, Equity, Inclusion, and Belonging (DEIB) initiatives being cut time and time again throughout the tech industry. DEIB dedicated roles have been eliminated, employee resource groups have lost funding, and initiatives once considered crucial have been deprioritised in favour of “more immediate business needs.” The justification for these cuts is often the...

The need to eradicate platform dependence

Sue Azari • 10th March 2025

The advertising industry is undergoing a seismic shift. Connected TV (CTV), Retail Media Networks (RMNs), and omnichannel strategies are rapidly redefining how brands engage with consumers. As digital privacy regulations evolve and platform dynamics shift, advertisers must recognise a fundamental truth. You cannot build a sustainable business on borrowed ground. The recent uncertainty surrounding TikTok...

The need to clean data for effective insight

David Sheldrake • 05th March 2025

There is more data today than ever before. In fact, the total amount of data created, captured, copied, and consumed globally has now reached an incredible 149 zettabytes. The growth of the big mountain is not expected to slow down, either, with it expected to reach almost 400 zettabytes within the next three years. Whilst...

What can be done to democratize VDI?

Dennis Damen • 05th March 2025

Virtual Desktop Infrastructure (VDI) offers businesses enhanced security, scalability, and compliance, yet it remains a niche technology. One of the biggest barriers to widespread adoption is a severe talent gap. Many IT professionals lack hands-on VDI experience, as their careers begin with physical machines and increasingly shift toward cloud-based services. This shortage has created a...

Tech and Business Outlook: US Confident, European Sentiment Mixed

Viva Technology • 11th February 2025

The VivaTech Confidence Barometer, now in its second edition, reveals strong confidence among tech executives regarding the impact of emerging technologies on business competitiveness, particularly AI, which is expected to have the most significant impact in the near future. Surveying tech leaders from Europe and North America, 81% recognize their companies as competitive internationally, with...

How smart labels are transforming supply chains

Sharath Muddaiah • 27th January 2025

As e-commerce continues to rise globally, the impact of just-in-time manufacturing and rising consumer expectations mean the need for real-time visibility has never been greater. Smart labels directly address this demand, offering solutions to long-standing challenges like shipment delays, theft, and the lack of traceability. With the smart label market projected to grow from $14.1...

The rise of loyalty apps

Sue Azari • 17th January 2025

Increased choice and a consumer more price sensitive than ever before, has made customers far more likely to shop around for the best deals. Price is now the number one factor in brand consideration. In an effort to bag a bargain, loyalty programs have become increasingly popular with consumers, with nine out of ten in...