News

Expert identifies challenges in encryption implementation

As more threats emerge in the cybersecurity landscape, IT decision makers are tasked with the increasingly difficult challenge of protecting their company's assets. There has been more emphasis placed on data security in light of 2012's high-profile data breaches.

Companies that have struggled to incorporate computer security best practices may be hindered more by a lack of clear implementation guidance than by a lack of effort, according to Karen Scarfone, co-author of the NIST's encryption guidance. For example, most business owners understand the value in encrypting data, but the company's formal encryption policy may not specify the strength of algorithm that should be used. Further complications can emerge when organizations lack clear guidelines for what information should be protected. 

"An organization should have a policy that requires all its users and its system administrators to use strong encryption algorithms," Scarfone told Information Security Media Group.

Scarfone expanded on the relationship between encryption technology and authentication. While encrypting data is not inherently complicated, many businesses fear that the mechanisms used to verify identity could affect the end user experience. However, it is critical to put effective authentication measures in place to prevent unauthorized access to protected data. Covering the interview, GovInfoSecurity contributor Jeffrey Roman extracted the theme of unification from Scarfone's commentary. By establishing clear policies, businesses can ensure their practices are effective and consistent across deployments. 

Start building a solid information security foundation by protecting data in transit with an SSL certificate today.

corporate office

Thawte
The Gateway
Century Lane
Century City, 7441
Cape Town
South Africa

Postal Address:
P O Box 15986
Panorama 7500
Cape Town
South Africa

Call: +27 21 819 2200
Fax: +27 21 819 2950