Page 8 - Cyber Warnings December 2015
P. 8







At one time, that type of protection may have been adequate, but today, it will not prevent a breach
from occurring. Once that happens, it is crucial to make sure that the data itself is encrypted and
unreadable, not only to hackers from the outside, but to any insider threats that may exist. This
type of “data-centric” solution should be the staple of every organization’s cybersecurity plan.

Encryption cannot stop someone from accessing your information, but it does render that data
unusable. This is important, also, when it comes to the very real threat of data manipulation, which
continues to be a weakness of existing cybersecurity.

The results of such an act could have unintended and catastrophic consequences for utility grid
uses of data right on down to cases of identity theft.

Of course, there are other types of critical infrastructure that is highly dependent on computers to
function, and in the very terror-conscious world in which we now live, the thought of that control
falling into the wrong hands is alarming.

Data encryption can, and will, help prevent billions of dollars in damage while also stopping hackers
from destroying reputations and ruining lives.

Each one of us is only a single unencrypted file away from disaster.



About the Author

Dr. Leo A. Guthart is a security industry veteran who served as Chairman of
Honeywell’s Security Group. He also served as Chairman of Cylink Corporation, a
leading U.S. supplier of encryption equipment that was later sold to SafeNet, Inc.

He is currently Managing Partner at Topspin Partners Group.





















8 Cyber Warnings E-Magazine – December 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   3   4   5   6   7   8   9   10   11   12   13