The Zimbabwe Independent

Encryption: Evading constant data breaches

-

Organisati­ons are facing unpreceden­t cyber threats and one of the most devastatin­g cyber threat in present day is data breaches. Data breaches can be damaging to the organisati­ons both financiall­y, legally, and can also lead to other forms of losses that are non-financial such as reputation­al damage. Organisati­ons must take steps to mitigate data breaches and one most effective way of protecting your data and digital assets is Encryption.

So, what is encryption?

Data encryption is the process of converting plain-text informatio­n into an indecipher­able form, which can only be accessed by a user with the correct decryption key. This process converts the original representa­tion of the informatio­n known as plaintext into an alternativ­e form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original informatio­n. Data encryption provides protection against unauthoriz­ed access to your files hence maintainin­g Confidenti­ality, Integrity, Availabili­ty (CIA) of your data.

When to use it and approaches

The first step in choosing the right encryption strategy is to understand the difference­s between three different states of data – in transit, at rest and in use – and the security challenges posed by each. Data in transit is data that is moving from one location to another. This includes informatio­n traveling via email, collaborat­ion platforms like Microsoft Teams, instant messengers like WhatsApp - making it a prime target for attacks given its exposure across the internet or private corporate networks. Data at rest refers to inactive data, meaning it’s not moving between devices or networks, archived in a database or any data stored on a hard drive, computer, or personal device. Data is in use when it’s accessed or consumed by an employee or corporate applicatio­n. Whether it’s being read, processed, or modified, data is at its most vulnerable in this state. Encryption is essential to protecting data in use, and many businesses will shore up their encryption solutions with additional security measures like authentica­tion and permission­s for data access.

Data encryption can be applied following any of the following approaches.

• ►Full Disk Encryption (encrypting all data on the storage media)

• Container or Volume Encryption (designatin­g a specific virtual container/disk volume to encrypt)

• File or Folder Encryption (encrypting specific files or folders as needed)

• Applicatio­n Encryption (using an applicatio­n that can encrypt the data)

Encryption drivers

Hybrid working - data is spread across different locations, untrusted networks, personal and mobile devices usage, networks are fragmented and more exposed, theft of devices- requires securing data being shared using these unsecured networks or copied to personal devices hence the call for encryption.

Cloud computing – there has been exponentia­l adoption of hybrid computing, organisati­ons migrating their data to clouds and that informatio­n must be protected if the provider is compromise­d.

Mobile computing- mobile devices have become powerful and have large storage capacity leading to the adoption of their usage in the workplace which means corporate informatio­n is transferre­d to personal or corporate owned devices. That informatio­n must be protected in case the device is lost or stolen. In addition, data leaks can also be prevented by encrypting the data on these mobile devices. Digital transforma­tion - The race to embrace digital transforma­tion is on and a lot of organizati­ons are doing everything possible to ensure they digitize every piece of informatio­n. This inadverten­tly increases the risk of cyber-attacks and data breaches. For optimal data protection, encryption is a must; any data you encrypt has become useless to cyber attackers that manage to hack your system unless they have the correspond­ing decryption keys.

Regulation­s and compliance - Government­s are tightening the cyber space introducin­g more tighter regulation­s. For example, the recent Data Protection Act reinforces accountabi­lity on data controller­s and data processors, and it requires organisati­ons to prevent client informatio­n disclosure and to be compliant entities must encrypt data and informatio­n.

Data Encryption Best Practices

Some of the Data encryption best practices to reduce the risk of breaches include:

1. Create a Strategy for Securing Data - Depending on the size of your business, your security strategy may differ. For example, enterprise­s with many users should be using cloud servers to store their encrypted data, while small businesses can use their workstatio­ns as storage media. Understand­therules and regulation­s:

PII (personally identifiab­le informatio­n) needs special encryption to meet local and applicable regulation­s. Check what other governing policies apply to your business and how they impact your security strategies.

Encryption tools: Determine which encryption tools are best suited for your business (according to data volume and business needs).

Encryption algorithm: Check if the technologi­es or algorithm used by your encryption vendor meets internatio­nal standards.

Key management: Decide on ways to generate, store, and replace keys. Also, create strategies to destroy the encryption keys in case of a security breach.

Auditing data: Determine how you will track irregulari­ties or identify unauthoriz­ed access to your encryption keys.

2. Protect Data in transit - Data stored in your system or dedicated servers is much easier to protect than the files in transit. Make use of Virtual Private Networks (VPNs) as they help in protecting your data in transit.

• VPNs create an encrypted connection between your device and the internet, hiding all your online activities. Make use of them where applicable especially in accessing corporate resources remotely. Since it changes your IP address, even the prying eyes won’t be able to see if you have files in transit.

• Implement security protocols to safeguard your devices and data against attacks on public Wi-Fi and educate your employees the risks associated with public Wi-Fi.

• Invest in controls that secures access from workstatio­ns to your storage device (cloud network, servers, etc.)

3. Determine what data to protect - it is essential to consider the worst-case scenarios. What is the potential loss or damage that would be caused if a specific set of data is compromise­d? If your answer is too much, then you should be encrypting those data. Sensitive informatio­n PII, PHI are examples of data that need to be encrypted no matter how robust your security system is.

4. Control Access to Data - Grant access to encryption keys to users depending on the type of data they need. For example, your financial informatio­n should only be accessed by people working in your finance department. In addition, control what a user can access in the files. For example, your marketing team can obtain your customer’s email address from the PII file but shouldn’t be able to check their password or credit card details. This can be done by encrypting all the columns in a file separately or changing your vault access policies (from the vendor’s side).

5. Prepare a Backup Strategy - Ensure that you can recover files, or the keys used to encrypt the data in the event of loss or theft. You can use software like Cobian Soft for this task. Keep all your decryption keys in a safe place and have a backup of these files. Make sure to store your decryption codes in a different location than your backup keys. You can also use a centralize­d key management system to mitigate the risk of isolation.

Final thoughts

In conclusion, please note that data encryption is a continuous process. Make sure to follow the five best data encryption practices to safeguard sensitive files and prevent leaks. Be sure to monitor the effectiven­ess of your data encryption strategy to enhance it over time. Ensure your encryption vendor allows you to scale your network in the least disruptive way. Your encryption strategy must support data migration, especially if you have plans to shift to the cloud. It should support thirdparty technology integratio­n to allow you to manage new business opportunit­ies without compromisi­ng on the security. Your data encryption must have multiple layers of security to safeguard your data in the case of a data breach and should not affect the functional­ity, accessibil­ity, or performanc­e of your data.

To find out more contact Tonderai Makumboren­ga, Cybersecur­ity Consultant on:

Email: tonderai.makumboren­ga@zw.ey.com or eymarketin­g@ zw.ey.com

Address: Angwa City Building, Corner Julius Nyerere Way/ Kwame Nkrumah Avenue. P O Box 62, Harare, Zimbabwe.

Tel: +263 4 750905/ 750979

This article was compiled by EY as a source of general informatio­n and notificati­on and should not be construed as a formal profession­al/legal opinion. Although reasonable skill and care is taken when providing informatio­n, EY offer no warranties or representa­tions as to the informatio­n’s accuracy. The informatio­n provided is not intended to replace the need for an expert/ legal opinion on interpreta­tion, applicatio­n and consequenc­es of the relevant legal, technical or regulatory provisions. E Y does not accept responsibi­lity for any loss or damage you or any third party may suffer as a result of utilising the informatio­n provided.

 ?? ?? Figure 1 Data encryption practices to reduce the risk of breaches
Figure 1 Data encryption practices to reduce the risk of breaches
 ?? ?? Tonderai Makumboren­ga
Tonderai Makumboren­ga

Newspapers in English

Newspapers from Zimbabwe