Encryption Key Storage

Protect Your Crypto Keys, Protect Your Data

Encryption has become a hot topic not only in the tech world but in the world of government as well. Adding backdoors to encrypted products is a movement of which many leaders are in favor. People are searching for more … Continue Reading

Encryption and Telecommunication in Australia

Australian Telecommunications Act Causes Privacy Concerns

Australia has been a hot topic in the tech world due to its bills and legislation that give law enforcement and other government officials backdoor access to technology and the power to intercept communications to check for threats or criminal … Continue Reading

Data Protection COVID-19 Reseacrh

How Researchers Can Protect COVID-19 Research Data

The COVID-19 pandemic has not only changed the way we live but has changed the way that medical researchers are operating. Many organizations have dedicated their time and resources to finding a vaccine for the Coronavirus and need data such … Continue Reading

Healthcare Cyberattack Increase COVID-19

Healthcare Sector More at Risk for Cyberattacks During COVID-19

Healthcare facilities have been a target for cyberattacks and data breaches even before the pandemic. A health record that includes Protected Health Information (PHI), is more valuable than any other type of stolen data with a selling cost of up … Continue Reading

Secure USB Policy Remote Work COVID-19

Implementing Encrypted USB Policies During WFH and Beyond

Since flash drives hit the market in the late 1990s, they have grown to become one of the most popular devices for storing data. Companies give them away at trade shows with their company logo and schools give prospective students … Continue Reading

CIA and German Encryption Scheme

CIA Participates in Nationwide Encryption Scheme

Government entities worldwide have used encryption to enable confidential communication about covert operations, allied countries, and strategic plans during wartime. Beginning in the 1940s during World War II and continuing throughout the Cold War, a machine known as the M-209 … Continue Reading

Best Practices to Protect PHI from Hackers

How Healthcare Organizations Protect PHI from Hackers

To a healthcare organization, its most valuable assets are the technology used to treat disease and highly trained medical professionals who care for patients. To a hacker, the most valuable asset is protected health information (PHI). This dataset contains information … Continue Reading

FBI Apple Encryption Debate

Government Asks Apple for Encryption Backdoor in the Name of Security

Following an incident in December 2019 when a Saudi national opened fire at a military base in Pensacola, Florida, the US government has been trying to make it easier for federal officials to access critical data for foreign shooters. In … Continue Reading

FIPS Encryption in Healthcare

FIPS-Level Encryption Means Higher Security for Healthcare

Encryption alone stands as a vital layer of protection for your sensitive data, but encryption that is FIPS validated brings a whole new level of government-approved security. Federal Information Processing Standards (FIPS) are standards set forth by the U.S. government … Continue Reading

Encryption Backdoor for Law Enforcement

Congress Warns Tech Companies About Encryption Backdoors

Recently, the federal government issued a staunch warning to technology companies: if you don’t regulate encryption, we will. Encryption is a form of protection that scrambles data so that it can only be accessed by authorized individuals. Law enforcement agencies … Continue Reading