{"id":875,"date":"2020-02-24T13:34:54","date_gmt":"2020-02-24T13:34:54","guid":{"rendered":"http:\/\/zikzag.wgl-demo.net\/?p=875"},"modified":"2021-06-22T23:24:42","modified_gmt":"2021-06-22T23:24:42","slug":"can-data-encryption-keep-your-data-security","status":"publish","type":"post","link":"https:\/\/stash.global\/can-data-encryption-keep-your-data-security\/","title":{"rendered":"Can Data Encryption Keep Your Data Secure?"},"content":{"rendered":"\t\t
The short answer is yes, data encryption works as a method of data protection, but only when done correctly and with limitations. There are several forms of encryption and not all are created equal.\u00a0<\/span><\/p> Why are big data aggregators and cloud computing companies leaking user information? The answer is that they are using suboptimal encryption methods to protect sensitive information. What Happens When Data Encryption Fails<\/b><\/p> Let\u2019s take Dropbox as an example: one of the largest cloud-based data aggregators in the world. In 2012 Dropbox began receiving emails from users who complained that they were getting emails sent to an address that they only used with Dropbox.<\/span><\/p> Upon further investigation, the Dropbox team found that a few usernames and passwords were stolen and used to sign into a small number of Dropbox accounts. From among that unauthorized access, \u201c<\/span>a stolen password was also used to access an employee Dropbox account containing a project document with user email address.<\/span><\/a>\u201d<\/span><\/p> In 2016,<\/span> 68 million uses had their emails and passwords leaked<\/span><\/a> onto the internet resulting in a slew of individual data breaches and identity thefts. This leak was a direct result of the Dropbox compromise in 2012, but the company failed to mention that passwords were revealed. This is what happens when encryption \u2018fails\u2019 – sometimes it simply isn\u2019t enough.<\/span><\/p> Similarly, a<\/span> 2020 study conducted by the University of New York<\/span><\/a> uncovered flaws in 1Password and LastPass applications that made them susceptible to phishing attacks. Dr.<\/span> Siamak Shahandashti revealed that<\/span><\/a> \u201ca phishing attack from a malicious app is highly feasible \u2013 if a victim is tricked into installing a malicious app it will be able to present itself as a legitimate option on the autofill prompt and have a high chance of success.\u201d No One Is Planning For The Future<\/b><\/p> There has been a significant amount of smoke, mirrors, and noise in the security marketplace. Marketing and promotional jargon proliferate with claims of superior performance towards everyone\u2019s ultimate goal: the privacy and security of data assets.<\/span><\/p> In reality, there are very few companies that have seen the future of data protection and have developed for it. There are a multitude of predictive, analytical, reactive, defensive, and deflective tools that claim they deliver data security. They don\u2019t.<\/span><\/p> But what they were built to do specifically, is to attempt to protect those perimeters that hover around the data: networks, endpoints, platforms, applications, infrastructures. To date, without much success. Proactive Data Protection<\/b><\/p> Trying to protect the billions of doors and pathways to valuable data assets defensively has been proven without a doubt to be impossible, according to Gartner, SCMedia, Ponemon Institute, Forrester, and a plethora of other cybersecurity experts.<\/span><\/p> Office 365, desktop apps, and other cloud storage solutions have failed time and time again. STASH\u00ae<\/span> was developed specifically for this Presumed Failure.\u00a0<\/span><\/p> We realized that taking a different approach, developing a way to protect the core, most common denominator \u2013 the data itself \u2013 is the solution our customers and 1,000s of companies around the world have been seeking.<\/span><\/p> By proactively protecting data through a proprietary method of encryption, parsing, multiplication, scattered in multiples on any kind of cloud configuration or on-site servers anywhere in the world a client chooses. Security wrapped in security with encryption keys even STASH\u00ae<\/span> has no access to, and digital rights management that is controlled solely by the organization.<\/span><\/p> STASH\u00ae<\/span> mitigates the possibility of data compromise to the lowest possibility ever and ensures data integrity, resilience, privacy, & security for decades, no matter how technology changes. You have complete control over who is able to access your storage space; not even STASH\u00ae<\/span> has access to your data.<\/span><\/p> Cloud storage options are good for keeping low-value working documents or large volumes of relatively unimportant content. But for important, critical and sensitive data,, you need something that protects that data whether it lives in those big box cloud storage environments, , or your own on-premise servers.\u00a0<\/span><\/p> \u00a0<\/p> When you add STASH\u00ae<\/span>, privacy and security stays with the data itself wherever it is, wherever it goes. STASH\u00ae<\/span>\u2019s datacentric approach to security is the only genuine solution\u00a0 for protecting what you can\u2019t afford to lose.<\/span><\/p> On the other hand, organizations have the need for integrating in IT departments new technologies often using cloud services and other ways of direct access to the web. This pressure for IT departments to give…<\/p>\n","protected":false},"author":4,"featured_media":7637,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"quote","meta":{"nf_dc_page":"","footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/posts\/875"}],"collection":[{"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/comments?post=875"}],"version-history":[{"count":0,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/posts\/875\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/media\/7637"}],"wp:attachment":[{"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/media?parent=875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/categories?post=875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/tags?post=875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
<\/span><\/p>
<\/span><\/p>
<\/span><\/p>
<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t