Code source for encryption and other cybersecurity software is a sticky topic for many in the information security world. In one camp, you’ll find those who champion open source software as being inherently more secure. And opposite them, you’ll see those who say proprietary is the only way to go since open source has no accountability attached to it. The broader open-source vs closed-source debate has been raging for decades, since the early days of software. Both sides have their prominent proponents and just as prominent opponents.
If you’re drawn to Thunderbird as an email client, there’s a good chance that you’re more security-conscious than the average internet user. The majority of email users across the web aren’t going to get excited about a free, open source, cross-platform email client that stays true to the tenets of the Mozilla Manifesto—but for those who do, Thunderbird presents an attractive alternative to some of the more well-known email clients on the market. That said, it doesn’t offer encryption protection for your emails right out of the box.
p≡p for email, the easiest and most secure solution for end-to-end email encryption – now available for all your devices
Data, whether it’s in motion or at rest, is constantly imperiled by hackers and fraudsters. This means that encryption is more important now than ever—a fact that most businesses around the world are quickly catching onto. Even as the consensus grows around the importance of encrypting both caches of stored data and communications like emails and other messages, however, there isn’t really a unified theory of how best to implement encryption in way that makes operational sense while minimizing potential attack vectors. As a result, around two-thirds of businesses list cryptographic key management as either a medium or large challenge.
In a survey of several thousand IT professionals across a dozen countries, 57% of respondents said that encryption key management at their company was “painful.” In a similar study, the risk and cost associated with key management was, on average, rated a seven out of 10. Those percentages change from year to year, but as the importance of encryption becomes increasingly obvious across different sectors, the total number of businesses dealing with serious encryption key pain is only going to go up.
The online world is a bit like the American Wild West 150 years ago. Most people are genuinely good and honorable and are just trying to live their lives. Then you have the gunslingers and train robbers, those people who today are hackers and scammers just trying to make a fast buck at the expense of those good people.
The FBI is warning businesses about a growing threat to their confidential data—the Business Email Compromise (BEC) attack. This isn’t a new form of cyber assault, by any means, however, it is on the rise at an alarming rate. Whether this threat has just come onto your radar or you’ve been monitoring it for a while, there’s never been a better time to take preventative measures..
According to IBM, the average cost of a data breach in 2019 was just under $4 million—and this is nothing compared to the costs of some of the more high profile security lapses in recent history. Since the Equifax breach was uncovered in the 2017, it’s estimated that it’s cost the company $1.4 billion. And this is before we talk about other types of attacks beyond data breaches, like the SWIFT transaction fraud that lay at the heart of the infamous Bangladesh Bank heist. Really, it’s hard to overstate how critical data security is for international businesses, especially in the financial sector.
With the current world-wide coronavirus pandemic, more people are working from outside the safety of their usual secure corporate networks. This opens your company up to a whole slew of new hacks and security concerns. Fortunately, there are options when it comes to locking down access to your proprietary data and internal systems.