Lack of encryption is putting customer data at risk

Security researchers investigating the Yahoo data breach believe that a failure to use proper encryption is one of the prime reasons behind the hack. If this is right, then many more organizations may be putting customer data at risk. A report by Gemalto and the Ponemon Institute found 92 percent of businesses encrypt just 75 percent or less of their sensitive and confidential data when it is sent via the cloud. The proportion of respondents that encrypt data stored in the cloud is even lower at 40 percent. Worryingly for customers, it is their data that is the most common form of information left unencrypted. This places customer data at considerable risk of being viewed or even harvested by hackers. A simple way of protecting cloud data on its journey from device to cloud storage is to encrypt the whole process using a VPN tunnel.

Mobile Banking Apps: How Safe are They?

Mobile banking apps are set to revolutionize how we bank. According to KPMG, the number of mobile banking users globally is forecast to double to 1.8 billion over the next four years. In the UK regulators have announced new rules to let customers access details of their entire finances through a single mobile phone app by 2018. In the US mobile banking industry, technology has yet to overcome fundamental trust issues but the idea is starting to take off among financial services consumers. The banks and financial institutions are working hard to make their mobile apps as secure as possible. User behavior meanwhile has some catching up to do. For example, connections to free and unsecured Wi-Fi are open and vulnerable to fraud. To reduce security risks, it’s a good idea to use a virtual private network (VPN). This is a tried and tested way to secure the connection and encrypt all data transferred between the mobile device and the bank.

VPN and Bitcoin: A Cloak of Invisibility for Shoppers of Digital Goods

Bitcoin, the digital currency underpinned by block chain technology, is still in its infancy and users are only just beginning to scratch the surface of its full potential. Even so, things are already heating up for dealers in Bitcoin. This year, the total value of Bitcoin transactions is expected to exceed $92bn – up around 240% from under $27bn in 2015. Bitcoin transactions typically make use of aliases or nicknames to disguise user identities but this does not make them anonymous. However, the combination of a virtual private network (VPN) and Bitcoin can guarantee privacy. The encrypted connection provides a cloak of invisibility for all transactional data and provides complete anonymity for buyers if they want it. This is especially true when purchasing digital goods like software, books, reports, databases and so on.

Making IIoT Security More Robust

Once again Internet-connected gadgets, also known as the Internet of Things (IoT), are expected to be a gift for retailers this Christmas in helping them towards bumper sales. However, in many ways, the hyperbole surrounding consumer IoT is a mere side-show. According to McKinsey Global Institute, the real value of IoT lies with industry. McKinsey expects factories to be the top market for Industrial Internet of Things (IIoT), accounting for $3.7 trillion per year by 2025. Presently, IoT technology in general is relatively immature. Issues such as security and manufacturing standards are still the subject of much debate. However, the primary focus of the world’s professional engineering bodies is how to make IIoT more robust. In this respect, Virtual Private Network (VPN) technology has an important part to play by ensuring data traffic is secured at device-level and encrypted at all times.

Is Mobile Security Broken?

The way we work has changed. Our laptops, tablets and smartphones let us do our job from wherever we want – at the office, at home or even while on-the-move. We can also freely chat and collaborate with colleagues, customers or suppliers one-to-one or in groups using an array of cloud-based productivity apps. When it comes to mobile, the conventional security model is broken. Traditional detection and software patching techniques simply cannot keep pace. In its place, arguably one of the most reliable ways to keep sensitive proprietary data safe is mobile VPN.